(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?

Answers

Answer 1

Answer:

a trade mark is something where someone owns the rights to something in a specific country


Related Questions

No links it’s just a normal question about iPhones.
If you have someone in your contacts you talk with a lot but like everyday you delete the conversation multiple times will you stop receiving texts from that person even if you text them and it says delivered?

Answers

Answer:

You will still get the messages. You are just deleting the messages from YOUR device not the other persons, in order to stop recieving messages from the person you block them. In order to stop receving notifications, you put them on DND. But, if you talk to them everyday I would assume you would not want to stop receiving messages from them.

Select the correct answer from each drop-down menu.
Complete the following sentences.

_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.

Options for the first box are: managers, A teams, an individuals

Options for the second box are:internal, specific, external

Answers

Answer:

First, A teams, Second ,Specific

Explanation:

You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5

Answers

Answer:

Explanation:

The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int[] person = new int[5];

       System.out.println("Enter age of individual 1: ");

       person[0] = in.nextInt();

       System.out.println("Enter age of individual 2: ");

       person[1] = in.nextInt();

       System.out.println("Enter age of individual 3: ");

       person[2] = in.nextInt();

       System.out.println("Enter age of individual 4: ");

       person[3] = in.nextInt();

       System.out.println("Enter age of individual 5: ");

       person[4] = in.nextInt();

       int youngest = person[0];

       for (int x = 0; x < person.length; x++) {

           if (person[x] < youngest) {

               youngest = person[x];

           }

       }

       double discount = 1 - (((double)youngest) / 100);

       double output = 50 * discount;

       System.out.println("Total Price: " + output + " the youngest is " + youngest);

   }

}

write examples of hacking in internet?​

Answers

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

Consider the classes below: Which of the following statements is true? Group of answer choices The value of counter will be different at the end of each for loop for each class. The value of j will be the same for each loop for all iterations. Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true. Neither The value of counter will be different at the end of each for loop for each class nor The value of j will be the same for each loop for all iterations is true.

Answers

Answer:

probly

Explanation:

Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true.


What requirements are necessary in order for you to share a file?
Check all that apply.
You own it.
You commented on it.
You can edit.
You know about the topic of the document.

Answers

Answer:

I. You own it.

II. You can edit.

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.

The requirements which are necessary in order for you to share a file are;

I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.

II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.

Other Questions
Most people seem to have a preference for either cats or dogs. In my opinion, dogs are a lot more fun to own. Dogs are interested in what their owners do, _____cats that mostly ignore their owners, except when it is dinnertime! Dogs love going to the park, on a hike, or even camping. Cats prefer to lounge around at home.which word or phrase would be best to fill in the blank. A) as opposed toB) as well asC) includingD) resulting from________________________________ no links pls ABC Company rents its extra office space to XYZ Company for $600 per month. On November 1, 2020, ABC Company received $3,600 rent in advance from XYZ Company for the months of November 2020, December 2020, January 2021, February 2021, March 2021, and April 2021. The adjusting entry on December 31, 2020 (the end of the fiscal year) would include: a) My teacher wouldn't let me leave early.My teacher refused...telet.me.eare.carly......b) Jill sang without stopping for an hour.Jill continued .......c) Apparently you have passed the exam.It seems ........d) Richard thinks he is going to do well.Richard expects ........*e) What are your plans for the summer?What do you intend ..............f) Clearing up my room is something I dislike!I hate ........g) Helen said she'd go to the cinema with me.Helen agreed ........h) Tina and Brian are getting married.Tina and Brian have decidedi) See you later, I hope.I hope ............j) What do you fancy doing this evening?What do you want A community organization wants to determine area support for the construction of a new skate park in the center of town. The organization decides to survey 500 people to see whether they are willing to have their taxes increased for one year to fund the construction of the skate park. What is the best way to randomly choose these 500 people? O Select the first 500 taxpayers listed at the town hall. O Survey the first 500 people who visit the existing skate park. O Assign each taxpayer in town a number and then randomly select 500 of these numbers. O Choose 100 taxpayers from 5 different age groups in town. PLEASE HELP!!!! Energy can enter and exit which of the following systems?A. Both open and close B. Both open and isolated C. Open Only C. Isolated only Discuss why you think it is important as a teenager to maintain a healthy level of self esteem? Identify factors that have had either a positive or negative influence on your personal self-esteem. A(n)strategy determines the direction the organization will take in making directional decisions.A. businessOB. organizationalC. operationalOD. corporate What is missing from the graph?HELP I WILL GIVE BRAINIEST Choose all of the items that correctly describe John D. Rockefeller. A) steel industry B) Standard Oil Company C) controlled 90% of his industry by the late 1800s D) was able to prevent his monopoly from being broken into pieces E) guaranteed his workers high wages in order to keep his product of a high quality What is the average rate of change of f(x)=x2+x6 between x=1 and x=3 ?A 5B 5C 15D 10 Use the diagram to answer the question.35.6 m23.4 m15.2 m23.4 mWhat is the area of the triangle?OA. 82.40 mB. 97 60 m2 Compound Interest: You deposit $100 in an account that earns 3% annual interest compounded continuously. How long does it take the balance to reach the following amounts? (A = Pe^(rt). NO LINKSa. $110b. $150c. $200 Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value with no sign. For example, the absolute value of -5 is 5, and the absolute value of 2 is 2. Test the template in a simple driver program being sure to send the template short, int, double, float, and long data values. Please help Ill mark you brainliest Roberto has received various gifts over the years and has decided to dispose of the following assets he received as gifts:What is the recognized gain or loss from the following transactions, assuming that no gift tax was paid when the gifts were made.If an answer is zero, select "neither a gain nor a loss" and enter "0" as the amount.a. In 1981, he received land worth $32,000. The donor's adjusted basis was $35,000. Roberto sells the land for $95,000 in 2018.(neither a gain or a loss/ a gain/ a loss) of $__________ is recognized.b. In 1986, he received stock in Gold Company. The donor's adjusted basis was $19,000. The fair market value on the date of the gift was $34,000. Roberto sells the stock for $40,000 in 2018.(neither a gain or a loss/ a gain/ a loss) of $__________ is recognized.c. In 1992, he received land worth $15,000. The donor's adjusted basis was $20,000. Roberto sells the land for $9,000 in 2018.(neither a gain or a loss/ a gain/ a loss) of $__________ is recognized.d. In 2013, he received stock worth $30,000. The donor's adjusted basis was $42,000. Roberto sells the stock for $38,000 in 2018.(neither a gain or a loss/ a gain/ a loss) of $__________ is recognized. Please help me answer this please help will give brainliest instantly. cuantos kilometros tiene tokyo If Jaliya has 5 paintings and paints 6 more how much does she have now? A lock has a 3-number code made up of 15 numbers. If none of the numbers are allowed to repeat, how many different ways can you choose three different numbers in order for a unique code?