Answer:
Indonesia's capital has just been relocated from Jakarta to a site within the jungle of Kalimantan on Borneo island after parliament approved the bill. It will strengthen supply chains and place Indonesia "in a more strategic position in world trade routes, investment flows, and technological innovation."
Explanation:
mark as brainiest
Answer:
President Joko Widodo first announced the plan to move Indonesia's capital in 2019, in an effort to relieve the huge environmental challenges facing Jakarta, and to redistribute wealth. Indonesia's legislature on Tuesday passed a bill that creates the legal framework for moving the country's capital from Jakarta — a sinking, congested, polluted and flood-prone megacity with more than 10 million residents — to the jungles of Kalimantan, on Indonesia's portion of the island of Borneo.
Explanation:
hope you like it, brainliest is an option :)
Which student is demonstrating the most effective time-management skills?
Answer:
Carlo sticks to a regular study schedule.
Explanation:
I did this already.
The Director of your company is traveling out of the country with the company laptop. Which feature will you need to configure to prevent theft of the laptop
The feature you need to configure to prevent theft of the laptop is The LoJack tracking software.
What is LoJack a software?LoJack is a software that is made for Laptops. It is known to be a proprietary laptop theft recovery software that helps one to have a remote access to lock, delete files from their system.
Thiss app can also helps a person to locate the stolen laptop as with the case of the Director above.
Learn more about laptop from
https://brainly.com/question/26021194
Explain whats Cropping in your own words (photos)
;w;) - Actually, cropping is just removing parts of a picture to have the main scene on focus. I was once in a photography class, and I took a picture of the Appalachian mountains.
Please help. Would appreciate it if you answer soon.
Answer:
C- He shouldn't trust the website for both reasons
Explanation:
Answer:
c
Explanation:
Which of the following is an example of self-awareness?
1.) Knowing and accepting your preferences. I am not a morning person. ...
2.) Checking in with your body. Most people don't really notice that their bodies are working for them until they aren't working for them. ...
3.) Choosing to be disciplined (or not). ...
4.) Recapping a conversation. ...
5.) Taking in some beauty.
Can someone buy me eddie van der tabs???
Answer:
No
Explanation:
U cannot exploit people like that
What type of a structure is the best way to iterate through the characters of a string?.
Answer:Using the character iterator is probably the only correct way to iterate over characters, because Unicode requires more space than a Java char provides. A Java char contains 16 bit and can hold Unicode characters up U+FFFF but Unicode specifies characters up to U+10FFFF.
Explanation:
Katia wants to listen to online radio on her home computer while she works. What is the best option she should use to get connected to the internet
The best option that Katie should use to get connected to the internet is to use broadband.
What is Broadband?Broadband is known to be a type of telecommunications technology that is created so as to give man a high-speed Internet access through the use of multiple channels of similar digital signals.
Note that Broadband can help transmit on a wired connection through the use of coaxial, fiber optic, wirelessly on a cellular network and this can help Katie a lot with her internet connection.
Learn more about internet from
https://brainly.com/question/2780939
A storeowner rents movies to customers. How can a database help the store owner?
The database can help the store owner as it will help them to monitor the movies, customers, orders, and movie suppliers for their single movie rental store.
What is database?A database is known to be a kind of organized composition of structured information, or data, that are said to be stored electronically in a computer system.
Conclusively, An example are MySQL, SQL Server, MongoDB, etc. These modern databases are managed by DBMS.
Learn more about database from
https://brainly.com/question/518894
Which of the following activities Best describes the use of marketing as a form of digital communication
OA An online discount clothing company sends an email about its upcoming sale,
OB. A teacher posts a list of assignments online for students to access
OG A doctor's office emails a patient to remind them about an upcoming appointment
OD. A friend downloads a new song by her favorite artist to her phone.
Reset
Next
4 atvantage of a computer
Answer: High Speed. One of the reasons for improvement in the quality of life is personal computer's speed.
Accuracy. Human make errors.
Automation. A lot of tasks can be automated saving a lot of time.
Ease of Access.
Explanation:
Where are all my smart ppl at? Help me out!!!
A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9?
A.) '=A1+B2
B.) '=A2+B3
C.) '=A2+B2
D.) '=B1+C2
Answer:
ANSWER IS A2+B3
Explanation:
i am shmart.
Answer:
Most def B.
Explanation:
Hope this helped
What are the components of intel motherboard
List many
Answer:
1. Mouse & keyboard : There are two types of keyboard and mouse connectors. ...
2. USB (Universal serial bus) : USB is Universal 3. 4. serial bus.
5. Parallel port : ...
6. CPU Chip : ...
7. RAM slots : ...
8. Floppy controller : ...
9. IDE controller : ...
10. PCI slot :
NEED ASAP WILL MARK BRAILIEST
Many people are concerned about data privacy. Imagine that you were hired to advise a company about how they can be sure that their customers’ data stays private. What would you tell them?
Answer:
Conduct a data privacy audit. See where and at what level the company is collecting data and check your legal obligations
Minimize data collection and retention. The more data you hold the more open you are to being hacked and the more data you collect the more you have to answer to customers
Secure the data you keep. With examples of software you use for security
Post a public privacy policy
Provide a forum for complaints.
Explanation:
Leslie’s parents put a big dry-erase board on the refrigerator and let the kids write suggestions for how to organize and assign household chores. Which step of problem solving does this situation illustrate?
A. Define the problem
B. Evaluate the solution
C. Determine possible solutions
D. State and check assumptions
Answer
determine possible solutions
Explanation:
im assuming
ty for the thanks
Which of the following least illustrates inequity caused by the digital divide?
Your file, pets.txt, contains the type of pet, weight, and age on each line. An example line is below: dog, 30, 6 Finish the code to read the file and print the contents. import csv inFile = open('pets.txt','r') myReader = for item in myReader: print(item)
The Python program is an illustration of the file manipulation process
How to complete the program?From the code segment in the question, we have the following parameters:
The program is written in PythonThe second line of the program is incompleteThe program written in Python where comments are used to explain each action is as follows:
#This imports the csv packacge
import csv
#This opens the file for a read operation
inFile = open('pets.txt','r')
#This prints the file line by line
print(inFile.read())
Read more about Python programs at:
https://brainly.com/question/24833629
What are the ending contents of the array? Choices show elements in index order 0, 1, 2. int yearsList[3]; yearsList[0] = 5; yearsList[1] = yearsList[0]; yearsList[0] = 10; yearsList[2] = yearsList[1];
The array yearsList is used to hold multiple values and variables
The ending content of the array are 10, 5, 5
How to determine the ending content of the arrayThe first line of the program declares an array variable of three elements
int yearsList[3];
The second line assigns 5 to the 0 index
yearsList[0] = 5;
The next line assigns the value of the 0 index to the 1 index.
So, we have:
yearsList[0] = 5;
yearsList[1] = 5;
The next line assigns 10 to the 0 index.
So, we have:
yearsList[0] = 10;
yearsList[1] = 5;
The next line assigns the value of the 1 index to the 2 index.
So, we have:
yearsList[0] = 10;
yearsList[1] = 5;
yearsList[2] = 5;
Hence, the ending contents of the array are 10, 5, 5
Read more about arrays at:
https://brainly.com/question/22364342
When using the routing information protocol (rip) to transfer data from one network to another, the path ____ is chosen.
Answer:
When using the routing information protocol (rip) to transfer data from one network to another, the path with the smallest number of hops is chosen.
TRUE or FALSE. 2. 1 Information is a collective term used for words, numbers, facts,
Answer:
True
it is the best way to get words facts and number
If the user, when asked for his/her date of birth, enters a date in the future, this error should be caught by a ________ check.
Answer:
The answer is reasonableness.
Your answer is Reasonableness check
Explanation:
Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a wonderful day!
Which of the following uses of the Internet is unethical?
purchasing vacation flights online during the evening
purchasing vacation flights online during the weekend
purchasing vacation flights online during work hours
purchasing vacation flights online during a bus ride
Purchasing vacation flights online during work hours is the uses of the Internet is unethical. Hence, option C is correct.
What is considered Internet is unethical?Five immoral applications of computers include media piracy, ransomware attacks, identity theft, financial fraud, and theft of intellectual property.
Unethical: A student plagiarized in their last written paper to boost their GPA. It is unethical to do this since it goes against societal norms and the majority of people would find it disagreeable.
When something is "illegal," it means it violates the law, as opposed to when it is "unethical," which means it is morally wrong. The legal system determines what constitutes an illegal act. In circumstances of unethical behaviour, a man's own conscience is the deciding element. Even if an unethical act may be immoral, it may not be against the law.
Thus, option C is correct.
For more information about Internet is unethical, click here:
https://brainly.com/question/11181425
#SPJ6
Identify the different trends in ICT and use them to their advantage
Answer:
The primary new technologies of this decade – Artificial Intelligence (AI), cloud, mobile/5G, cybersecurity, blockchain and the Internet of Things (IoT) – are even more significant and impactful than we may realise.
1. It is the main energy provider in the process of food manufacture in the plant kingdom. *
You recently created a new network segment for the development department. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router.
Which of the following would be the best action to take in order to fix the problem?
a. Install and configure a new DHCP server on the development network segment.
b. Configure the router to forward broadcast messages.
c. Implement an IP helper address on the router.
d. Move the DHCP server to the new network segment.
The option that would be the best action to take in order to fix the problem is to Implement an IP helper address on the router.
What is DHCP server?A DHCP Server is known to be a network server that is said to quickly gives and appoints IP addresses, default gateways and other network parameters to client devices.
The Internet Protocol Helper (IP Helper) is said to help network administration of the local computer by helping the applications to get back information based on the network configuration of the local computer, and thus it is good to implement it.
Learn more about DHCP server from
https://brainly.com/question/14407739
Which file format cannot be added to a word document.
Answer:
MP4
Explanation:
Using computer technology to harm another person is known as pharming. cyber-bullying. hacking. vishing.
Answer:
It is B and C.
But what are these, really?Cyber bullying is when you use your form of technology to harm another person. It can harm them mentally and sometimes is so bad that it can cause depression.
Hacking is to mess with a server which can cause complicated errors and even breakage of code.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
I hope this answered your question! Have a wonderful day.
The Linux operating system is an example of Group of answer choices free-market software. open-source software. pirated software. proprietary software. unreliable software.
Linux is one of the most prominent examples of free and open-source software collaboration. The source code may be used, modified and distributed commercially or non-commercially by anyone under the terms of its respective licenses, such as the GNU General Public License.
need help!!!!!!!Write a 200 word paper on the new developments, describing how these effect the telescopes, and in what environments these work best.
Answer:
Development in science and technology have improved many things.It make the trains more better and comfortable . It has replaced steam engine. Development in science and technology have improved our life easier. Because of science and technology modern scientists have made many things like Metro train , Aeroplane , Modern engine etc. Now anyone can go any part of the world because of the help of development in science and technology. Now their are many way for growing crops, It helps the farmer very much.
Explanation:
for jhoantm please don't answer
Answer:
its been a month, i dont think hes going to answer
Explanation: