Ask a New Question
Search
Questions and answers by
hatemaths
Questions (641)
In an endothermic reaction, the reactants have a Response area , total bond energy. This means the relative potential energy of
1 answer
42 views
The bond energy of An atom that is held together by a triple bond can be described as a bond that is more loosely held together
1 answer
48 views
The bond energy of An atom that is held together by a triple bond can be described as a bond that can be easily broken True
1 answer
85 views
The bond energy of An atom that is held together by a triple bond can be described as(2 points) True False a bond that contains
1 answer
43 views
The bond energy of An atom that is held together by a triple bond can be described as(2 points) True False a bond that requires
1 answer
59 views
a bond that requires great amount of energy to break apart
1 answer
28 views
The reaction of the exploding balloon is an example of an exothermic reaction.(2 points) Responses True True False
1 answer
37 views
In the video, what evidence is there that there was more bond energy when the products were formed?(2 points) Responses The
1 answer
53 views
Based on what you know about breaking and forming bonds, which part of the reaction has a higher bond energy in the balloon
1 answer
83 views
Based on what you know about breaking and forming bonds, which part of the reaction has a higher bond energy in the balloon
1 answer
54 views
The bond energy of An atom that is held together by a triple bond can be described as(2 points) True False a bond that requires
1 answer
161 views
Use the table to answer the question. Bond Bond Energy H-H 432 Cl-Cl 239 H-Cl 427 Consider the reaction H2 + Cl2 ---> 2HCl Is
1 answer
69 views
Artificial Intelligence (AI) has what unique characteristic?(1 point) Responses The capability of technology to communicate with
1 answer
67 views
Which of the following best describes an unintended outcome of computing innovation?(1 point) Responses unimagined outcomes
1 answer
56 views
Which of the following best describes an intended outcome of computing innovation?(1 point) Responses unanticipated consequences
1 answer
62 views
At what point do we consider technology disruptive?(1 point) Responses when it makes our lives more difficult when it makes our
1 answer
66 views
What causes algorithms to produce biased results?(1 point) Responses The programming language is wrong. The programming language
1 answer
57 views
In Judith Wright's "Eve to Her Daughters," Adam believed that ___ didn’t exist. (1 point) Responses the Garden of Eden the
1 answer
55 views
Which of the following is the greatest barrier to efficient smart homes?(1 point) Responses lack of infrastructure lack of
1 answer
136 views
How is file sharing used to solve the problem of worker shortages?(1 point) Responses It allows people from anywhere to share a
1 answer
75 views
A company wishes to look for global employees to fill a growing need. They will be working from home using telework and will be
1 answer
42 views
What can individualism lead to?(1 point) Responses stereotypes stereotypes assimilation assimilation social autonomy social
1 answer
69 views
What is a conscious or subconscious tendency to favor one person, group, or idea over another?(1 point) Responses sexism sexism
1 answer
65 views
What general computational artifact bias deals with expecting a product/service to be better if it has more connection to other
1 answer
56 views
What general computational artifact bias deals with expecting a product/service to be better if it has more functions?(1 point)
1 answer
56 views
What is a conscious or subconscious tendency to favor one person, group, or idea over another?(1 point) Responses racism racism
1 answer
112 views
Nathan is playing an online video game. He discovers that all the avatars for the games are male. He doesn’t think that this
1 answer
61 views
Paola downloads the latest first-person shooter (FPS) game all her friends are talking about. She starts to create her avatar
1 answer
82 views
A student designer is creating an app for release. They need to choose a font for their app. The student thinks back to their
1 answer
59 views
Which of the following biases is caused by the logical error of concentrating on the people or things that survived some process
1 answer
66 views
Which of the following is a cause of someone to develop a bias in which they have a tendency to view their own experiences as
1 answer
65 views
If you were trying to put into effect and execute a computer science program for your school next year and add it to the
1 answer
77 views
Which of the following is a leading infrastructure fund for helping to deliver high speed internet for underserved areas?(1
1 answer
48 views
How do the internet of things (IoT) devices communicate?(1 point) Responses with human guidance with human guidance without
1 answer
77 views
What is one possible negative aspect of working from home?(1 point) Responses less promotion potential less promotion potential
1 answer
69 views
How did Wi-Fi advance individual technological capabilities?(1 point) Responses It created a way to work outside the home. It
1 answer
67 views
What twenty-first century computational innovation can be made small enough to travel through arteries and veins?(1 point)
1 answer
68 views
Which twenty-first century computational innovation was the first decentralized cryptocurrency?(1 point) Responses prosthetics
1 answer
50 views
Which of the following results of innovation increased pollution?(1 point) Responses agriculture agriculture convenience
1 answer
41 views
What has improved access to education, training, and skills and reduced the associated costs?(1 point) Responses access to
1 answer
91 views
Your organization has a gross sales of $40 million, and you have 100 employees. What is the maximum amount of loss in dollars
1 answer
55 views
What is the best way to prevent people from reading your data on a hard disk?(1 point) Responses Use weird file names. Use weird
1 answer
66 views
A router that connects your local area network (LAN) to the internet has a basic built-in firewall that does not have any
1 answer
61 views
You are surfing the internet and see an advertisement for an online contest. It wants you to enter a bunch of information about
1 answer
59 views
The chief executive officer (CEO) of an organization asked you to audit the physical security of their building. You noticed
1 answer
53 views
What role does access control have within a physical setting?(1 point) Responses It allows for users to freely move around a
1 answer
74 views
Your cellphone social media application keeps changing and getting new pictures. The pictures are not any that you know. This
1 answer
76 views
You have just friended someone on social media and the person is asking you for a gift card from a video game store. The person
1 answer
56 views
You have received a bunch of emails from the same company that makes your indoor exercise bicycle. You are very interested as
1 answer
57 views
What is one of the major advantages of using a Virtual Private Network (VPN) when browsing the internet?(1 point) Responses your
1 answer
66 views
How can installation media can be used to compromise a computer?(1 point) Responses Installation media is designed to hack
1 answer
71 views
You have received several emails from a company offering you a summer internship. You are very interested in the extended
1 answer
74 views
The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router
1 answer
65 views
How does spyware operate?(1 point) Responses Spyware is automated to carry out certain actions within the system. Spyware is
1 answer
70 views
How does ransomware affect organizational assets?(1 point) Responses A ransomware attack causes users to constantly reboot their
1 answer
67 views
What is the most complete explanation of the Zero Trust Methodology?(1 point) Responses No device is considered trusted, and
1 answer
61 views
What is the goal of Safe Code?(1 point) Responses to ensure software integrity to ensure software integrity to demonstrate
1 answer
64 views
From a cost point of view, an organization knows it needs to implement some cybersecurity protection on its personal computers
1 answer
66 views
What is the best action that a company should take when a mobile device is lost with an active network connection, and a copy of
1 answer
69 views
Which of the following passwords would be considered the strongest and most secure?(1 point) Responses R3ADYGO123 R3ADYGO123
1 answer
55 views
What is generally traded when securing systems?(1 point) Responses being able to easily use the system being able to easily use
1 answer
66 views
Which of the following is an example of an internal threat?(1 point) Responses employee who exploits systems employee who
1 answer
54 views
A student has been prompted by their computer to install a patch for their operating system. They decide to ignore the message
1 answer
76 views
You have been surfing the internet and have decided to download a new game. Your computer issues a warning that the software may
1 answer
55 views
Find the roots of the polynomial equation. x3−2x2+10x+136=0 (1 point) Responses 3±5i, −4 3±5i, −4 3±i, 4 3±i, 4
1 answer
48 views
Divide −2x3−5x2+4x+2 by x+2 (1 point) Responses −2x2−x+6, R−10 −2x2−x+6, R−10 −2x2−9x+22, R−42
1 answer
82 views
Use synthetic division to find P(−2) for P(x)=x4−5x3+3x+2 .
1 answer
57 views
During the winter months when it is cold the internet works at full speed. The network administrator notices that during the
1 answer
53 views
What external threat could potentially compromise the security of an organization?(1 point) Responses poor encryption protocols
1 answer
82 views
When a breach occurs on a small- or medium-sized business, and they have customer data exposed, the business has a 60% rate of
1 answer
178 views
Which of the following happens when an ionic bond is formed?(1 point) Responses Two atoms share an electron. Two atoms share an
1 answer
57 views
You are worried about your password being stolen, but you have had this password for a long time. It is a good password and hard
1 answer
111 views
What is considered sensitive data?(1 point) Responses company operating hours company operating hours social security numbers
1 answer
68 views
What is adware?(1 point) Responses Adware is a program that uses a computer network to replicate and propagate throughout the
1 answer
65 views
There are currently 254 devices connected to a hospital's network. An additional 30,000 to 65,000 devices will be added to the
1 answer
80 views
You have added a new wireless tablet to the network. As an approved device, what is the function that the tablet can perform on
1 answer
91 views
What is internet protocol (IP) addressing?(1 point) Responses an assignment process to locate other locations an assignment
1 answer
78 views
What is the general network process that describes a new user gaining access to the network with a username and password?(1
1 answer
86 views
What hardware is needed for a successful network?(1 point) Responses lock down browser, anti-malware, productivity suites, and
1 answer
55 views
How does a client-server work?(1 point) Responses works when the user enters a username and password to gain access works when
1 answer
92 views
What is the hardware progression from a device to the internet in a wireless network?(1 point) Responses NIC, switch, access
1 answer
73 views
As a star topology grows and new users or devices join the network, which scalable device can increase available connection
1 answer
75 views
You have a local area network (LAN) in your home and one in the business office that you own. You want to print from home to
1 answer
73 views
Describe the role of bandwidth in a network device’s internet performance. Give your answer in 1-2 sentences.(2 points)
1 answer
55 views
Find all the zeroes of the equation. −2x^4−64x^2+288=0
2 answers
82 views
Find all the zeroes of the equation. −2x4−64x2+288=0
1 answer
59 views
To investigate the role of the Roman Catholic Church in the empire building of the Spanish and Portuguese empires shows that(1
1 answer
86 views
You can access the internet and view your website, but your website’s visitors are offline and cannot view your website. Which
1 answer
76 views
You are unable to access the internet. After troubleshooting you find out you will need to replace the cable between your
1 answer
58 views
Cloud storage solutions allow you to share files among various users. The transfer of files had slowed down to match the low
1 answer
76 views
Analyze the effects on the Americas that were caused by the Columbian Exchange.(1 point) Responses The effects of the human
1 answer
91 views
Create an argument about the significance of European expansion on the Americas.(1 point) Responses European expansion into the
1 answer
75 views
Which statement best investigates the relationship between social Darwinism and New Imperialism?(1 point) Responses Social
1 answer
70 views
Which statement draws a correct conclusion about how boundaries created by European nations in Africa affected the African
1 answer
82 views
A testable statement made before any experiment begins is a . An explanation that is generally accepted as true after many
1 answer
65 views
Label the hypotheses as testable or non-testable.(3 points) Testable Non-testable If I replace the battery in my car, then my
1 answer
63 views
Choose the limitations of science that you learned about in this unit.(3 points) Responses Science is always changing Science is
1 answer
75 views
A teacher had her students write down hypotheses about an experiment. Which is a valid hypothesis?(1 point) Responses energy
1 answer
102 views
Which statement best relates sugarcane production to the expansion of slavery in the Americas?(1 point) Responses Sugarcane
1 answer
64 views
Which statement best describes why slavery was used in the Americas?(1 point) Responses The desire for cheap labor to produce
1 answer
61 views
Pages
1
2
3
4
5
6
7