Regarding computer protection, quarantining is defined as ________.
a. repairing an infected file
b. updating your antivirus software
c. deleting an infected file
d. placing a found virus in a secure area on the hard drive

Answers

Answer 1
Placing a found virus in a secure area on the hard drive
Answer 2

Regarding computer protection, quarantining is defined as "placing a found virus in a secure area on the hard drive" (O[tion D)

What is the meaning of quarantining?

With respect to computer protection, quarantining is the process of isolating and placing a found virus or infected file in a secure area on the hard drive.

By quarantining the file, it is separated from the rest of the system, preventing the virus from spreading and causing further harm.

This action allows users to safely handle and remove the threat without risking damage to other files or the overall system.

Thus, Option D is the right answer.

Learn more about quarantining  at:

https://brainly.com/question/1597166

#SPJ6


Related Questions

If you want to use your computer for recording your band, you would benefit most from a(n)

A. MIDI interface.
B. RAID interface.
C. HDMI interface.
D. overclocking interface.

Answers

A. MIDI interface.
RAID is a set of strategies for using more than one drive in a system.

Answer:

The answer is "Option A".

Explanation:

The MIDI stands for "Musical Instrument Digital Interface". It was designed to monitor one keyboard from another and was adapted quickly for the PC. It is also known as a set of rules, which is used to design and play the recorded music on digital electronic sounds or sound. It also helps to other PC's with sound card manufacturers, and other options were wrong that can be defined as follows:

In option B, It is a device that is used to check data redundancies, that's why it is not correct. In option C, It is used in data transferring, that's why it is not correct. In option D, It is processed, that is used to change PC's BIOS setting that's why it is not correct.  

The first line in a Hypertext Mark up Language (HTML) file is the _____, which is a processing instruction indicating the mark up language used in a document.A) TitleB) HeaderC) DoctypeD) List

Answers

Answer:

The correct answer to the following question will be Option C (Doctype).

Explanation:

A DOCTYPE is an order that identifies a certain XML or SGML document with a document type description. In the serialized type of a text, it expresses itself as a short markup string that corresponds to a specific syntax.The very first section into an HTML file was the Doctype, which would be a programming declaration showing the language used during the text.

The other three alternatives, such as title header, and list fall under <Doctype>.

The Doctype is, therefore, the right answer.

What would you have to know about the pivot columns in an augmented matrix in order to know that the linear system is consistent and has a unique solution?

Answers

Answer:

The Rouché-Capelli Theorem. This theorem establishes a connection between how a linear system behaves and the ranks of its coefficient matrix (A) and its counterpart the augmented matrix.

[tex]rank(A)=rank\left ( \left [ A|B \right ] \right )\:and\:n=rank(A)[/tex]

Then satisfying this theorem the system is consistent and has one single solution.

Explanation:

1) To answer that, you should have to know The Rouché-Capelli Theorem. This theorem establishes a connection between how a linear system behaves and the ranks of its coefficient matrix (A) and its counterpart the augmented matrix.

[tex]rank(A)=rank\left ( \left [ A|B \right ] \right )\:and\:n=rank(A)[/tex]

[tex]rank(A) <n[/tex]

Then the system is consistent and has a unique solution.

E.g.

[tex]\left\{\begin{matrix}x-3y-2z=6 \\ 2x-4y-3z=8 \\ -3x+6y+8z=-5 \end{matrix}\right.[/tex]

2) Writing it as Linear system

[tex]A=\begin{pmatrix}1 & -3 &-2 \\ 2& -4 &-3 \\ -3 &6 &8 \end{pmatrix}[/tex] [tex]B=\begin{pmatrix}6\\ 8\\ 5\end{pmatrix}[/tex]

[tex]rank(A) =\left(\begin{matrix}7 & 0 & 0 \\0 & 7 & 0 \\0 & 0 & 7\end{matrix}\right)=3[/tex]

3) The Rank (A) is 3 found through Gauss elimination

[tex](A|B)=\begin{pmatrix}1 & -3 &-2 &6 \\ 2& -4 &-3 &8 \\ -3&6 &8 &-5 \end{pmatrix}[/tex]

[tex]rank(A|B)=\left(\begin{matrix}1 & -3 & -2 \\0 & 2 & 1 \\0 & 0 & \frac{7}{2}\end{matrix}\right)=3[/tex]

4) The rank of (A|B) is also equal to 3, found through Gauss elimination:

So this linear system is consistent and has a unique solution.

Corporate VoIP falls into 3 categories. Which category uses gatekeepers as opposed to gateways? A) Digital IP at the ends, analog in the middle B) Analog to digital to digital C) Digital IP end to end D) Analog at the ends, digital IP in the middle

Answers

Answer:

for VoIP falls in Digital IP end to end categories

Explanation:

Normally to address the  VoIP solution the phone or PABX should be the only digital module. All the telephone extensions are connected to switch and from the switch, it should be connected to the digital module in PABX. If existing PABX is analog then end-user has to purchase digital module

conversion to attach to analog  PABX

Then switch  which should be managed switch for better performance. Suppose it we use the switch as an unmanaged switch then the performance of VoIP will be very less effective. Since VoIP is used for internet purpose also better to use end to end digital mode.

Ginny downloads and modifies an open source software program, then uploads the program with a different name. Which type of software license is she most likely to be working under?

Answers

Answer:

The correct answer to the following question will be "GNU General Public License".

Explanation:

GNU General Public License:

This is a commonly used free and license open source that ensures the right to operate, test, distribute and change the program for end-users.To prevent the GNU program from becoming proprietary, Richard Stallman developed the GPL. It is a basic use of his idea of the "copyleft."

If an individual alters and downloads a free software program, the program will then be uploaded with another name, then they would have to use this type of software license.

The correct answer to the following question will be "GNU General Public License".

Given,

Open source software program .

Here,

GNU General Public License.

This is a commonly used free and license open source that ensures the right to operate, test, distribute and change the program for end-users.

To prevent the GNU program from becoming proprietary, Richard Stallman developed the GPL.

It is a basic use of his idea of the "copyleft."

If an individual alters and downloads a free software program, the program will then be uploaded with another name, then they would have to use this type of software license.

Learn more about software programs,

https://brainly.com/question/1576944

#SPJ6

What file system allows you to continue to add files to a CD or DVD disc after the initial burn, as long as there is room on the disc?

Answers

Answer:

Live file system

Explanation:

The live file system allows you to continue adding files to CD or DVD disc after an initial burn as long as there is enough space left on the disc.

In an attempt to burn files on a CD or DVD disc, Windows will prompt you if you want the live file system or the other (which is mastered disc format). Once you select the live file system, you can then keep adding files over and over until there is not enough space on the disc.

Note that Windows might not display the prompt as "live file system". It could be represented in some other ways like: "Like a USB flash drive". But then going through the prompt will tell you which is which.

"Knowledge of technical issues such as computer technology is a necessary but not sufficient condition to becoming a successful management​ accountant." Do you​ agree? Why?"

Answers

Answer:

Somewhat it is true. It is not conditioned to becoming a successful management accountant.

Explanation:

Today in digital end-users he or she has to know computer skill knowledge on how to operate the system. Such as on the computer or desktop or laptop. Most of the account jobs such as posting to accounts and generates reports such as aging analysis or trial balance or profit and loss or balance sheets are generated by the system.

As accountant should also have some base input knowledge to create debtor or creditors under which group accounts. Some system has the facility to do the process while creating suppliers and customers.

In data compression, there are many different methods for compressing data. We have many different protocols because there is no one method that provides the absolute best compression for all files in a reasonable amount of time. Which of the following is the BEST term for the above example?a) An algorithm b) A heuristic c) A selection d) An iteration

Answers

Answer:

A heuristic

Explanation:

Some time there are many methods to solve a particular problem, or learn something. These all methods are able to solve the problem. We cannot say that, which method is perfect or which one is optimal. These solutions are being used and sufficient to provide the solution. The technique that is used to solve problem in this way is called Heuristic.

For Example

There are many methods of teaching, few student understand some method and rest of the student better understand the other method of teaching.  The students who think first method is perfect may think that other method is optimal and as well the students who think that second method is perfect, who may assume first solution as optimal.

The purpose of both of the teaching methods is to teach the students and both are sufficient to learn.

True or False: Among the best practices for installing Windows Server 2016 is to accept and use the DHCP-generated IP address.

Answers

Answer:

The answer is "False".

Explanation:

Windows Server is a type of server operating system, which is developed by Microsoft as a part of the OS family of windows new technology, that is built-in and combined with Windows 10 only.

This server enables DHCP Server, it is an optional server feature. This server allows you to install and release the IP addresses and other details to DHCP clients on your network, that's why it is not correct.

Lola's teacher asked her to create a web page for the school's FBLA chapter. Lola isn't sure where to begin. Which tool should she use?

69 POINTS!!!!!




nice.

Answers

Answer: story board

Which type of network cover a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies?

Answers

Answer: WIDE AREA NETWORK (WAN)

Explanation: hopes this helps

An email can lead to miscommunication because:________.a. it is a faster mode of communicationb. there is no opportunity to interpret nonverbal cuesc. receiver might not have access to the Internetd. sender might type in the wrong email address

Answers

Answer:

b. there is no opportunity to interpret nonverbal cues                        

Explanation:

Email is a very efficient, quick and simple way for communication and it is being used a lot. With  providing convenience and ease to the people to communicate and send messages to each other, email can also result in miscommunication.   Miscommunication occurs when a person misinterprets the email messages sent by another. This is because its a non verbal way of communication. So the person might not be able to explicitly interpret the feelings , emotions or expressions of the sender of the email. So there is no way to understand meaning of some non verbal cues and can be perceived in a incorrect manner. Although various symbols can be used to express the feelings non verbally e.g. exclamation mark, capital letters, emoticons etc but even these symbols can be wrongly interpreted by the recipient as the use of some symbols like capital letter in email are not always appreciated . Even some simple messages can be perceived as sarcasm. So the major reason of the miscommunication caused by email is the absence of facial expressions, certain gestures and body language which are better interpreted with face to face communication.

Answer:

The answer is B. An email can lead to miscommunication because there is no opportunity to interpret non-verbal cues. Everybody is different and we have different communication styles. To better communicate without having to have a negative tone on an email, the sender has to use positive positioning.

Explanation:

When writing functions that accept multi-dimensional arrays as arguments, ________ must be explicitly stated in the parameter list.

Answers

Answer:

The answer is "Option B"

Explanation:  

The two-dimensional array is often represented as a matrix. The matrix can be called a numerical grid, that is organized as some kind of bingo card with rows and columns, that's why it is correct, and other options are not correct, that can be defined as follows:

In option A, In the array, there are three types of the array but two types are mainly used, that's why it is not correct.Option C and Option D is not correct, because in this question the 2D array is used.  

When the break statement is encountered in a loop, all the statements in the body of the loop that appear after it are ignored, and the loop prepares for the next iteration.
a) true
b) false

Answers

Answer:

False

Explanation:

The statement is false because all statement after break statement are ignored but along with that control move out of loop to other instructions and  doesn't  perform next iteration of loop. Forexample:

for  (i=0;i<10;i++){

if(some condition)

break;

x=y;

y=z;

}

statement 1

statement 2

In above example after encountering break statement it will ignore statement after break plus it will not continue the next iteration and control move out of loop toward 'statement 1'

Answer:

Option b false

Explanation:

In programming, a break statement will terminate the loop and the program control will return to the statement after the loop. This means the loop won't prepare for the next iteration when a break statement is encountered.

One common use case of break statement is when we wish to terminate a linear search once the target number is found from an array. For example:

let target = 10;let myArray = [1, 10, 5, 6, 8, 9, 11];let found =  false;for(let i = 0; i < myArray.length; i++){       if(target === myArray[ i ] )       {               found = true;               break;       }}

Since there is no point to continue the loop after the target number is found and therefore a break statement (Line 9) is included to terminate the loop.

you are about to install a new desktop application that you downloaded from a website. What should you do before you start the installation?

Answers

Answer:

Set a restore point, confirm system compatibility and turn off the system firewall.

Explanation:

The computer system is divided into hardware and software. The software includes the operating system software that manages the system functionality and application software that comes with the operating system or manually installed by the client.

Manually installed applications from unknown websites can sometimes introduce malicious software like rootkit, Trojan horse and virus to the system which are harmful.

To prevent this, set a restore point, so to be able to revert the installation if it is harmful and allow firewall access for proper installation.

The general idea behind many social networking sites is that people are invited to join by existing members who think they would be valuable additions to the community.True or False.

Answers

Answer:

Option: True

Explanation:

Many social networking sites are virtual community where people who share common interest interact with each other in a digital platform. However, not all people will automatically be accepted into the community group in many of those social networking sites. Participation in community group in some social networking sites are based on invitation by existing members who think they can be valuable to the community.

On a wireless router, what gives out IP addresses?
DHCP
DNS
WPA
WPS

Answers

Answer:

DHCP

Explanation:

DHCP is Dynamic Host Control Protocol that is used to control the assignment of IP addresses to all the devices that are connected to the router. These devices includes computers, laptops and smart phones. The router assign unique IP addresses to each of the devices that is connected to the router and ask for the IP address. The router uses DHCP protocol for the purpose of assigning IP address to the devices.

Our readings so far explored computer hardware and software, in particular operating systems and application software. There are many kinds of hardware, operating systems, and applications. Do some Internet research or use Basic Search: Google to locate an example of hardware that you might encounter as a business professional in your chosen career path. Share what sort of operating system might run on that hardware and what sort of applications would be installed.

Answers

Answer:

Due to the change in technology, the requirement is changed day to day and business requirements also are changed so we need to opt for new technology.

Explanation:

In old days we started with black and white with DOS (DISK OPERATING SYSTEM ) later we changed to color mode with windows 3.1 and later we are all in an upgraded version of windows 10 and some people will use mac or chrome book as hardware and operating system.

As far as software concern people currently opted with java and angular js and node js. And database also changed from SQL to NoSQL.

Technology has limitation and improvement so fixing to technology is not possible

Final answer:

A business professional might use a high-performance laptop with an OS such as Windows 10 Pro or macOS. This system would host a suite of applications for productivity, communication, project management, and specialized tasks like software for artificial limb control. The laptop represents the convergence of hardware, operating systems, and applications in a professional ecosystem.

Explanation:

In the context of a business professional's career path, an example of hardware that might be encountered is a high-performance laptop designed for business applications. A suitable operating system for this laptop could be Microsoft Windows 10 Pro or macOS, depending on the brand and specific user needs. Business professionals often require a variety of applications, including productivity suites like Microsoft Office, accounting software like QuickBooks, communication tools such as Slack or Microsoft Teams, and project management applications like Trello or Asana.

Moreover, technological advancements have allowed computer engineers to create systems that can address specific human-related challenges such as developing software for controlling artificial limbs or adapting vehicles for those with physical challenges. Companies like Microsoft, Apple, and Hewlett Packard are at the forefront of developing such solutions.

The interaction between hardware, operating systems, and applications is critical in the modern business environment. Operating systems, which were once proprietary products associated with particular hardware brands, have diversified with platforms like Windows and macOS. In recent years, open-source alternatives such as Linux have also become prominent, especially for specific use cases or within tech-centric industries.

Overall, computers and the microprocessors within them, which were once limited to enthusiasts, have become ubiquitous in nearly every aspect of modern life, including business, where their usage ranges from task management to sophisticated data processing and control of complex systems.

Where does cable termination occur in most buildings?
CSU/DSU
Core switch
Demarcation point
Patch panel

Answers

Answer:

Demarcation Point

Explanation:

The entrance point that can  be a device for the telecommunication utilities or service providers in the building. From this device or point users of the building takes the connection to their house or building. This point is also known as the termination point of the service to the building. The purpose of the this point is to provide ease in providing their services to the users of the building. The service provider is responsible for the maintenance till this point. After this point the user is responsible for the maintenance of the cable.

How people select, interpret, remember, and use information to make judgments and decisions is called __________.

Answers

Answer: Social Cognition

Explanation: hope this helps

An Update Request provides one-time Editor access. What feature could be used to allow information to be included in an update request, but restrict the recipient from making changes?

Answers

Answer:

The feature is the LOCK ROW FEATURE

Explanation:

There are basically about five to six different step in sending an update request which includes:

Activating or opening the sheet we want to update.

Highlight the row for which we want to request an update. We can decide to highlight multiple rows by using either the Shift or Ctrl direction command key

Click the down arrow in the second column of the row and choose Send Update Request. The Send Update Request dialogue box appears at this point

Then we follow the normal procedure of send a typical email by imputing the subject of mail and recipient then send.

It should be noted that an update request is sent to recipient(s) who will need to click the Update Rows button in the e-mail.

It should also be noted that the recipient’s browser shows a pared-down interface with only the rows you sent visible. The recipient can edit any unlocked rows so to make the recipient unable to edit or restrict recipient from making changes, we Lock the Row.

Internet technology: a. makes it easy for rivals to compete on price alone. b. has lessened competitive rivalries. makes it easy to sustain operational advantages. c. increases the difference between competitors because of the wide availability of information. d. imposes a significant cost of entry, due to infrastructure requirements.

Answers

Answer:

internet technology is based on imposes a significant cost of entry, due to infrastructure requirements.

Explanation:

In today's digital world internet technology is a must and usage is very heavy and with internet technology in the digital world is nothing.

In today's world, every user uses internet technology in their mobile and workstation or desktop or tablet or laptop. if end-user what any piece of information he or she uses the internet technology and search and get the information. For  knowledge learning purpose it is extremely used

Nowadays people use more internet technology rather than call their friends and relatives.

Python provides a special version of a decision structure known as the ________ statement, which makes the logic of the nested decision structure simpler to write.

Answers

Answer:

if-elif-else                                            

Explanation:

In Python if condition is used to decide whether a statement or a block of statements is to be executed or not based on the condition, if the condition evaluates to true then the block of statements is executed and if the condition is false then it is not executed.

Sometimes we need to execute some other statement when the condition is false. For example

if (number1 <= number2)

print (number1,  "is the smallest")

Lets suppose we want to print another statement if this condition evaluates to false. If the condition gets false then the following message should be displayed:

print(number 2, "is the smallest")

For this purpose else statement is used along with if statement to execute the block of code when the if condition evaluates to false.

if (number1 <= number2)

print (number1,  "is the smallest")

else:

print(number 2, "is the smallest")

Now what if there are three numbers or more numbers to be compared in order to identify the smallest number from the given numbers. So in this case we have multiple options to be checked. else statement will not be enough a  for else there can be at most one statement. With if elif else multiple conditions can be checked and if any of the condition evaluates to true then its block of code is executed and if none of the condition is true then the last else statement will be executed.

For example:

if (number1 <= number2) and (number1 <= number3):

print (number1,  "is the smallest")

elif (number2 <= number1) and (number2 <= number3):

print (number1,  "is the smallest")

else:

print (number3,  "is the smallest")

In this example number1 is compared to number2 and number3. If both numbers are less than number1 then the program control goes to elif statement where number2 is compared to number1 and number3. if this condition is false too then the final else part will be printed which is that number3 is the smallest.

Take another example where there are more number of expressions to be checked.

val = 50

if (val == 40):  

   print ("value is 40")  

elif (val== 35):  

   print ("value is 35")  

elif (val == 25):  

   print ("value is 25")  

elif(val==15):

    print ("value is 15")  

else:  

   print ("value is not present")

This will output the else part value is not present, because none of the condition evaluates to true.

Final answer:

Python uses the 'elif' statement as a way to simplify nested decision structures, allowing programmers to add additional conditions without the need for excessive nesting.

Explanation:

Python provides a special version of a decision structure known as the elif statement, which makes the logic of the nested decision structure simpler to write. The elif statement stands for 'else if', and it allows for more succinct and readable conditional logic compared to using multiple if statements. For example:

if condition1:

   # Code block for first condition
elif condition2:

   # Code block for second condition
else:

   # Code block if neither condition is met

Without elif, you would have to nest an if statement within an else block, which could make the code harder to read and understand.

When organizations record versions of their policy in English and alternate languages, they are attempting to meet the ____ criteria to make the policy effective and legally enforceable.
A. Comprehension.
B. Compliance.
C. Review.
D. Dissemination.

Answers

Answer:

C. Review.

Explanation:

Company policy are rules and regulations constructed by a legal team of a company that must be adhere to by all employees and users of the company's services.

There are five requirements for a policy to become enforceable. They are, dissemination, review, comprehension,compliance and uniform enforcement.

Dissemination has to do with the communication of the policy for review. Review is the process that creates alternative language copies of the policy for non English speakers. Compliance is the confirmation of agreement by the employees and comprehension verifies that the policies are understood. Uniform enforcement is a confirmation that the policy has been uniformly enforced on all in the company.

helppppppppppppppppppp

Answers

For both it is the second option I think :)

A ________ is a powerful analytical tool to size up Apple Inc.'s competitive assets in order to determine whether or not those assets can provide the foundation necessary for its competitive success in the marketplace.

Answers

Final answer:

An analytical tool is vital for evaluating competitive assets and ensuring market success. Comparative analysis helps in selecting optimal strategies, while competition analysis aids in defining a company's USP.

Explanation:

The analytical tool is a crucial element in determining Apple Inc.'s competitive assets, ensuring its success in the market. By evaluating factors such as strengths, weaknesses, opportunities, and threats (SWOT analysis), a company can make informed decisions to enhance its competitive position.

Comparative analysis aids in assessing different options like improving existing software or streamlining production processes, helping in choosing the most effective strategy for competitive advantage.

Competition analysis looks into the strengths and weaknesses of competitors, aiding in defining a company's unique selling proposition (USP) in the marketplace.

A loop decision point for an algorithm consists of three features: an initial value, a set of actions to be performed, and a(n) ________.
a. class operator
b. documentation plan
c. test condition

Answers

Answer:

Option c is the correct answer for the above question.

Explanation:

A loop is used to repeat some lines in some specific times which depends on some conditions of the loop. If a person wants to print "welcome" on 5 times then he can do this by two ways one is writing a print statement 5 times and the other is states a loop that executes 5 times through condition. The loop is described or written by three necessary points which are:-

The fist is to initialize the initial value which tells the compiler for the starting point of the loop.The second is to any action for that condition variable which takes the loop for the direction of ending points.The third is a condition that defines the ending point of the loop.

The above question also states about the loop in which first and second points are given then the third point is necessary to complete the sentence which is states in option c. Hence the option c is correct while the other is not because--

Option 'a' states about the class operator which is not the part of the loop. Option b states about the documentation plan which is also not the part of the loop.

The on-demand use of software and other computing resources hosted at a remote data center (including servers, storage, services, and applications) over the Internet is called ________.

Answers

Answer:

Cloud computing.

Explanation:

Cloud computing is a process of using an online platform to centralise the storing and sourcing of information and applications. Cloud computing requires a database or datacenter subscribed service.

There are different areas for cloud computing services, they are, IaaS (infrastructure as a service), PaaS (platform as a service), SaaS (software as a service) and MaaS ( mobility as a service).

It helps provide large inexpensive online resources for companies as compared to establishing and maintaining database servers.

Which of the following statements is true?

1. Data and information are two terms that can be used interchangeably.
2. Information is data that has been organized.
3. Information is data that has been sifted.
4. Data is information that has been extracted.

Answers

Answer:

1. Data and information are two terms that can be used interchangeably.

Explanation:

Data is a raw fact, but information is a meaningful term.

Multiple data produce information

Data need to be processed toform information, information is understandable

The correct statement : Information is data that has been organized.

Hence correct statement is B .

Given, statements regarding data and information .

1. Data and information are two terms that can be used interchangeably.

This statement is not true.

While data and information are related, they are not the same thing. Data refers to raw facts, figures, or symbols that do not have any meaning on their own. On the other hand, information is the result of processing and organizing data in a meaningful way.

2. Information is data that has been organized.

This statement is true.

Information is created by organizing and processing data. When data is organized, categorized, or structured in a particular way, it becomes more meaningful and useful.

3. Information is data that has been sifted.

This statement is not entirely accurate.

While sifting or filtering data can be a part of the process of creating information, it is not the only step. Sifting implies removing unwanted or irrelevant data, which can help in narrowing down the focus, but it does not necessarily result in information.

4. Data is information that has been extracted.

This statement is not true.

Data is not the result of extracting information; rather, it is the raw material that is used to generate information. Data is collected, gathered, or obtained from various sources. It is then processed, organized, and analyzed to extract meaningful insights, which then become information.

Hence option B is correct .

Know more about data and information,

https://brainly.com/question/13301099

#SPJ6

USDA-APHIS Animal Care Resource Policy #12 "Considerations of Alternatives to Painful/Distressful Procedures" states that when a database search is the primary means of considerations to alternatives of painful and distressful procedures, that a narrative should include all of the following except:
A. The name of the databases searched
B. The date the search was performed
C. The specific field of study
D. The search strategy (including scientifically relevant terminology) used
Click card to see definition ????
C. The specific field of study
Click again to see term ????
Which of the following should be considered a significant change to an animal use proposal?
A. change in departmental affiliation of the principal investigator
B. change in start date of study
C. change in anesthetic agent
D. change in fluid administration
Click card to see definition ????
C. change in anesthetic agent
Click again to see term ????
1/566



Created by
edgar_rowton
Terms in this set (566)
USDA-APHIS Animal Care Resource Policy #12 "Considerations of Alternatives to Painful/Distressful Procedures" states that when a database search is the primary means of considerations to alternatives of painful and distressful procedures, that a narrative should include all of the following except:
A. The name of the databases searched
B. The date the search was performed
C. The specific field of study
D. The search strategy (including scientifically relevant terminology) used

Answers

Answer:

C. The specific field of study

C. change in anesthetic agent

Explanation:

In the consideration for the procedure, some information are required and examples are the strategy of the search/the database name. However, the area of study is not one of the information.

The animal use proposal can general be altered based on the type of change required. However, an anesthetic agent alteration is not a significant change.

Other Questions
All of the following are benefits of hosted data warehouses EXCEPT: a. Frees up in-house systems b. Smaller upfront investment c. Better quality hardware d. Greater control of data Mark wants to become a successful businessman. He studies how Bill Gates, the founder of Microsoft, became wealthy. This is an example of a(n) ______. In England, peppered moths have two color forms, light and dark. Dark is a dominant trait. Until about 1850, the majority ofmoths in England were light colored. With the beginning of the Industrial Revolution in the late 1800's, the moth populationbegan to change color. The majority of the moths were dark by the 1920's. How can this be explained genetically? Which of the following questions is most likely to be asked by a creditor? a. Will the company be capable of repaying its debt when it is due? b. What are the companys terms of credit with its suppliers? c. Will the companys stock increase in value? d. What is the amount of taxes owed to the government? In March 2006, two small satellites were discovered orbiting Pluto, one at a distance of 48,000 km and the other at 64,000 km. Pluto already was known to have a large satellite, Charon, orbiting at 19,600 km with an orbital period of 6.39 days.Part AAssuming that the satellites do not affect each other, find the orbital periods T1 and T2 of the two small satellites without using the mass of Pluto.Enter your answers numerically separated by a comma. samsung come out with a new smart phone called Galaxy explosion 5 which is comparable to the newest iphone but cheaper. Dtermine the supply and demand curve for iphones. Cuando tengo seda. pido mariscosb. bebo algoc. pongo la mesad. all of the above This intermediary generally accepts contributions from both employers and employees, and its funds are usually shielded from taxes until the funds are withdrawn. in two or more complete sentences, describe how climate change can vary from one region to the next. A politicians support grew from 42% by 3 percentage points to 45%. What percent (relative) change is this? Consider that you have a 100 mM stock solution and you need to prepare 10 mL of a 30 mM solution. How many milliliters of the stock solution do you need? mL How many milliliters of deionized water do you need? mL An ideal spring has spring constant ks (to distinguish it from the electrostatic constant k) and equilibrium length l. Then, you glue two identical negative point charges to the ends of the spring and observe that the equilibrium length doubles. Determine the amount of charge on each end of the spring Ikyjahs cat is stuck up a tree. To rescue it, he places the base of a 10 ft ladder 3 ft away from the base of the tree. What is the height of the branch which the cat is stuck on? There are 100 students at a swim meet. Every 3rd finisher in the race receives a medal. Every 5th finisher gets a ribbon. How many people will receive a medal AND ribbon. Athletes can decrease their chance of injury by stretching. When should they stretch?A.They should stretch before their warm up and before their main exercise,B.They should stretch before their warm up and after their main exerciseThey should stretch after their warm up and before their main exercise,OD.They should stretch after their warm up and after their main exercise, Shakespeare foreshadows inevitable future disappointment in which of the following excerpts? a. Thy youth's proud livery so gazed on now, Will be a tattered weed of small worth held: b. This was to be new made when thou art old, And see thy blood warm when thou feel'st it cold. c. When forty winters shall besiege thy brow, And dig deep trenches in thy beauty's field, d. How much more praise deserved thy beauty's use If thou couldn't answer 'This fair child of mine." P and S waves from an earthquake travel at different speeds, and this difference helps locate the earthquake "epicenter" (where the disturbance took place). a. Assuming typical speeds of 8.5 km/s and 5.5 km/s for P and S waves, respectively, how far away did an earthquake occur if a particular seismic station detects the arrival of these two types of waves 1.5 min apart? b. Is one seismic station sufficient to determine the position of the epicenter? Explain. Please answer as soon as possible. Write the mixed number -7 1/7 as an improper fraction. Chavez Corporation reported the following data for the month of July: Inventories: Beginning Ending Raw materials $ 34,000 $ 33,500 Work in process $ 19,500 $ 24,000Finished goods $ 35,500 $ 50,500 Additional information: Raw materials purchases $ 69,500 Direct labor cost $ 94,500 Manufacturing overhead cost incurred $ 62,500 Indirect materials included in manufacturing overhead cost incurred $ 9,400 Manufacturing overhead cost applied to Work in Process $ 61,500 Any underapplied or overapplied manufacturing overhead is closed out to cost of goods sold. Required: The direct materials cost for July is ____________. Steam Workshop Downloader