why is it a risk of using you mobile cell phone or external WLAN as a wi-fi connection point?

Answers

Answer 1

The risk of using you mobile cell phone or external WLAN as a wi-fi connection point is that  it is one that do lacks the right security measures to be able to keep the network safe from intrusion.

What is one of the Risks of linking to a public Wi-Fi network?

The Risks of a Public Wi-fi is that a free Wi-Fi security is one that helps a any hacker to be able to put or position themselves between the user and the connection point.

Note that in this case, the user instead of they talking directly with the hotspot, they are known to be sending their information to the hacker, who is said to often relays it on.

Hence, The risk of using you mobile cell phone or external WLAN as a wi-fi connection point is that  it is one that do lacks the right security measures to be able to keep the network safe from intrusion.

Learn more about WLAN from

https://brainly.com/question/26956118

#SPJ1


Related Questions

USPS stuck on "We are preparing your order for shipment" for 3 days. What does this mean?

Answers

What the message  "We are preparing your order for shipment" for 3 days means is that it is stuck on a loop.

What is a loop in computer science?

In programming the word loop is used to refer to the fact that an instruction or a sequence is repeated for a period that is longer or than is necessary. In order for this to change, certain modifications may have to be done on the program, else it may continue to run till it gets to when it is completed.

The condition would then be checked in order to show that it has been able to reach the prescribed number that it was supposed to for the message to terminate.

Read more on loops here: https://brainly.com/question/16922594

#SPJ1

John is directing a television series. He has to shoot a scene that presents the lead character in a dominating and commanding position. What shooting technique should he use?
A.
low angle
B.
high angle
C.
Dutch tilt
D.
front angle

Answers

answer is high angle so it hits better lighting

The SQL SELECT built-in function COUNT ____.

Answers

The SQL SELECT built-in function COUNT none of the above options.

What is a SELECT query?

A select query is known to be a kind of a database object that depicts the information that is shown in Datasheet view.

Note that A query does not save data, it shows data that is saved in tables.  The SELECT statement is known to be one that is often used to select data from what we call a database.

Hence, The data returned is said to be saved in a result table, known to be the result-set.

Based on the above, the SQL SELECT built-in function COUNT none of the above options.

Learn more about  SQL SELECT from

https://brainly.com/question/10097523

#SPJ1

What are the two most desired characteristics of a cellular network?

Answers

A cellular communication system consists of four major components—namely, a public switched telephone network (PSTN), a mobile telephone switching office (MTSO), cell sites with antenna systems, and mobile subscriber units (MSU).

There are four main parts that make up a cellular communication system: mobile subscriber units (MSUs), public switched telephone network (PSTN), and mobile telephone switching office (MTSO) (MSU).

What desired characteristics of a cellular network?

No direct mobile to mobile communication exists; all communication takes place between a mobile and a base station. Within each base station's cell, which is a specific geographical area, there is a dedicated set of radio channels or frequencies.

These networks are becoming used for purposes other than entertainment and phone calls as cellular devices become more and more common.

Cellular networks are high-speed, high-capacity voice and data communication networks that can handle cellular devices and have increased multimedia and seamless roaming capabilities.

Therefore, The ability of a cellular network to reuse frequencies to boost capacity and coverage is its major feature.

Learn more about cellular network here:

https://brainly.com/question/27960045

#SPJ2

I need this problem solved in C++ progamming

Answers

Using the knowledge in computational language in C++ it is possible to write a code that prompt user for a file name and read the data containing information for a course, store and process the data

Writting in C++ code:

#include<iostream>

#include<cstring>

#include<fstream>

using namespace std;

struct Student{

string lastName,firstName;

char subject;

int marks1,marks2,marks3;

};

char calcGrade(double avg){

char grade;

if(avg>=90.0&&avg<=100.0)

grade='A';

else if(avg>=80&&avg<=89.99)

grade='B';

else if(avg>=70&&avg<=79.99)

grade='C';

else if(avg>=60&&avg<=69.99)

grade='D';

else

grade='E';

return grade;

}

int main(){

char inFilename[20],outFilename[20];

int noOfRec,i,sum,count;

double avg,classAvg;

char grade;

cout<<"Please enter the name of the input file: ";

cin>>inFilename;

cout<<"Please enter the name of the output file: ";

cin>>outFilename;

ifstream ifile;

ifile.open(inFilename);

ofstream ofile;

ofile.open(outFilename);

if(!ifile){

cout<<inFilename<<" cannot be opened";

return -1;

}else{

ifile>>noOfRec;

struct Student s[noOfRec];

for(i=0;i<noOfRec;i++){

ifile>>s[i].lastName,s[i].firstName,s[i].subject,s[i].marks1,s[i].marks2,s[i].marks3;

}

if(!ofile){

cout<<outFilename<<" cannot be opened";

}else{

ofile<<"Student Grade Summary\n";

ofile<<"---------------------\n";

ofile<<"ENGLISH CLASS\n";

ofile<<"Student name\tTest Avg\n";

sum=0;

count=0;

classAvg=0.0;

for(i=0;i<noOfRec;i++){

if(s[i].subject=='E'){

avg=(s[i].marks1+s[i].marks2+s[i].marks3)/3;

grade=calcGrade(avg);

ofile<<s[i].firstName<<" "<<s[i].lastName<<"\t"<<avg<<"\t"<<grade<<"\n";

sum+=avg;

count+=1;

}

}

classAvg=sum/count;

ofile<<"\n\t\tClass Average\t\t"<<classAvg<<"\n";

ofile<<"---------------------\n\n";

ofile<<"HISTORY CLASS\n";

ofile<<"Student name\tTest Avg\n";

sum=0;

count=0;

classAvg=0.0;

for(i=0;i<noOfRec;i++){

if(s[i].subject=='H'){

avg=(s[i].marks1+s[i].marks2+s[i].marks3)/3;

grade=calcGrade(avg);

ofile<<s[i].firstName<<" "<<s[i].lastName<<"\t"<<avg<<"\t"<<grade<<"\n";

sum+=avg;

count+=1;

}

}

classAvg=sum/count;

ofile<<"\n\t\tClass Average\t\t"<<classAvg<<"\n";

ofile<<"---------------------\n\n";

ofile<<"MATH CLASS\n";

ofile<<"Student name\tTest Avg\n";

sum=0;

count=0;

classAvg=0.0;

for(i=0;i<noOfRec;i++){

if(s[i].subject=='M'){

avg=(s[i].marks1+s[i].marks2+s[i].marks3)/3;

grade=calcGrade(avg);

ofile<<s[i].firstName<<" "<<s[i].lastName<<"\t"<<avg<<"\t"<<grade<<"\n";

sum+=avg;

count+=1;

}

}

classAvg=sum/count;

ofile<<"\n\t\tClass Average\t\t"<<classAvg<<"\n";

ofile<<"---------------------\n\n";

ifile.close();

ofile.close();

}

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

In python please.
You are in process of writing a class definition for the class Book. It has three data attributes:
book_title, book_author, and book_publisher. The data attributes should be private.
In Python, write an initializer method that will be part of your class definition. The attributes
will be initialized with parameters that are passed to the method from the main program.
Note: You do not need to write the entire class definition, only the initializer method

Answers

Answer:

class Book:
   def __init__(self, book_title, book_author, book_publisher):

       self.__book_title = book_title

       self.__book_author = book_author

       self.__book_publisher = book_publisher

Explanation:

Python kind of haves private data attributes, although technically they don't.

Take for example the following code:

"

class A:

   def __init__(self):

       self.__privateAttribute = 0

x = A()

print(x.__privateAttribute)

"

all this really does is rename the variable name, and if you run the following code:

print(dir(x))

it will print the attributes of "x" which include "_A__privateAttribute" which is the attribute that was initialized.

Anyways getting that out of the way, you need to now about the __init__ method, which runs each time you initialize a new instance of the class. It's a way of setting up some necessary values that will be used in the objects methods (the functions inside the class)

So, because we simply cannot know what the book_title, book_author, and book_publisher are (since they vary book to book...), we take them as arguments using the __init__ method, and then initialize their values in their.

"

class Book:
   def __init__(self, book_title, book_author, book_publisher):

       self.__book_title = book_title

       self.__book_author = book_author

       self.__book_publisher = book_publisher

"

I just realized I completely forgot to even mention what the "self" variable stands for. Whenever you initialize a variable, or call a method from an instance of the class, the first argument passed will be the instance of the class. Take for example the following class

"

class A:

   def __init__(self, b):
       self.b = b

   def printB(self):
       print(self.b)

def printB(self):

   print(self.b)

c = A(3)

d = A(4)

c.printB()

printB(c)

d.printB()

printB(d)

"

The two lines

c.printB() and printB(c) are the same exact thing, the only difference is when you call c.printB(), you automatically pass the "c" as the first argument, and the same thing for d.printD(), it's implicitly passed whenever you call a method from an instance of the class.

The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the network.

Answers

Answer:

Save of data is the answer

Which of the following is a key feature of a relational database?

A) It has high scalability and performance that can enable almost unlimited growth
B) It has flexible data models that make it easy to store and combine
data of any structure and allow dynamic changes to the schema.
C) It is designed for highly available systems that should provide a consistent, high-quality experience for all users globally
D) It uses primary keys and foreign keys as a means to provide
efficient access to data and is supported directly in the database
rather than maintained in the application code.

Answers

It uses primary keys and foreign keys as a means to provide efficient access to data and is supported directly in the database rather than maintained in the application code.

Explanation: Relational databases use an expressive query language, make efficient use of indexes within the database, ensure strong consistency, and fit well within an enterprise management system. Non-relational databases have a flexible data model, have high scalability, and performance, and have always-on global deployments.

The statement which describes a key feature of a relational database is that it uses primary keys and foreign keys as a means to provide efficient access to data and is supported directly in the database rather than maintained in the application code. Thus, the correct option for this question is D.

What is a Relational database?

A relational database may be defined as a collection of information that organizes data in predefined relationships where data is stored in one or more tables or relations of columns and rows, making it easy to see and understand how different data structures relate to each other.

The key features of a relational database may include atomicity, consistency, isolation, durability, data consistency, flexibility, togetherness, data sharing, independence, etc. Each relation (table) must have a unique field that describes each record. This unique field is called a primary key.

Thus, the correct option for this question is D.

To learn more about Relational databases, refer to the link:

https://brainly.com/question/13262352

#SPJ2

What is computer viras? Loist 2 preventive measures against it​

Answers

A computer virus is a sort of malicious software, often known as malware, that travels across computers and causes data and software harm. Computer viruses are designed to cause system disruption, serious operational challenges, and data loss and leaking.

Types of Computer Viruses.

They include

Macro viruses – These are the largest of the three virus types.

Boot record infectors – These viruses are known also as boot viruses or system viruses.

File infectors – These viruses target

Thank you,

Eddie

If you had to tell that employee why it was not a good idea to send that e-mail, which of the following would you mention? (select all that apply)
The language was not professional.
The e-mail was not work-related.
The e-mail did not include an appropriate greeting.
The e-mail shows that the employee has been surfing the Internet instead of working.

the answers are A,B, and D. thats the only way I can give the answers on brainly.

Answers

The options that need to be mentioned are:

The language was not professional.The e-mail was not work-related.The e-mail shows that the employee has been surfing the Internet instead of working.

Check more about email below.

What is non work email?

In Email Management Guidelines, the term non-work related emails are known to be “those that are not related to either private or government business.

Note that if one is sent this email during working hours, one is obligated to live it and not open it.

Hence, The options that need to be mentioned are:

The language was not professional.The e-mail was not work-related.The e-mail shows that the employee has been surfing the Internet instead of working.

Learn more about email from

https://brainly.com/question/24688558

#SPJ1

How the (i)?? Help me to slove this

Answers

Answer:

#include <fstream>

 ifstream inFile("bookBorrower.txt");

 ofstream outFiles ("overPayment.txt");

Explanation:

fstream has ifstream and ofstream for input and output, respectively.

A user tells you that microsoft word gives errors when saving a file. what should you do next?

Answers

Answer:try to change the name of the file not adding any symbols not accepted as file, or try to change the destination of the file, ex. an external usb. Or double check if the destination folder is not full.

Explanation:

errors when saving may occur because of the above

Which statement about broadcasting a slideshow online is true?

All transitions are properly displayed to the audience when broadcasting online.
Broadcasting a slideshow online is not an option for most PowerPoint users.
Third-party desktop sharing software must be used to broadcast online.
PowerPoint has a free, built-in service for broadcasting online.

Answers

The statement about broadcasting a slideshow online that is true is D. PowerPoint has a free, built-in service for broadcasting online.

What is a Slideshow?

This refers to the presentation feature in a presentation-based system or software that makes use of images, and diagrams moving sequentially in a pre-timed manner.

Hence, we can see that based on the broadcast of slideshows online, one can see that the true statement from the list of options is option D which states that PowerPoint has a free, built-in service for broadcasting online.

Read more about slideshows here:

https://brainly.com/question/23427121

#SPJ1

The main components of a computer ar a hardware and software b) disc and monitor c) system and unit d) communication devices. ​

Answers

Option A is the main component

Assemble a client computer based on your programmed of study (e.g IT, CS, Business etc), discussing the type of components ( giving their exact names and functions) you would need and gives reasons why you need them

Answers

The assembly of client computer based on IT  are:

The monitor -  Acer Nitro XV282K KVbmiipruzx The CPU -  64-Core TR 3990XThe mouse - Logitech MX Master 3Voltage regulator- APC Line-R Automatic Voltage RegulatorSolar battery - Tesla Powerwall 2.Microsoft office 365

The  reasons why I need the above hardware and software is because they are the one of the best in regards to IT and they will really help me a lot in regards to gaming and programming.

What is a client computer in regards to computer?

The term client computer is known to be one that is often used at home and also in corporate environment.

A  client is seen as an kind of computer hardware or software device that is known to often needs access to a service that is said to be provided by a server. Clients are known to be the requesting program or the user that is in a client-server base.

Therefore, The assembly of client computer based on IT  are:

The monitor -  Acer Nitro XV282K KVbmiipruzx The CPU -  64-Core TR 3990XThe mouse - Logitech MX Master 3Voltage regulator- APC Line-R Automatic Voltage RegulatorSolar battery - Tesla Powerwall 2.Microsoft office 365

Learn more client computer from

https://brainly.com/question/14753529

#SPJ1

Convert the following number of decimal to hexadecimal (10110)

Answers

Answer:277E

Explanation:

The graphic representation below will clarify how it unfolded.

1.1 Define what is a Big data and what is loT in detail? ​

Answers

The definition of big data is data that includes greater variety, coming in increasing volumes and with more velocity. This is also known as the three Vs. Put simply, big data is larger, more complex data sets, particularly from new data sources.

What is Lot and big data?

IoT and Big Data are two independent technologies that are indivisible from each other, to enable well-known technical advances. While the IoT would mostly collect data from physical objects through various sensors, Big Data would allow faster and more efficient warehouse and processing of this data.

What is big data?

The definition of big data is data that includes greater variety, arriving in increasing importance and with more velocity. This is also understood as the three Vs. Put simply, big data is larger, more complex data sets, particularly from new data sources.

To learn more about Big Data, refer

https://brainly.com/question/19049345

#SPJ9

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which is the FASTEST way to transfer a good file to the computer?

Answers

The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

What is C$ administrative share?

The c$ share is known to be a kind of an administrative share that is often known to be the cluster or SVM administrator  that a person can be able to can use to be able to go through and manage the SVM root volume.

Note that The characteristics of the c$ share are the path for this kind of admin. share is known to be always the path to the SVM root volume and it is one that a person cannot modify.

Hence, based on the above, the The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

Learn more about file share from

https://brainly.com/question/15267859

#SPJ1

Write the Python code that will create a list with 50 elements. Populate (fill) the list using a
loop that will get an integer value from the user for each element in the list.

Answers

Answer:

"

integers = []

for _ in range(50):
   userInput = int(input("Input an integer: "))

   integers.append(userInput)

"

Explanation:

So there is a very useful object or class in python that is called range, and this is primarily used to traverse certain values using a for loop. The syntax is defined as:

"range(start, stop, increment)"

where start is included, stop is excluded, and increment is how much the value increases after each iteration, although it is an optional value, just like stop"

So if you simply do:

"range(a)"

the start value will default to 0

the end value will be equal to "a"

the increment will default to 1

If you provide the following values:

"range(a, b)"

start will be equal to "a"

end value will be equal to "b"

increment will default to 1

If you provide all three values as such:

range(a, b, c)

start, end, and increment will be assigned to the variable values in their respective order.

You don't need to know all these 3 cases for this example, but it's best ton know in case you need to do something similar but slightly different in the future.

So, since we want to fill a list with 50 elements, and we want user input, we can loop a code 50 times and ask them to input an integer value and then append it to the list.

To run a piece of code 50 times, we can simply do:

"

for _ in range(50)

"

the "_" variable will be assigned to numeric values from 0-49 (50 is excluded), so it will run 50 times. I named it "_", because we really don't need these numeric values, we just need the for loop so we can have the code run 50 times.

So the next thing to do is initialize an empty list which we will append values to. This can simply be done by writing:

"

integers = []

"

and the variable name can really be anything (besides keywords), but I think it's the most appropriate given the context

So in the for loop, we want to ask for input using the input function, which asks the user for input, and then returns the input they input. Using this, we want to convert it to an integer using int (this is technically not a function, it's a class, you may learn about this more later if you haven't but it's not necessary to know for now), which converts strings to integers.

So using this we get the following code:

"

integers = []

for _ in range(50):
   userInput = int(input("Input an integer: "))

   integers.append(userInput)

"

the variable isn't necessary and you could just directly do

"

integers.append(int(input("Input an integer: ")))

"

but it's really for somewhat better readability, but both are equally valid, since the second statement isn't really to complicated.

One thing to note, is if the user inputs a non-integer string, the code will raise an error.

   

Why multiprocessing operating system is more suitable for modern life?

Answers

Answer:

multiple processors and they are connected with the physical memory computer buses clocks and periprial devices the main objective of using a multiprocessor operating system is to increase the exclusion speed of the system and consume high computing power

What would be an ideal scenario for using edge computing solutions?

Answers

An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

What is Edge computing ?

Edge computing can be regarded as the process that involves the  analyes as well as the, and storage of data closer to where it is generated .

This is been done to  enable rapid analysis and response in the process that is been used by some companies  to have consolidated operations , hence, An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

Learn more about edge computing solutions on:

https://brainly.com/question/23858023

#SPJ1

Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?

Answers

The troubleshooting step that you should take next is to Question User.

What is Troubleshooting?

This refers to the diagnostics that is run on a computer program or system in order to find the problem that is causing it to malfunction or misbehave.

Hence, we can see that based on the fact that several users on the second floor of your company's building are reporting that the network is down and go to the second floor to investigate and find that you are able to access the network, the troubleshooting step that you should take next is to Question User.

Read more about troubleshooting here:

https://brainly.com/question/13818690

#SPJ1

13. Document the purpose of the
Managed pipeline mode settings.

Answers

The purpose of the Managed pipeline mode settings is to enable backward compatibility.

What is a Managed Pipeline?

This refers to the process that is in use in most CMS systems to process and direct sales that would be made at a later date.

Hence, we can see that when using a managed pipeline, the mode settings have the function to enable backward compatibility and the queue length can be set by using the "Queue Length" option

Read more about backward compatibility here:

https://brainly.com/question/13684627

#SPJ1

1,2,3,4,5,6,7,8,9,10 – Best case - Sorted in ascending order
10,9,8,7,6,5,4,3,2,1 – Worst case - Sorted in reverse order
1,3,2,5,4,7,9 ,6,8,10 – Avg case – numbers are in random order

For the given numbers, please use the following algorithms (bubble sort, insertion sort & selection
sort) to sort in ascending order. Please also find out number of comparisons and data movements
for each algorithm. Based on comparisons and data movements please rate algorithm for each input
case.

Answers

Using the knowledge in computational language in python it is possible to write a code that from a random number draw creates an order of increasing numbers

Writting the code in python:

def shellSort(array, n):

   # Rearrange elements at each n/2, n/4, n/8, ... intervals

   interval = n // 2

   while interval > 0:

       for i in range(interval, n):

           temp = array[i]

           j = i

           while j >= interval and array[j - interval] > temp:

               array[j] = array[j - interval]

               j -= interval

           array[j] = temp

       interval //= 2

data = [10,9,8,7,6,5,4,3,2,1]

size = len(data)

shellSort(data, size)

print('Sorted Array in Ascending Order:')

print(data)

See more about python at brainly.com/question/18502436

#SPJ1


Question 9
The boom in collaboration between U.S. companies and workforces in India created a
need for blank

Answers

Answer:

Outsourcing

Explanation:

The boom in collaboration between U.S. companies and workforces in India created a need for Outsourcing.

I believe this is correct, but I'm not 100% certain.

Which term describes a Cloud provider allowing more than one company to share or rent the same server?

Answers

The term which describes a cloud provider allowing more than one company to share or rent the same server is known as Multitenancy

The term that describes a cloud provider allowing more than one company to share or rent the same server is known as Multitenancy.

What is a cloud?

A third-party business offering a cloud-based platform, infrastructure, application, or storage services is known as a cloud service provider.

Companies often only pay for the cloud services they use, as business demands dictate, similar to how a homeowner would pay for a utility like electricity or gas.

Data for each renter is separated and inaccessible to other tenants. Users have their own space in a multi-tenant cloud system to store their projects and data. Multi-tenant cloud system helps in the clouding of private and public sectors.

Thus, Multitenancy is the term used to describe a cloud service that permits many businesses to share or rent the same server.

To learn more about cloud, refer to the link:

https://brainly.com/question/27960113

#SPJ2

Enterprise software is designed for organizations to __________.

Answers

Answer:

The goal of enterprise software is to enable the activities of large organizations, supporting a wide range of different user roles.

You'll apply the concepts of Lesson 1 to create pseudocode and a flowchart for a modular program. The body mass index (BMI) is often used to determine whether a person with a sedentary lifestyle is overweight or underweight for his or her height. A person's BMI is calculated with the following formula: BMI = Weight × 703 ÷ Height²​

Answers

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

//Ask user for height & weight//"Enter weight (in pounds):""Enter height (in inches"//Calculate the person's (BMI)//"BMI = weight * (703 / pow(height, 2));"//Display the person's (BMI)//

What is a flowchart?

A flowchart is also referred to as flow diagram and it can be defined as a graphical representation of an algorithm for a work process or workflow.

What is a pseudocode?

A pseudocode can be defined as a description of the steps contained in an algorithm, especially through the use of a plain (natural) language.

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

//Ask user for height & weight//"Enter weight (in pounds):""Enter height (in inches"//Calculate the person's (BMI)//"BMI = weight * (703 / pow(height, 2));"//Display the person's (BMI)//

Read more on pseudocode here: https://brainly.com/question/13208346

#SPJ1

Which statement describes an advantage of DevOps

Answers

The correct statement that describes an advantage of DevOps is that  It enables the capability to continuously release software with high confidence.

What are the advantages of DevOps?

Teams who are known to fully uses DevOps practices are known to be one that often functions more smarter and also more faster, and they tend to deliver a good and better quality to their customers.

Note that there is an increased use of automation and also that of cross-functional collaboration that tends to lower complexity and errors.

Hence, The correct statement that describes an advantage of DevOps is that  It enables the capability to continuously release software with high confidence.

See options below

A) It allows for a slower and more reasonable time frame for making fixes in production mode.

B) It enables the capability to continuously release software with high confidence.

C) It promotes individual efforts for both development and operations.

D) It provides a clear separation between application methods and infrastructure methods.

E) None of these

Learn more about DevOps from

https://brainly.com/question/24306632

#SPJ1

What would be the most professional choice of words for your response:

A. THIS WASN’T FOR ME.

B. Please stop spamming me with these messages for my coworker.
C. I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.


the answer is C. ur welcome

Answers

The professional choice of words for response is I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.

Check more about writing below.

What is “Word Choice” in Writing?

'Word Choice” in writing is known to be a term that connote the ways or the usage of words that is said to be effective and precise use of language.

This is one that often conveys information and it also tends to enlighten the reader.

Note that option C is correct because it is best and most professional way to respond to a statement.

Hence, The professional choice of words for response is I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.

Learn more about word choices from

https://brainly.com/question/1619714

#SPJ1

Other Questions
1. The accompanying table shows the number of movie theaters showing a popular film and the film's weekly gross earnings, in millions of dollars. Use the table to answer the questions 1), 2). Number of Theaters (x) 443 456 493 530 569 657 723 1,054 Gross Earnings (y)(millions of dollars)2.572.653.734.054.764.795.159.631). Write the linear regression equation for this set of data, rounding values to five decimal places. Using this linear regression equation, find the approximate gross earnings, in millions of dollars, generated by 610 theaters. Round your answer to two decimal places. 2). Find the minimum number of theaters that would generate at least 7.65 million dollars in gross earnings in one week.2. A real estate agent plans to compare the price of a cottage, y, in a town on the seashore to the number of blocks, x, the cottage is from the beach. The accompanying table shoes a random sample of sales and location data. Write a linear regression equation that relates the price of a cottage to it's distance from the beach. Use the equation to predict the price of a cottage, to the nearest dollar, located three blocks from the beach. Number of Blocks from the Beach (x) Price of a Cottage (y) 5 $132,000 0 $310,000 4 $204,000 2 $238,000 1 $275,000 7 $60,8003. The table below represents a chart kept by a pediatrician tracking the circumference of babies heads at various months of age. Age (in months) Circumference (in cm) 1 35.8 2 36.6 5 38.5 6 39.1 4 38.9 13 40.1 7 39.1 15 40.3 10 39.9 2 36.8 18 40.61). Determine the regression model that best fits the data, rounding all values to the nearest thousandth. Then predict the size of a baby's head at 24 months old. Round your answer to the nearest tenth. 2). The pediatrician measured a newborns head and found the circumference to be 35.1cm. Can he add the pair (0, 35.1) to the data set to calculate a new regression? Justify your answer. Which investment option should Angela choose?stockscommoditiessaving accountsmutual funds PLEASE HELP ASAP!!!!Which of the following describes how important it is to get along with others? Conscientiousness Extraversion Agreeableness Neuroticism #14 quick answer pls :) Ngu owns equipment that cost $104,300 with accumulated depreciation of $71,200. ngu asks $37,700 for the equipment but sells the equipment for $34,800. compute the amount of gain or loss on the sale cual es el valor de 15+b=23 FBLA-PBL state chapters usually have a number of elected__________ whorepresent the state's various regions.A. Vice PresidentsB. SecretariesC. TreasurersD. Presidents What is the importance of system security within the organization where you currently work or at an organization within your field of study The marked price of an article is rs 10000 . If he discounted rate and VAT rate are equal and the price with VAT is 9900 find the vat rate . In the affective events theory, the term "personal predispositions" can involve the __________ subcategories. Correct the following sentence (neither the girls nor bosco think that making resolutions are useless) Twelve horses race in the local derby. how many ways could the horses finish in the top three places? write your answer as a fraction with factorials, then simplify. PLEASE HELP ME! THE QUESTION IS DOWN BELOW PLEASE PLEASE HELP ME The 2014 ACA Code of Ethics advises counselors to: a. uphold the confidentiality rights of their minor clients even when parents object. b. avoid legal liability by including parents in counseling sessions with their children The energy of a photon of red light is ____ the energy of a photon of blue light Which was the first-ever fully animated cartoon? Geometry: complete this proof (ASAP!!!! Its urgent) Given these facts, determine how many cans of paint you would need to buy to paint 2 walls.1st wall: 20 ft. x 8ft.2nd wall: 40ft. x 8ft.1 can will cover 200 square feet of wall. After 8 months, children become incrasingly likley to react to newcomers with tears and distress. This best illustrates? Wonderful! Not only did our salespeople do a good job in meeting the sales budget this year, but our production people did a good job in controlling costs as well, said Kim Clark, president of Martell Company. Our $18,300 overall manufacturing cost variance is only 1.2% of the $1,536,000 standard cost of products made during the year. Thats well within the 3% parameter set by management for acceptable variances. It looks like everyone will be in line for a bonus this year. The company produces and sells a single product. The standard cost card for the product follows: Standard Cost Cardper Unit of Product Direct materials, 2 feet at $8.45 per foot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . $16.90 Direct labor, 1.4 direct labor hours at $16 per direct labor-hour . . . . . . . . .. . . . . . . 22.40 Variable overhead, 1.4 direct labor-hours at $2.50 per direct labor-hour .. . . . . . . . . . 3.50 Fixed overhead, 1.4 direct labor-hours at $6 per direct labor-hour . . . . . . . .. . . . . . . . 8.40 Standard cost per unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. $51.20 The following additional information is available for the year just completed: a. The company manufactured 30,000 units of product during the year. b. A total of 64,000 feet of material was purchased during the year at a cost of $8.55 per foot. All of this material was used to manufacture the 30,000 units. There were no beginning or ending inventories for the year. c. The company worked 43,500 direct labor-hours during the year at a direct labor cost of $15.80 per hour. d. Overhead is applied to products on the basis of standard direct labor-hours. Data relating to manufacturing overhead costs follow: Denominator activity level (direct labor-hours) . . . . . . . .... . . . . . . . . . . . . . . . . . . . . . 35,000 Budgeted fixed overhead costs (from the overhead flexible budget) . . . . . . . . . . . . $210,000 Actual variable overhead costs incurred . . . .