Reports produced by the United Nations are considered
O relevant sources, -A
O irrelevant sources. -B
O biased sources. -C
O disputed sources. -D

Answers

Answer 1

Answer:

The correct answer is Option A: "Relevant Sources"

Explanation:

Relevant sources are the reports and information regarding a specific field, profession or an area of study. The reports generated by United Nations are usually related to a specific subject or area of study i.e. report on security etc.

Hence,

The correct answer is Option A: "Relevant Sources"

Answer 2

Answer: relevant sources

Explanation:


Related Questions

network connections can be tested using an

Answers

Answer:

Electronic device

Explanation:

If the electronic device can pick up the signal and be able to use it, then it would work.

essay about no Lights​

Answers

You should take a picture of the answer

Asher wants to replace the word commission with a synonym. Which group in the Review tab would help him most?
Accessibility
Insights
Proofing
Comments

Answers

Answer: proofing

Explanation:

Answer:

Its c proofing

Explanation:

Just did the assignment

Doctors at a regional hospital access an online database of patient records that is being developed and tested by a conglomerate of health insurance agencies. The database contains records of hundreds of thousands of patients and is regulated by HIPAA restrictions on protected health information (PHI). What kind of cloud deployment is this database?

Answers

Answer:

This seems to be DBaaS, in other words, Database, implementation mostly as a service cloud. A further explanation is given below.

Explanation:

DBaaS seems to be a framework for cloud storage that enable participants to choose a standard collection of abstractions to provide, maintain, consume, customize, as well as run databases. Everything just allows consumers with either a treatment process that leads to a database but without specific system configuration, software installation, or performance configuration. Doctors didn't require any database built on certain machines in this situation, because of being able to view every data electronically. Doctors would not have to do database management here since the phone company will require control of it. Accessing the documents what they'd have to do. Any further rights can be obtained through proper permits, such as data upgrading respectively.

Difference between 2nd and 3rd generation of computer

Answers

Answer: It is between 1 generation.

Explanation: It's self explanatory. Since it's 2nd gen to 3rd gen, it's the same device but more newer and has more features than the last one. Think of it as the iPhone SE (2016) compared to the iPhone SE (2020)

is third wave of globalization theoretical discourse

Answers

Answer:

yes..,....................................

Explanation:

...

OneDrive allows you to let other people edit your work by __________ your document and setting the permissions to "recipients __________."

A. sending, can view
B. sending, can edit
C. sharing, can edit
D. sharing, can view
PLS HELP

Answers

i’m pretty sure it’s C

Answer:

c

Explanation:

i did the final exam

When designing a basic network, which of the following are factors to consider?
A. Ease of use
B. List of requirements
C. Equipment limitations
D. Cost of installation

Answers

The question answer is NUMBER B

Assume we want to sort integers into ascending order. To sort a small array that contains 42, 17, selection sort will perform one swap, or three assignments. How many assignments will it perform to sort an array that contains these 10 elements: 9, 8, 7, 6, 5, 4, 3, 2, 1, 0?
a) 15
b) 18
c) 24
d) 27
e) 63

Answers

Answer:

a) 15

Explanation:

Since we are given a list that contains 10  elements [tex][ 9, 8, 7, 6, 5, 4, 3, 2, 1, 0][/tex]

To start with the first iteration:

We substitute element 9 with the least number in the list. In the list 0 is the least number, so by swapping it with 9 we have the list as:

[tex][ 0, 8, 7, 6, 5, 4, 3, 2, 1, 9][/tex]

For the second iteration:

we substitute element 8 with the minimum number in the list, Now the minimum number is 1, so by swapping it with 8 we have the list as:

[tex][ 0, 1, 7, 6, 5, 4, 3, 2, 8, 9][/tex]

For the third iteration:

we substitute element 7 with the minimum number in the list, Now the minimum number is 2, so by swapping it with 7 we have the list as:

[tex][ 0, 1, 2, 6, 5, 4, 3, 7, 8, 9][/tex]

For the fourth iteration:

we substitute element 6 with the minimum number in the list, Now the minimum number is 3, so by swapping it with 6 we have the list as:

[tex][ 0, 1, 2, 3, 5, 4, 6, 7, 8, 9][/tex]

For the fifth iteration:

we substitute element 5 with the minimum number in the list, Now the minimum number is 4, so by swapping it with 5 we have the list as:

[tex][ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9][/tex]

At this point, the array is completely sorted and there is no more room for swapping

Thus, the number of swaps required = 5

The no. of assignment required = 3 × 5

The no. of assignment required = 15

The number of assignments to sort the array of 10 elements is 15

How to determine the number of assignments?

A swap operation involves 2 elements, and 3 assignments.

So, the number of assignments is calculated as:

n = Elements/2 * 3

There are 10 elements in the array.

So, we have:

n = 10/2 * 3

Evaluate the product

n = 15

Hence, the number of assignments to sort the array is 15

Read more about sorting techniques at:

https://brainly.com/question/15049854

Write a general-purpose program with loop and indexed addressing that adds 12h to 0th, 3rd , 7th , 11th ,15th ,19th , … elements of a DWORD array. For example, in array:

Answers

Answer:

def ishex(mylist):

   hnum = 0x12

   for index, item in enumerate(mylist):

       if int(str(item), 16):

           if index == 0:

               print(hex(item + hnum))

           elif item in mylist[3::4]:

               print(hex(item + hnum))

           else:

               print(hex(item))

Dword = [0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f]

ishex(Dword)

Explanation:

The python source code defines a function called "ishex" which takes a list as its parameter, loops through its index and value, checks if it is a hexadecimal number and adds 0x12 to every fourth index value of the list "Dword".

What term is used to describe our connection with eachother through technology

Answers

Technology literacy refers to a familiarity with digital information and devices, increasingly essential in a modern learning environment.

The cameras optical viewfinder is like a _ in which to compose your image

Answers

Answer:

Periscope

Explanation:

Optical viewfinders use a system of mirrors and prisms like a periscope. These mirrors bounce the image up to the viewfinder and can then be viewed by the eye.

The camera's optical viewfinder is like a periscope in which to compose your image.

What is a periscope?

You can see around walls, corners, and other obstructions using a periscope. Periscopes are installed on submarines so that the occupants can see what is happening above the water. A good illustration of the law of reflection in action is a periscope.

Similar to a periscope, optical viewfinders work with a system of mirrors and prisms. These mirrors allow the image to be reflected up to the viewfinder, where it may be seen with the eye.

However, Periscope had already ceased allowing new users to sign up by that point. Six years after it was first made available to the public, Periscope was finally discontinued. Users can still access their old broadcasts by visiting the Periscope website and logging onto their accounts.

Therefore, to compose your shot, use the optical viewfinder of the camera, which functions like a periscope.

To learn more about periscope, refer to the link:

https://brainly.com/question/10967507

#SPJ2

Which of the following activities poses the greatest personal cybersecurity risk?

Answers

Answer:

a

Explanation:

edge

Answer:

The answer Choices where

A)Making a purchase at an online store that uses public key encryption to transmit credit card information.

B) Paying a bill using a secure electronic payment system.

C)Reserving a hotel room by emailing credit card information to the hotel.

D)Withdrawing money from a bank using an automated teller machine.

Explanation:

By emailing the credit card information, that person has access to using the credit card in many different ways that are harmful. It would be best to meet up with them and scan it or pay via paypal or other money services.

What is the first phone ever made?

Answers

Answer:

the Telephone

Explanation:

Before the invention of electromagnetic telephones, mechanical acoustic devices existed for transmitting speech and music over a greater distance greater than that of normal direct speech. The earliest mechanical telephones were based on sound transmission through pipes or other physical media.The acoustic tin can telephone, or "lovers' phone", has been known for centuries. It connects two diaphragms with a taut string or wire, which transmits sound by mechanical vibrations from one to the other along the wire (and not by a modulated electric current). The classic example is the children's toy made by connecting the bottoms of two paper cups, metal cans, or plastic bottles with tautly held string.Some of the earliest known experiments were conducted by the British physicist and polymath Robert Hooke from 1664 to 1685. An acoustic string phone made in 1667 is attributed to him.For a few years in the late 1800s, acoustic telephones were marketed commercially as a competitor to the electrical telephone. When the Bell telephone patents expired and many new telephone manufacturers began competing, acoustic telephone makers quickly went out of business. Their maximum range was very limited. An example of one such company was the Pulsion Telephone Supply Company created by Lemuel Mellett in Massachusetts, which designed its version in 1888 and deployed it on railroad right-of-ways.Additionally, speaking tubes have long been common, especially within buildings and aboard ships, and they are still in use today. The telephone emerged from the making and successive improvements of the electrical telegraph. In 1804, Spanish polymath and scientist Francisco Salva Campillo constructed an electrochemical telegraph.The first working telegraph was built by the English inventor Francis Ronalds in 1816 and used static electricity. An electromagnetic telegraph was created by Baron Schilling in 1832. Carl Friedrich Gauss and Wilhelm Weber built another electromagnetic telegraph in 1833 in Göttingen.At the University of Gottingen, the two have been working together in the field of magnetism. They built the first telegraph to connect the observatory and the Institute of physics, which was able to send eight words per minute.

In an array-based implementation of a dictionary, if you represent the entries as an array of objects that encapsulate each search key and corresponding value, how many pointers will you use per array entry?

a. 3
b. 4
c. 2
d. 1

Answers

Answer:

The answer is "Option C".

Explanation:

Dictionary is a set of unsorted data values, that is used to save data like a map and which contains a key: value pair in comparison to many other types of data, which only carry a specific number as just an element.

If we use Dictionary as an array so, it uses a two-pointer variable, one for hold key, and the second is used to hold its value.

Which of the following Power BI tools is best suited for editing data before import?

Answers

Answer:

Power Pivot Bi tool

Explanation:

The Power Pivot Bi (Business intelligence) tool is best suited for editing data before importing becomes it is designed with this unique feature.

For example, the Power Pivot tool has a dedicated page where a user can "Choose How to Import the Data," in other words, they can filter/edit the unneeded data before importing it for analysis.

Power BI tools that is best suited for editing data  is the Power Query Editor.

What is Power Query Editor?

The Power Query Editor is known to be a kind of primary data preparation show, that entails when a person can link up to a wide range of data sources.

Here with this tool, one can apply hundreds of different kinds of data transformations by looking first at data and note that the Power BI tools that is suitable for editing data is the Power Query Editor as it does the work well.

See options below

a. PivotTables

b. 3D Maps (Power Map)

c. Power Pivot

d. Power Query Editor

Learn more  Power Query Editor from

https://brainly.com/question/19509903

What is one major structural difference between a decision structure (such as a decoder) and a storage structure (such as an RS latch)?A. The storage structure requires a different class of gates.B. The storage structure requires a clock input.C. The storage structure uses feedback. D. The storage structure has no propagation delay.

Answers

Answer:

B. The storage structure requires a clock input.

Explanation:

Logic circuits are circuits in electronics that give output based on the logic gate principle and its inputs. It can be a sequential logic circuit or a combinational logic circuit.

Decoders RS latches are combinational logic circuits because they both comprise of a combination of several sequential circuits to make their systems. The difference between decoders and RS latches is that the RS is a storage structure which is made up of flip-flops which require a clock input

Write a SELECT statement that returns the same result set as this SELECT statement. Substitute a subquery in a WHERE clause for the inner join.SELECT DISTINCT VendorNameFROM Vendors JOIN Invoices ON Vendors.VendorID = Invoices.VendorIDORDER BY VendorNameInsert one screen capture here that shows a single query with result that meets all of the above requirements.

Answers

Answer:

SELECT DISTINCT VendorName FROM Vendors

WHERE VendorName= ANY (SELECT VendorName FROM Vendors JOIN Invoices ON Vendors.VendorID = Invoices.VendorID) ORDER BY VendorName;

Explanation:

All bold faced words are sql keywords for different purposes. The subquery return the all values which matches the join condition  and main query will choose only distinct values and make them in order of VendorName.

There many other queries also return the same result as returned by given query.

Who still plays old Nintendo 64 games?

Answers

Answer:

I play Nintendo 64 games when I was young. I use to love playing Mario 64 as well.

Answer:

Explanation: i kinda but not that much i havent played in a long time

The table below describes the planting method used for some vegetables. Which field in this table can you define as the primary key?
Sr. No.
Name
Planting method
Planting time

Answers

Answer:

The vegetables should be named by it's specific name and it's planting method should be written down as well as the time it was planted. The Sr. No. should be there so the person can tell the difference between each plant.

Explanation:

The answer is NOT PLANTING TIME or NAME if that helps.

Match the memory type with its function.

Answers

Answer:

It’s connector has 288 pins and has advanced error correction features –> DDR4 SDRAM

It’s connector has 184 pins and is able to support two writes and two reads per CPU clock cycle. –> DDR SDRAM

It’s connector has 240 pins and consumes 1.5 Volts of power. –> DDR3 SDRAM

It’s connector has 240 pins and consumes 1.8 Volts of power. –> DDR2 SDRAM

Explanation: hope this helps a little bit

Answer:

Look at the image

Explanation:

in two to four sentences explain the difference between the save and save as command ​

I need the answer please..

Answers

Save takes your open document and writes over the last file with same name the last time it was saved.

Save as: allows you to save the file as a different name, to another folder\path etc:

C:\document\historyessay.doc

C:\document\historyessayr2.doc. Would be the same essay but a 2nd revision from original
For example

Consider a processor with a 2 ns clock cycle, a miss penalty of 20 clock cycles, a miss rate of 0.05 misses per instruction, and a cache access time (hit time) of 1 clock cycle. Assume that the read and write miss penalties are the same.

a. Find the average memory access time (AMAT).
b. Suppose we can improve the miss rate to 0.03 misses per instruction by doubling the cache size. However, this causes the cache access time to increase to 1.2 cycles. Using the AMAT as a metric, determine if this is a good trade-off.
c. If the cache access time determines the processor’s clock cycle time, which is often the case, AMAT may not correctly indicate whether one cache organization is better than another. If the processor’s clock cycle time must be changed to match that of a cache, is this a good tradeoff?

Assume that the processors in part (a) and (b) are identical, except for the clock rate and the cache miss rate. Assume 1.5 references per instruction (for both I-cache and D-cache) and a CPI without cache misses of 2. The miss penalty is 20 cycles for both processors.

Answers

Answer:

a) 4 ns

b) 3.6 ns

Explanation:

Given that

Miss penalty = 20 * 2

Miss rate = 0.05

Clock cycle = 2 ns

Hit time = 1 * 2

The Average Memory Access Time or AMAT is found by using this formula

AMAT = Hit time + Miss rate × Miss penalty

Substituting directly for the values, we get

AMAT = 2 + [0.05 * (20 * 2 ns)]

AMAT = 2 + (0.05 * 40)

AMAT = 2 + 2

AMAT = 4 ns

b) given that

Miss rate = 0.03

Hit time = 1.2 * 2

Miss penalty remains the same = 40

AMAT = (1.2 * 2) ns + [0.03 * 40] ns

AMAT = 2.4 ns + 1.2 ns

AMAT = 3.6 ns

Considering that the AMAT is 3.6, we can say that it is a good trade-off.

c) CPU time = Clock cycle * IC * (CPIideal-cache + cache stall cycles per instruction)

CPU time

(a) = 2 ns * IC * (2 + 1.5 * 20 * 0.05) =

CPU time = 2 * IC * (2 + 1.5)

CPU time = 2 * IC * 3.5

CPU time = 7 * IC

(b)

CPU time = 2.4 ns * IC * (2 + 1.5 * 20 * 0.03)

CPU time = 2.4 * IC * (2 + 0.9)

CPU time = 2.4 * IC * 2.9

CPU time = 6.96 * IC

The CPU times we calculated in parts (a) and (b) are nearly the same. Thus, we can conclude that, doubling the cache size to improve the miss rate at the expense of stretching the clock cycle results in virtually no net gain.

Which of the following storage devices are portable? Check all of the boxes that apply.

internal hard drive
external hard drive
flash drive
CD and DVD

Answers

Answer:

Flash Drive, External Hard Drive, and a CD and DVD.

thank god whoever made these questions didn't ask you about a floppy

Answer:

The portable devices are:

External Hard Drive

Flash Drive

CD and DVD

Explanation:

Portable devices are those devices that can be moved with ease from one place to another.

Let us look at the devices one by one

Internal Hard Drive

As internal hard drive is fixed inside the system unit of the computer it cannot be moved easily. So internal hard drive is not portable.

External hard drive, Flash drive, CD and DVD are portable as they are not fixed and are compact in size so they can be moved easily.

Hence,

The portable devices are:

External Hard Drive

Flash Drive

CD and DVD

Which software application should be used when preparing a budget?

Email
Presentation
Spreadsheet
Word processing

Answers

Answer:

i would say presentation

Explanation:

I would say spreadsheet or Email most likely Spreadsheet

You have a host device with an assigned IP address of 192.168.15.100 and a subnet mask of 255.255.255.192. To what network does this IP address belong

Answers

The options are missing from the question.

Below are the options.

A) 192.168.15.0

B) 192.168.15.16

C) 192.168.15.32

D) 192.168.15.64

Answer: The correct option to the question is option D

192.168.15.64

Explanation:

The Network is: 192.168.15.64/26 11000000.10101000.00001111.01000000

Then the Broadcast is: 192.168.15.127 11000000.10101000.00001111.01111111

We see the HostMin as: 192.168.15.65 11000000.10101000.00001111.01000001

And the HostMax as: 192.168.15.126 11000000.10101000.00001111.01111110

What is a hash function? A. A function that computes the location of the values in the array B. A function has allocated memory to keysC. A function that create an arrayD. None of these

Answers

Answer:

A hash function is a function which when given a key, generates an address in the table. The example of a hash function is a book call number. Each book in the library has a unique call number. ... The later is always possible only if you know (or approximate) the number of objects to be proccessed.

Explanation:

A

A hash function is a function that computes the location of the values in the array which means it would be A.

News sites includes websites that encourage interaction and connection among people, businesses, and organizations.

Answers

Answer:

(A) News sites (B) Search engines (C) Social media (D) Apps

Explanation:

if its one of these three its B

The elements in a dictionary are not stored in a specific order. Therefore, a dictionary is not a(n) ________.

Answers

Answer:

Sequence.

Explanation:

The elements in a dictionary are not stored in a specific order. Therefore, a dictionary is not a sequence.

This ultimately implies that, the elements present in a dictionary are not organized or sorted.

How can a user begin working with a new, blank workbook in Excel?
in the Home tab, select Insert and then select Insert Sheet
in the Insert tab, select Table and then insert a data location
in the Review tab, select Share Workbook and then select a file
in the File tab, select New and then select Blank Workbook

Answers

Answer: Under Available Templates, double-click Blank Workbook. Keyboard shortcut To quickly create a new, blank workbook, you can also press CTRL+N.

Explanation: yes

Answer:

I can't tell if you're asking us a question or explaining the answer to us

Explanation:

Other Questions
What do stem cells do The power of if worksheet Rocky has 2 1/4 cups of flour in her pantry. If she needs 1 /2 cups to make a batch of cupcakes, how many batches will she be able to make? Practice What is the slope of the line?63 +10y = 8 Plz answer asap I need an answer i will mark brainiest. Please HelpThis is the topic Reflections in Geometry. I just need the name of the reflection used for 9 - 14 and the coordinates for 15 - 18 ...Thank you The functions of management can be performed best when a firm's ________ and culture are integrated.A) financesB) business modelC) profitsD) external environmentE) strategy A thesis sentence can be introduced anwhere within an essay.TrueFalse EXCERPT FROM 'A CHRISTMAS CAROL': MARLEY'S GHOSTScrooge is visited bya)his nephew who comes to implore Scrooge to be more festive.b)the two men who visited his office earlier.c)the spirit of a man whom he cannot recognize.d)the ghost of his old business partner, Jacob Marley. Please select the word from the list that best fits the definition:Is presented in alphabetical orderA. Table of contentsB. GlossaryC.PrefaceD. Title pageE. Appendix Can someone explain and answer this please? Which revolution was first, American or French? graph the line -1 passing through the point (-4,5) Mark's soup recipe makes 6 servings and uses 4 carrots and 2 potatoes.Drag carrots and potatoes into the box to show how many Mark needs for 15 servings The expression is given in srandard form. Rewrite it in factored form . If it cannit be written in factored form , write cannot be done p^2+18p-40 PLEASE HELP!!! 18 points Write the SQL query that would search a table called Movies and return the titlesof movies that were made in 1975. There are 8 fewer than double thenumber of students in the chorus than inthe band. There are 54 members in thechorus. Which equation represents howto find the number of students in theband?A. 2x - 8= 54B. 2x + 8 = 54C. 8x - 2 = 54D. 8x + 2 = 54 A car and a computer are examples of what? Compare and contrast the book and movie in the scene when pony boy meets cherry Don't have a clue on how to do this one.