A résumé is a short document outlining your job experience, education, and skills.

True
False

Answers

Answer 1

Answer:

yes it is exactly that and if you lie they will know

Explanation:

Answer 2

Answer:Yes./tru

Explanation:

Just so they know things about you for the job ig


Related Questions

You cannot view the presentation by clicking the slideshow icon on the status bar

Answers

The Statement is false,

Explination: You can view your slides in a variety of ways depending on the task at hand.

A type of expansion card that enables communication over cellular network is referred to as:______.

Answers

A type of expansion card that enables communication over cellular network is referred to as a WWAN card.

What are the type of expansion card?

The Network Interface Card (NIC) is known to be a kind of a card that gives room for computers to  be able to communicate over a given computer network, and it is one that is either by using cables or wireless.

The WWAN card is known to be the Wireless Wide Area Network (WWAN) and this is known to be a kind of a wireless network that links one to the Internet via the use of cellular technology.

Hence, in the case above, A type of expansion card that enables communication over cellular network is referred to as a WWAN card and thus it is correct.

Learn more about expansion card from

https://brainly.com/question/13050587

#SPJ1

Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False

Answers

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

What is vulnerability?

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: https://brainly.com/question/25813524

#SPJ1

Enterprise storage systems typically use fast Fibre Channel or ____ connections and are scalable so more hard drives can be added as needed up to the maximum system capacity.

Answers

Enterprise storage systems typically use fast Fibre Channel or iSCSI connections and are scalable.

What is iSCSI known for?

ISCSI is a word that connote Internet Small Computer System Interface, and it functions as or on top of the Transport Control Protocol (TCP) and it gives room for the SCSI command to be transmitted to the end-to-end over local-area networks (LANs), and others.

Note that Enterprise storage systems typically use fast Fibre Channel or iSCSI connections and are scalable.

Learn more about storage systems from

https://brainly.com/question/24179644

#SPJ1

Which of the cached information retrieved will be the same as what is stored in the original server where the data is maintained

Answers

The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

What is cache on a browser?

The browser cache is known to be a kind of 'cache' tool that is often used by a person's internet browser so that one can fasten up the page loading act.

Hence, The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

Learn more about browser cache from

https://brainly.com/question/14598358

#SPJ1

Have the javascript function CountingMinutes(str) take the str parameter being passed which will be two times (each properly formatted with a colon and am or pm) separated by a hyphen and return the total number of minutes between the two times. The time will be in a 12 hour clock format. For example: if str is 9:00am-10:00am then the output should be 60. If str is 1:00pm-11:00am the output should be 1320.
function CountingMinutes(str) {
// code goes here
return str;
}
// keep this function call here
console.log(CountingMinutes(readline()));

Answers

Using the knowledge in computational language in Java it is possible to write a code that function as CountingMinutes:

Writing the code in Java:

function CountingMinutes(str) {

     // code goes here  

     // Declare variables for calculating difference in minutes

     // variables in JavaScript are declared with "let" keyword

     /* Build regelar expression which will match the pattern of "12houttime-12hourtime"

        and extract time or hours in numbers from it */

     let extractedTimeStringArray = str.match(/(\d+)\:(\d+)(\w+)-(\d+)\:(\d+)(\w+)/);

     // extractedTimeStringArray array will be like- ["1:00pm-11:00am", "1", "00", "pm", "11", "00", "am", index: 0, input: "1:00pm-11:00am", groups: undefined]    for str = "1:00pm-11:00am"

     // console.log('object', time)

     

     // Extract array value at 1st index for getting first time's hours (ie time before hyphen like 1:00pm in 1:00pm-11:00am )  (like 11 from 11:32am) and convert them to minutes by multiplying by 60

     let mintsOfFirstTimeFromHours = extractedTimeStringArray[1] * 60;

     // Extract array value at 2nd index for getting first time's minutes like 32 from 11:32am

     let mintsOfFirstTimeFromMints = extractedTimeStringArray[2];

     // Extract array value at 4th index for getting second time's hours (ie time after hyphen like 11:00am in 1:00pm-11:00am ) and convert them to minutes by multiplying by 60

     let mintsOfSecondTimeFromHours = extractedTimeStringArray[4] * 60;

     // Extract array value at 5th index for getting second time's minutes like 32 from 11:32am

     let mintsOfSecondTimeFromMints = extractedTimeStringArray[5];

     // if second time's 12 hour time is in pm

     if (extractedTimeStringArray[6] === "pm") {

       // Add 12 * 60 = 720 minutes for 12 hrs

         mintsOfSecondTimeFromHours += 720;

     }

     // if first time's 12 hour time is in pm

     if (extractedTimeStringArray[3] === "pm") {

        // Add 12 * 60 = 720 minutes for 12 hrs to first time

       mintsOfFirstTimeFromHours += 720;

        // Add 12 * 60 *2 = 1440 minutes for 24 hrs to second time

       mintsOfSecondTimeFromHours += 1440;

     }

     // Calculate output minutes difference between two times separated by hyphen

    str = (mintsOfSecondTimeFromHours - mintsOfFirstTimeFromHours) + (mintsOfSecondTimeFromMints - mintsOfFirstTimeFromMints);

     // return calculated minutes difference

     return str;

   }

   // keep this function call here

   // call the function and console log the result

   console.log(CountingMinutes("1:00pm-11:00am"));

   // output in console will be-  1320

See more about Java at: brainly.com/question/12975450

#SPJ1

Which option can be used to import selected slides form a previously created presentation into a new presentation without manually copying and pasting them?

Answers

An option which can be used to import selected slides form a previously created and existing presentation into a newly created presentation without having to manually copy and paste them is reuse slide.

What is a presentation application?

A presentation application can be defined as a type of computer application which is designed and developed to avail its end users an ability to create various slides that contains both textual and multimedia information, which are typically used during a presentation.

What is a slide?

A slide can be defined as a single page of a presentation that contains text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic.

In Computer technology, reuse slide is an option which can be used to import selected slides form a previously created and existing presentation into a newly created presentation without having to manually copy and paste them.

Read more on slides here: brainly.com/question/11741377

#SPJ1

The formula for steady-state consumption per worker (c*) as a function of output per worker and investment per worker is:_________

Answers

Answer:

C= f(k) - dk*

The formula for steady-state consumption per worker (c*) as a function of output per worker and investment per worker is: c= f(k) - dk*. When an economy begins above the Golden Rule, reaching the Golden Rule: produces higher consumption at all times in the future.

______ data is data that has not been processed for use. Multiple choice question. Raw Fast Decision Source

Answers

Answer: Raw Data

Explanation:

Raw data (sometimes called source data, atomic data or primary data) is data that has not been processed for use.

a website that is setup to spread a virus or for some other unethical purpose is called

Answers

Answer:

that is anti viruse ok bro or sister

A website that is set up to spread a virus or for some other unethical purpose is called a "malicious website" or "malware-infected website''.

Ask about the website that is set up to spread a virus or for some other unethical purpose.

We know that,

''Malicious website" or "Malware-infected website" websites are designed to exploit vulnerabilities in computer systems, deceive users, or distribute harmful software without their consent.

It is important to be cautious and protect your devices against such threats by using reliable antivirus software and practicing safe browsing habits.

Hence, A website that is set up to spread a virus or for some other unethical purpose is called a "malicious website" or "malware-infected website''.

To learn more about the Malicious website visit:

https://brainly.com/question/28910959

#SPJ3

transmission of pinworms can occur in all following except

Answers

Transmission of pinworms can occur in contaminated clothing clothing, bedding and others.

What is the mode of transmission for pinworms?

Pinworm infection is known to be the spread of this worm via  fecal-oral route and it is one that is said to often transfer a lot of infective pinworm eggs from the anus to a person's mouth, via  hand or indirectly via contaminated clothing, and others.

Note that the Transmission of pinworms can occur in contaminated clothing clothing, bedding and others.

Learn more about pinworms from

https://brainly.com/question/8980340

#SPJ1

to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the

Answers

For one to be able to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the check IP group - testing.

What does IP group do?

The term IP Group is known to be one that looks at or is one whose purpose is so that it can  generate  a lot of a positive social and also that of environmental impact with financial returns.

Note that this is one that offers shareholders a kind of an exposure to a a lot of portfolio of opportunities that is made up of a  high-growth businesses in regards to the growth markets.

Hence, For one to be able to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the check IP group - testing.

Learn more about IP address from

https://brainly.com/question/24930846

#SPJ1

Which statements are TRUE about web services protocols? (Select TWO responses) SOAP and REST are both web service communication protocols REST allows a greater variety of data formats, whereas SOAP only allows XML SOAP is a protocol that only works with XML and REST only works with JSON RESTful web services and SOAP web services are completely stateful

Answers

The true statements are TRUE about web services protocols are:

SOAP and REST are both web service communication protocols REST allows a greater variety of data formats, whereas SOAP only allows XML SOAP .

Are SOAP and REST both Web service communication protocols?

Yes, SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) are both known to be a kind of web service communication protocols.

Note that REST gives room form a greater scope of data formats, but SOAP only allows XML and as such, The true statements are TRUE about web services protocols are:

SOAP and REST are both web service communication protocols REST allows a greater variety of data formats, whereas SOAP only allows XML SOAP .

Learn more about web services from

https://brainly.com/question/13261383

#SPJ1

Is not recognized as an internal or external command, operable program or batch file.

Answers

Python  Is not recognized as an internal or external command, operable program or batch file.

Which is not recognized as an internal or external?

The “Python is known to be a program that is not seen as or is one that is not recognized as what we call an internal or external command”

Note that an error is said to be often encountered in the command prompt of the  Windows. The error is said to be an outcome that is due to when Python's executable file is said to  not found in the environment variable.

Therefore, Python  Is not recognized as an internal or external command, operable program or batch file.

Learn more about  operable program from

https://brainly.com/question/25327617

#SPJ1

Which enterprise file service allows you to create duplicate copies of files for high availability?

Answers

DFS enterprise file service allows you to create duplicate copies of files for high availability.

Check more about DSF services below.

Is DFS a file server?

Distributed File System (DFS) is known to be a kind of a composition of client and server services that is known to give room for an organization that is said to make use of Microsoft Windows servers to be able to put together a lot of distributed SMB file shares in a distributed file system.

Note that they have high quality standard and as such, DFS enterprise file service allows you to create duplicate copies of files for high availability.

See full question below

Which enterprise file service allows you to create duplicate copies of files for high availability?

a. WSUS

b. BranchCache

c. Configuration Manager

d. DFS

e. Group Policy

Learn more about file service from

https://brainly.com/question/24137718

#SPJ1

You're a teacher and you've created a form letter in word that you send to the parents of the students in your class at the beginning of each year. the letter pulls parents' names and addresses, along with the children's names, from an excel file you get from the main office. the original creator of the excel file used a column labeled father name and another labeled mother name. over the summer, a new person took over and updated the file. parent names are now located in columns titled parent 1 and parent 2. what do you need to do to make your form letter work with the updated excel file

Answers

Answer:

The letter pulls parents' names and addresses, along with the children's names, from an Excel file you get from the main office. To make your form letter word with the updated Excel file, Create a new form letter in Word and use the mail merge feature to link it to the updated Excel file.

Explanation:

What is cloud computing?

Answers

Cloud computing is a term that connote  the passage of computing service such as servers, storage, databases via the use of  the Internet to render  faster services such as innovation, flexible resources, and others.

What is cloud computing?

Cloud is known to given room for network-based access in regards to communication tools such as emails and calendars.

Note that  Cloud computing is a term that connote  the passage of computing service such as servers, storage, databases via the use of  the Internet to render  faster services such as innovation, flexible resources, and others.

Learn more about computing from

https://brainly.com/question/19057393

#SPJ1

what is communication ????

Answers

Answer:

Communication is the act of giving, receiving, and sharing information -- in other words, talking or writing, and listening or reading. Good communicators listen carefully, speak or write clearly, and respect different opinions.

(≡^∇^≡)

Answer:

Communication is known as the exchange of messages, information, and ideas among parties through any medium.

Explanation:

Communication is an important supporting service that is needed to do our day-to-day work. We use several communication methods and various mediums to communicate with others. Verbal, written, electronic and codes are some examples of  communication mediums while Meetings, Discussions, Workshops, Letters, Notice boards, Reports, Loudspeakers, Digital display boards, Road signals, Universally accepted signs, Bell, etc .are some examples of communication mediums Communication is a process that provides information and messages. Communication process

Sender ⇒ Message ⇒  Medium ⇒Receiver ⇒ Reaction ⇒ Feedback

On the internet, the entity that looks up a domain name and retrieves information about it is the?

Answers

On the internet, the entity that looks up a domain name and retrieves information about it is the Domain Name System (DNS).

What is a Domain?

This refers to the subset of the internet with access to administrative privileges that contains a common suffix with an organization.

Hence, we can see the Domain Name System (DNS) is the primary entity that is used to retrieve the domain name and the relevant information about the domain and returns it to the user, and then translates IP addresses.

Read more about Domain Name System here:

https://brainly.com/question/19268299

#SPJ1

A security team desires to modify event logging for several network devices. One team member suggests using the configuration files from the current logging system with another open format that uses TCP with a secure connection. Which format does the team member suggest?

Answers

Since option is not given, answer will be subjective. The format that the team member suggest is the use of password.

What is a  secure connection?

This is known to be a kind of connection that is said to be often encrypted by one or a lot of security protocols to make sure that there is security of data flowing between two or a lot of nodes.

Hence, Since option is not given, answer will be subjective. The format that the team member suggest is the use of password.

Learn more about secure connection from

https://brainly.com/question/5338580

#SPJ1

Kate needs to insert 10 text boxes in a document. after inserting the first text box, how can she easily repeat the action nine more times?

Answers

Kate can easily repeat the action nine more times if she press the Redo button nine times.

What is the button about?

The button for redo is one that states that that action should be done again.

Note that for a person to redo something that they have undone, one can press Ctrl+Y or F4 and thus

Hence, Kate can easily repeat the action nine more times if she press the Redo button nine times.

See full question below

Kate needs to insert 10 text boxes in a document. After inserting the first text box, how can she easily repeat the action nine more times?

a. Press the Redo button nine times.

b. Right-click the text box border and select Repeat nine times.

c. Press CTRL+R nine times.

d. Cut the text box and then paste it.

Learn more about Redo button from

https://brainly.com/question/10383258

#SPJ1

When using sftp to share files, what is encrypted in addition to the authentification information?.

Answers

In addition to the authentification information, the data files are encrypted when using SFTP to share files.

What is SFTP?

SFTP is an abbreviation for SSH File Transfer Protocol and it can be defined as a type of secured file transfer protocol that's designed and developed to run over the SSH protocol by supporting full security and authentication, file management, as well as sharing files between two or more users on an active computer network.

This ultimately implies that, SSH File Transfer Protocol can be used for file management, file transfer and provide end users with full security and authenticated file access.

In conclusion, we can infer and logically deduce that in addition to the authentification information, the data files are encrypted when using SSH File Transfer Protocol (SFTP) to share files.

Read more on file transfer here: brainly.com/question/20602197

#SPJ1

A Web browser must keep track of the sites that you have visited so that when you click the ""back"" button it will return you to the most recent site.

Answers

The data structures has a functionality that best supports the described display of previously visited sites is Linked List.

What is web browser?

A web browser is one that people uses on the internet and it helps a person to get or retrieves information from any other web or applications.

Hence, The data structures has a functionality that best supports the described display of previously visited sites is Linked List.

See options below

ArrayList or array

Queue

Stack

Priority Stack

Linked List

Learn more about Web browser from

https://brainly.com/question/22650550

#SPJ1

In traditional programming, probably the most often used error-handling outcome was to ____.Group of answer choicesterminate the program in which the offending statement occurredignore the errorhandle the errorask the user for additional input

Answers

In traditional programming, probably the most often used error-handling outcome was to terminate the program in which the offending statement occurred.

What is a traditional programming?

Traditional programming is known to be a form of manual way that one or a user makes a program.

Note that in the case above, In traditional programming, probably the most often used error-handling outcome was to terminate the program in which the offending statement occurred.

Learn more about programming from

https://brainly.com/question/23275071

#SPJ1

A framework for studying memory that uses the computer as a model of human cognitive processes defines the?

Answers

A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

What is information processing theory?

The information processing theory explains how human bras also works like a computer by converting various thought, observation to meaningful information.

The human brain is said to works in a sequential way. It receives input such as picture and processes the information to give a result.

Therefore, A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

Learn more on information processing  below

https://brainly.com/question/11610994

#SPJ1

An engineer plans to acquire data from a disk. The disk is connected to the forensics workstation and is ready for the engineer. Which steps indicate a correct order of acquisition as they relate to integrity and non-repudiation?

Answers

The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

A hash of the disk is made A bit-by-bit copy is made A second hash is made A copy is made of the reference image

Is non-repudiation an aspect of integrity?

In general, nonrepudiation is known to be a term that puts together or combines authentication and integrity.

Note that Nonrepudiation is said to be a key or one of the pillars that pertains to information assurance.

The integrity in cyber security is known to be the act of keeping safe against any form of an improper information modification or destruction.

Hence, The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

A hash of the disk is made A bit-by-bit copy is made A second hash is made A copy is made of the reference image

Learn more about acquisition from

https://brainly.com/question/11412887

#SPJ1

How to get flash to work on chrome?

Answers

Answer:

Open Chrome on your computer. If you’re using Windows, you’ll usually find it in the Start menu.

Click the ⁝ menu.

Click Settings.

Scroll down and click Advanced.

Scroll down and click Content settings.

Explanation:

The primary difference between a work breakdown structure and a work sequence draft is that the work sequence draft shows ___________________.

Answers

The primary difference between a work breakdown structure and a work sequence draft is that the work sequence draft shows the sequence of task.

What is work breakdown structure process?

A work breakdown structure (WBS) can be regarded as  the scope management process  which is considered to be entirely deliverable-oriented.

It  usually follow the order of tasks which  must be completed to eventually arrive at the final product.

It should be noted that The work breakdown structure aims  to safeguard the project members on task as well as  focused on the project's purpose, hence , primary difference between a work breakdown structure and a work sequence draft is that the work sequence draft shows the sequence of task.

Learn more about work breakdown structure at:

https://brainly.com/question/14530580

#SPJ1

What is the first step in deploying a firewall?

Answers

Answer:

Explanation:

Items associated with firewall deployment process

Items associated with firewall deployment processSecurity policy. ...

... Set a default policy. ... Do not expose private services without VPN. ... Ensure non-repudiation in internal or external accesses. ... Build a secure visitor access policy. ...

Create access policies by interest groups. ...

. ... Ensure non-repudiation in internal or external accesses. ... Build a secure visitor access policy. ... Create access policies by interest groups. ... Use DMZ or private network for public services.

Relational operators allow you to ________ numbers

Answers

Relational operators allow an end user to compare numbers.

What are relational operators?

Relational operators can be defined as a programming language construct which allows an end user to compare both numbers and char values.

Also, it can be used to determine whether one number is less than (<), greater than (>), equal to (=), or not equal to another.

This ultimately implies that, relational operators allow an end user to compare numbers.

Read more on relational operators here: https://brainly.com/question/14995818

#SPJ1

Other Questions
Darkest Minds Book 1 themes and connections that can be made to the real world guadalupe reef complex: where it is, how old it is, and how different parts of this ancient reef are expressed in the preserved rocks social media posts have no uses in litigation or criminal proceedings. true false (iii) what is the maximum size of the square hole whose nominal size is 0.25? What is the final temperature when a 5.0 g sample of brass initially at 25C absorbs 75 J of heat? The specific heat of brass is 0.38 J.g^-1.C^-1 q = MCATA) -14 C B) 31 C C) 39 C D) 64C What is the main conflict in the talented Mr ripley? (book)what symbol (object, etc) could represent the title? What is the protagonist's(tom) emotional high point? (climax) Which conclusion about Columbia is best supported by the information in American as a Woman A commuter backs her car out of her garage starting from rest with an acceleration of 1. 40m/s2. How long does it take her to reach a speed of 2. 00 m/s? Which of these ideas did you include in youranswer? Check all that apply.Higher activation energies generally lead tolower reaction rates.Reaction 2 has a lower reaction rate thanReaction 1.The activation energy for Reaction 2 isprobably higher than that for Reaction 1.DONE Which equation is represented by the graph below?16&T&4Oy=e*+5Oy=e* +4Oy=Inx+421-2 -17 ?TY123 4 which species has the strongest carbon - carbon bond, c2hcl , c2h6 , or c2cl4 ? If A Population Grows 10 % Each Year, What Is The Annual Continuous (Relative) Growth Rate? A) 3.00 % B) 10.52% C) 10.00% D) 9.53% E) 7.42+% if you had each patients fasting blood sugar value and age, what procedure will you use to make comparisons among unlike data? a clamp circumcision is performed without dorsal block on a newborn. what cpt code is reported for this service? determine the steady-state growth rate in a cfstr activated sludge process as a function of sludge age. Identify an internal control procedure that would reduce the following risks in a manual system:a. The purchasing department may not be notified when goods need to be purchased. Require that an inventory control department monitor inventory records and request purchases (purchase requisition) when goods need to be reordered.b. Accounts payable may not be updated for items received. Require that the receiving department complete a receiving report for all goods received, and that a copy of the report is forwarded to accounts payable.c. Purchase orders may be prepared based on unauthorized requisitions. Require that the appropriate manager approve each purchase requisition by signing the requisition form.d. Receiving clerks may steal purchased goods. Require good physical security such as security cameras and good supervision of receiving employees. Using a "blind" PO at receiving may also help since constant shortages when goods are stolen is more likely to be noticed.e. Payments may be made for items not received. Require a three-way match of the purchase order, receiving report, and invoice before a payment can be approved.f. Amounts paid may be applied to the wrong vendor account. Assuming that the payment was to the correct vendor, but posted to the wrong account, it is very difficult to uncover this error. A reconciliation of subsidiary ledge to the accounts payable account may not uncover this because the total balance would be the same. It may be uncovered if someone notices that the records show payments to a vendor are in excess of that owed. There is no method to completely eliminate errors in posting.g. Payments may be made for items previously returned. Require a debit memorandum be completed for any goods returned, and that a copy of this be forwarded to accounts payable so that the balance owed can be changed.h. Receiving clerks may accept delivery of goods in excess of quantities ordered. First, there must be a clear policy on overshipments that receiving personnel can apply. For example, a policy may be written that overshipments under 5% can be accepted, but all others should be rejected and returned. Second, there must be a policy that all received goods are compared against a purchase order. Also, the use a "blind" PO to force receiving personnel to count goods and they might therefore more easily detect overshipments.i. Duplicate payments may be issued for a single purchase transaction. Require that payment documentation be "cancelled' when payment is made. This stamp on the documents should help prevent duplicate payments. In Microsoft Access, what do you need to decrypt an encrypted database? a. 128-bit decryption software b. an administrator account c. a password d. backup software identify how you would make hexylamine from 1-cyanopentane: let g be a group with the property that for any x, y, z in the group, xy 5 zx implies y 5 z. prove that g is abelian. ("left-right cancellation" implies commutativity.) Balance the reduction half-reaction below in acid solution. How many electrons are in the balanced half-reaction?Cr2O7 2-(aq) Cr3+(aq)