It would be at least two decades before some of
the technologies he demonstrated saw
widespread use, but all of them are used by
people today. Here is a list of some of Engelbart's
technologies. Which ones do you use today?

Answers

Answer 1

Answer: A,B,C,D,E

All of the above

Explanation:


Related Questions

Why does my playstation keep disconnecting from wifi?.

Answers

Answer:

because there might be a internet

problem

Explanation:

Explain working of any website.




[tex] \\ \\ \\ \\ \\ \\ \\ \\ \\ \\ \\ \\ [/tex]
★Kindly Don't Spam ~
★ Thanks ~​

Answers

Answer:

Code is responsible for websites working. For instance, when you click a button and something happens, there is a codeline telling the button to do that.

Hope this helps!

Answer:

The browser sends an HTTP request message to the server, asking it to send a copy of the website to the client (you go to the shop and order your goods). This message, and all other data sent between the client and the server, is sent across your internet connection using TCP/IP

Explanation:

Wope it Welps -,-

Telling the stories of groups whose experiences have been purposefully silenced or are otherwise not often told is called periences have been purposefully silenced or are otherwise not often told is called _________.

Answers

Telling the stories of groups whose experiences have been purposefully silenced o is known as whistle blowing or a survival stories.

What is  whistle blowing?

Whistleblowing is known to be a term that connote when a person  or a worker releases  information based on wrongdoing of other people.

The act is known to be one that makes a disclosure about what  they have witnessed and are scared of saying.

learn more about Telling stories from

https://brainly.com/question/4215989

In collaborative learning, the teachers teach by:

Answers

Answer:

Collaborating with the students and working with them in a hands-on learning environment.

As a junior IT consultant, you are asked by the client why certain information systems are successfully implemented while others are not. Why is that the case? Discuss the reason and common success factors with the client

Answers

Information systems can fail due to the difficulties of managing organizational change that are associated with a new system.

What is an information system?

It should be noted that an information system simply means a formal system that's designed to collect, store, and distribute information.

In this case, information systems can fail due to the difficulties of managing organizational change that are associated with a new system.

Learn more about information systems on:

https://brainly.com/question/25236643

(03.05 LC) Match the term with its description. (4 points) Column A 1. Acid : Acid 2. Alkaline : Alkaline 3. pH : pH 4. Ion : Ion Column B a. An atom or molecule that has a positive or negative charge b. A value from 0 to 14 that is used to specify how acidic or basic a compound is when it is dissolved in water c. A compound that increases hydrogen ions (H+) when it is dissolved in a solution d. A compound that increases the hydroxide ions (OH-) when it is dissolved in a solution

Answers

Answer:

Follows are the matching to this question:

Explanation:

Column  A            Column B

     1                           c

     2                          d

     3                          b

     4                          a

Description of the matching:

In 1(Acid) the correct choice is (c) because the acid (HCl) dissociates to both the H+ ion and the Cl- ion as a solution.  In 2(Alkaline ) the correct choice is (d) because alkaline NaOH is a solution that differentiates between the ions ( OH-) and Na+.  In 3(pH ) the correct choice is (b) because for an A compound of less than 7 is an acid and an alkaline pH compound of more than 7. For neutral compounds, a pH of 7 is applicable.In 4(Ion) the correct choice is (a) because Na+ ion is loaded positive, and Cl-ion is loaded negatively.

Answer:

Acid-A compound that increases hydrogen ions (H+) when it is

Base-A compound that increases the hydroxide ions (OH−) when it is  dissolved in a solution

Ions- An atom or molecule that has a positive or negative charge

pH-A value from 0 to 14 that is used to specify how acidic or basic a  compound is when it is dissolved in water

Explanation:

plz give brainly

What is the first thing to consider when designing a website?

Answers

Answer:

name, theme, what your doing with it

What software you will use for example,how much your willing to spend on your website will affect your software which means the cheaper the software the slower,laggy the website will be

A corporation is looking to receive approval from its shareholders. The corporation needs to communicate financial information and the mission statement among other information. The corporation should _____.
A. Create a newsletter
B. Write a resume.
C. Create a type of business report called an annual report.
D. Write a business letter

Answers

Answer:

C

Explanation:

create a type of business report called an annual report

When working from within the Settings app, some applications include an Advanced options link. Selecting this link allows you to view more details about the application as well as giving you the ability to perform which of the following tasks?
i. Setting the default app
ii. Terminating the app
iii. Resetting the app
iv. Uninstalling the app
v. all these can be done

Answers

Answer:

v. All these can be done

Explanation:

Found in a book

There are many things that can be done in the settings app.

Hope this helps! :)

Microsoft® Access® manages which the following types of files? Question 3 options: Presentations Databases Images Texts.

Answers

Microsoft® Access® manages B. databases.

What does Microsoft® Access® do ?

It is a relational database management system (RDBMS) that allows users to store and manage large amounts of data in an organized manner. Users can create tables to store data, relationships between tables to ensure data consistency, forms to enter and view data, queries to retrieve specific data, and reports to present data in a formatted manner.

Microsoft Access is commonly used in small to medium-sized businesses and can handle a wide range of data types, including text, numbers, dates, images, and more.

Find out more on Microsoft Access at https://brainly.com/question/24643423

#SPJ1

most people on scratch are under 18 true or false? scratch coding

Answers

The answer is Yeah probably

Answer:

False

Explanation:

The Scratch Team has to be at least 18+ years to join. So this is false

The process of converting incoming physical energy into a neural code that can be processed is called

Answers

Transduction is known to be the process of converting incoming energy into neural activity.

What is transduction?

Transduction is known to be an act that connote when  a virus is said to move genetic items from one bacterium to another.

The steps in cell signaling process are:

ReceptionTransductionResponse

Note that in Transduction, incoming energy is changed into neural activity.

Learn more about transduction from

https://brainly.com/question/7178782

what is the difference page break and column break ​

Answers

A page break starts a new page. A column break starts a new column, while a section break indicates a change in formatting within the same page.

Answer:

A column break forces text to the top of the next column; a page break forces text to the top

of the next page.

What development in operating systems happened between the years 1990 and 2000?

Developers stopped creating GUIs.

Konrad Zeuse developed the Z1 computer.

Batch processing was used for the first time.

The Linux operating system was released.

Answers

Answer:

The Linux operating system was released is the correct answer.

Explanation:

Answer:

The Linux operating system was released.

Explanation:

Took the test

Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 131. 107. 256. 80 222. 222. 255. 222 0. 127. 4. 100 190. 7. 2. 0 127. 1. 1. 1 198. 121. 254. 255 255. 255. 255. 255

Answers

The portion of the IP address that would be invalid if it were assigned to a host are:

0. 127. 1. 1.255 255. 255. 255. 255.

What is an IP address?

An IP address is the abbreviation for internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer or other network devices, so as to successfully differentiate them from one another in an active network system.

In Computer networking, the internet protocol (IP) address comprises two (2) main versions and these include;

Internet protocol version 4 (IPv4).Internet protocol version 6 (IPv6).

In this scenario, the portion of the IP address that would be invalid if it were assigned to a host are:

0. 127. 1. 1.255 255. 255. 255. 255.

In conclusion, the host portion of a valid IP address must not have all of its unique numbers as ones (1s) or zeros (0s).

Read more on IP address here: https://brainly.com/question/24812743

The project team identified the completion of the first module to be the first significant event. The completion of Module One is a _____.


requirement

risk

stakeholders

milestone

Answers

The completion of module one is a milestone

Writing an UPDATE SQL statement is an example of a user engaging in the direct use of data warehouse. True False

Answers

Writing an UPDATE SQL statement is an example of a user engaging in the direct use of data warehouse is a true statement.

What does update SQL means?

The UPDATE statement is known to be a kind of statement that is used to make changes to an existing records found in a table.

A data warehouse is known to be a form of an electronic system that is used for saving information in a way that is secure and making changes to the records in a data warehouse by Writing an UPDATE SQL statement is a part of its process.

Learn more about SQL from

https://brainly.com/question/25694408

The computer on the internet that operates like the traditional post office is called

Answers

Answer:

Email is a form of communication that acts as a traditional post office in a virtual sense

In python write a program that reads numbers and adds them to a list if they aren't already contained in the list. When the list contains ten numbers, the program displays the content and quits.

Answers

The program that reads numbers and adds them to a list if they aren't already contained in the list is as follows;

aList = []

while len(aList) != 10:

    n = int(input("Enter the value: "))

    if not n in aList:

         aList.append(n)

print(aList)

Code explanation;

The code is written in python.

We declared a variable "aList" with an empty list .We used the while loop to make sure the loop continue if the length of the aList list is equals to 10.Then we input our number continuously until the list is up to ten.If our input is not in the list , it will append it to our declared "aList".Finally, we print out the aList.

learn more on python here: https://brainly.com/question/27075682

Computer keys typing, ac unit humming, coughing, whispering, dogs barking, etc. These are examples of "music" that could be heard as part of which composition?.

Answers

The aforementioned are examples of "music" that could be heard as part of a 4'33" composition.

What is a symphony?

A symphony can be defined as an elaborate long piece of musical composition for an orchestra, which is usually in three or more movements (parts).

This ultimately implies that, a symphony is a lengthy form of musical composition which is primarily written to be performed by a full orchestra.

In this context, a 4'33" composition is a type of musical composition that uses a three-movement composition and it was created in 1952 by John Cage. Some examples of a 4'33" composition are:

Computer keys typingAc unit hummingCoughingWhisperingDogs barking

Read more on symphony here: https://brainly.com/question/1151350

A ________ is a malicious piece of self-replicating code embedded within another program/computer called the host. (Hint: one word)

Answers

Answer:

A self-contained program that spreads through a computer network by exploiting security holes is called a worm A program with a benign capability that conceals another, sinister purpose is called a trojan horse

Explanation:

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity

Answers

Answer:

Firewall

Explanation:

Firewall software monitors all the network traffic going in and out of your device. If there is a suspicious website, then the Firewall Software blocks it, otherwise known to be added to the whitelist.

When populating a motherboard with dimm modules, what configuration option will not work?.

Answers

Answer: mixing unbuffered with registered

Answer: Mixing unbuffered with registered

Explanation:

Income
Name
Popular
YES/NO
Production Worldwide
Budget(s) Income(5)
Profit
Tax
138.00
150.00
125.00
Spider Man
4 Ben Ten
5 The Avengers
Black Panther
120.00
450.00
400.00
200.00
247.00
7 Bat Man
91.00
100.00
• Doctor Strange
315.00
378.00
Jiron Man 3
200.00
248.00
50.00
100.00
49.00
113.00
10 Mr Maker
* Elmo
142.00
152.00
12 Ant Man
140.00
176.00
1) Thor

Answers

Answer:

what-

Explanation:

I need help, please!

Select the three areas in which it would be most important for an instructional designer to be trained.


1. sales and marketing


2. business management


3. psychology


4. computer applications


5. educational theory

Answers

Answer:

business management

educational theory

sales and marketing

Explanation:

3 answers

The three areas in which it would be most important for an instructional designer to be trained may include sales and marketing, business management, and educational theory.

What are the roles of instructional designers?

The roles of an instructional designer may be determined by the fact that they are paramount in the process of learning. They are tasked with redesigning courses, developing entire courses or curriculums, and creating training materials, such as teaching manuals and student guides.

In the above three mentioned fields, instructional designer gains an advantage over other professionals because it is the constructor of the field who manages how to work effectively and accordingly to the conditions. It encompasses creativity, communication skills, etc.

Therefore, the three areas in which it would be most important for an instructional designer to be trained may include sales and marketing, business management, and educational theory.

To learn more about Instructional designers, refer to the link:

https://brainly.com/question/30034454

#SPJ2

Which html tag designates links to other web pages?.

Answers

Answer:

<a href>

Explanation:

I found the answer on a Quizlet.

I hope this helps!

Which of the following is NOT correct concerning database design? Question 2 options: Identify all fields needed to produce the required information Group related fields into tables Determine each table's primary key Organize each piece of data into its largest useful part.

Answers

The option which is not correct concerning database design is identify all fields needed to produce the required information.

What is database design?

The database design is the arrangement of the data or the information, according to the model of database.

Let's check all the option one by one,

Identify all fields needed to produce the required information- This does not concern with the database design.Group related fields into tables-A relation database design consist of one or more than one related table. These tables are used together when the information is required.Determine each table's primary key- To determine the table's primary key, is the concern with the database design.Organize each piece of data into its largest useful part-The database design is the organization of data in the model of database.

The option which is not correct concerning database design is identify all fields needed to produce the required information.

Learn more about the database design here;

https://brainly.com/question/25694408

why do pepole get there question answered in 5 munities but for me its 7 FREAKING DAYS!?

question: https://brainly.com/question/26929057

Answers

I’m honestly having the same problem my homework is due tomorrow and like no one is able to answer it,the answer is always wrong it’s due to the algorithm

At Yolanda's company, employees have some choice about the benefits they receive, up to a certain dollar amount. Since Yolanda has young children, she opts for childcare benefits, while her coworker prefers an extended wellness program with a health club membership. This is an example of __________ fringe benefits.

Answers

The above scenario is an example of cafeteria-style fringe benefits.

What is cafeteria-style fringe benefits?

Cafeteria plan is known to be a type of fringe benefits that includes taxable gains such as cash and stock.

Note that the non-taxable benefits are said to be composed of health insurance, vacation days, etc. Yolanda's company is said to use cafeteria-style fringe benefits.

Learn more about fringe benefits from

https://brainly.com/question/1380397

. George wrote a blog about playing baseball using a password-protected site. On his blog, George described his little league team and their season. He gave detailed descriptions of the location of each game and the full names and photographs of all the players on the team, including himself.

Which of the following risky blogging behaviors did George engage in? Check all that apply. (2 points)
He used a password-protected site.
He gave detailed information about the location of his little league games.
He posted pictures of himself and his teammates online.
He wrote on the topic of baseball.

Answers

Answer:

2 and 3.

Explanation:

They are both giving private information. The first one is good, there is no security risk in a website being password protected, actually quite the opposite. And writing on the topic of baseball has nothing to do with him specifically and gives no personal information.

Other Questions
A cone has surface area 360 in^2 and volume 800 in^3. the cone is dilated, and the surface area of the dilated cone is 2,250 in^2. what is the dilated cone's volume? asap! please my mom is trying to hurt me im locked in my closet! my dads home!!!!!!!!they're trying to make me eat something called mellotonin while my mom is sniffing sugar in the livingroom!!!! It is known that 10% of the 9-year old children in a town have three siblings. Fifteen 9-year old children are selected at random. Find the probability that more than 3 of these selected children have three siblings (round off to second decimal place). While riding her bike to the ocean and back home 7 times, Michelle timed herself at 54 min, 55 min 50 min, 48 min 42 min, 50 min, and 61 min. She had set a goal of averaging 51 minutes for her rides. How many minutes will she need to spend on her eighth ride to attain her goal? Which statement describes the MOST important way Savannah provides goods to the citizens of Georgia?Hartsfield-Jackson Airport is located in Savannah.BSavannah's deepwater port is a major automobile distribution center.Savannah's railroads connect to the major cities along the East Coast.DThe Interstate Highway System connects Savannah to major cities in Georgia Germanic law at the time of the great migrations was often designed to limit the exercise of vengeance.TrueFalse Romeo and Juliet Question (30 points) (ignore the selected At what point in the pregnancy is the fetus brain fully developed?. a person stretches a spring apart in their figures and holds it there, not moving this is an exmple of? A.Potential energy turning into kinetic energy B. Someone creating energyC. Someone destroying energy D. Kinetic energy turning into potential energy A cylinder has a height of 23m and a volume of 18488m^3 what is the radius of the cylinder. Round your answer to the nearest whole number Carrie buys 7/8 pound of red apples and 15/16 pound of green apples.Which answer is the most accurate estimate for how many more pounds of green apples she buys than pounds of red apples?0 pounds12 pound1 pound Select all that apply.How are subordinate clauses and prepositional phrases similar?[ ] both can be used as adjectives and adverbs[ ] neither depends on any other sentence element[ ] both are independent[ ] neither can stand by itself a rectangular tub has a perimeter of 16 feet. if the length of the tub is 6 feet, what is the width of the tub? "Poverty as structure" argues that: a. Poverty is caused by temporary weakness in the economy, by which people are often caught in the "wrong place at the wrong time" b. None of the other answers c. Poverty is caused by the ordinary functioning of capitalism, whereby companies seek to maximize their profits by paying workers as little as they can. d. Poverty is caused by individuals' character flaws and problematic behaviors What two days combined to become Da de los Muertos? What is the BEST definition of scheduling?Allowing sufficient time to accomplish tasks.Buckling down and doing what you have to do.Listing all the tasks that require your attention.Setting aside specific times for the tasks you need to accomplish 9) A store is selling t-shirts for $8each. If Britt buys 15 shirts howmuch will she pay for them? ? Use a difference identity to find the exact value of tan 15. Heather is 5 feet 7 inches tall. There areapproximately 2.5 cm in one inch. What isHeather's height in centimeters? At which hour was the bacteria's population growing the fastest in the interactive? Question 3 options: 0-4 4-8 8-12 12-14 14-18. pls answer this question