Background information: This is an excerpt from a 1433 speech by Emperor Zhu Di.

Due to so many unexplained difficulties and bad omens, the Majesty is humbled and concerned. . . . To alleviate the situation, all policies that cause the public inconvenience, if not urgent, should be stopped. . . . Policies temporarily stopped include the voyages to foreign countries, horse trading with the remote western and northern areas.

What Ming political and economic policy does this excerpt provide an example of?

commercialism
Confucianism
kowtowing
isolationism

Answers

Answer 1

Answer:

D. isolationism

Explanation:


Related Questions

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

Answers

Answer:

spooler

Explanation:

A print server uses a print spooler as a software holding area for jobs waiting to be printed.

Spooler lol lol lol lol

You found the prime factorization of the number 72.
Explain how you can check your answer.


You’ll get 100 points. I swear.

Answers

The prime factorization for 72 is 2×2×2×3×3.

The prime factors of a number are all the prime numbers that, when multiplied together, equal the original number. You can find the prime factorization of a number by using a factor tree and dividing the number into smaller parts.

Answer:

Explanation:

Start dividing the number by the smallest prime number i.e., 2, followed by 3, 5, and so on to find the smallest prime factor of the number. Again, divide the quotient by the smallest prime number. Repeat the process, until the quotient becomes 1 after repeated division.

Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be Integrated into the database. This creates a backup for the database developer. But it also means that the other developers must either wait or add to a growing pile of database work. What's one possible solution to this challenge?

Answers

Members of an Agile development team often agrees on what tasks to work on and they do it together. The one possible solution to this challenge is to Have the database developer train the rest of the team so there are fewer handoffs.

Agile development team often works together as a team. They as team discuss the task yo take, when it will take place etc.

This team is all about communication, teamwork, problem-solving etc.

Conclusively, A task should be completed by one member on the team, but the team may choose to pair up when doing the work.

Learn more from

https://brainly.com/question/24383225

See full question below:

Your agile team only has one person who knows how to develop database software. So the other developers finish their tasks and then wait for their work to be Integrated into the database. This creates a pile of backed up work for the database developer. But it also means that the other developers must either wait or add to the growing pile of database work. What's one possible solution to this challenge?

Select an answer:

Have the database developer train the rest of the team so there are fewer handoffs.

Have the software developers split their time between other teams so they're not as productive

Encourage the database developer to work overtime to catch up with their work.

Create a large batch of work so the database developer can focus on finishing

you are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activity.you have noticed that the action you have taken needs to be improved.

action to the problem\tasks:​

Answers

Answer:

answer it yourself or ask your teacker

Explanation:

this has nothing to do with computers but its for brainly. if somebody is an expert in brainly im not sure. but why do my questions keep getting deleted? my question “does not follow guidelines” but im just trying to ask a math question

Answers

Answer:

Maybe its a word or the subject you are talking about. If its a exam or ohio state test they might delete you're question.

g Write a recursive program that causes the program to crash. How calls does it take before it crashes

Answers

Answer:

Every recursive function must have a base condition that stops the recursion or else the function calls itself infinitely. The Python interpreter limits the depths of recursion to help avoid infinite recursions, resulting in stack overflows. By default, the maximum depth of recursion is 1000 .

Explanation:

Define three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was stored in cleartext files.

Answers

Security controls are measures that are put in place to control or prevent the attack of a threat on a system. The three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was stored in cleartext files are;

Physical ControlsTechnical ControlsAdministrative Controls

Physical controls refer to the measures that are put in place so that unauthorized access to sensitive files is warded off.

It could imply Installing cameras and fingerprinting to prevent such access.

Technical controls are installed to protect the hardware and software. Systems might need to be configured and programmed in such a way that can resist any attack from threats.

Antivirus and data encryption are types of technical controls.

Administrative controls are installed through the policies and standards of operations of the organization.

Through training, new employees are educated on ways to protect the systems from attack.

Learn more here:

https://brainly.com/question/24674099

I'm surprised I haven't even got a single warning yet lol

Answers

Answer:

Thats good

Explanation:

Thanks for the points~! ;)

A new pet store wants to design a logo to be displayed on business cards, posters in the shop’s windows, and on a sign above the building. The best way to create and save this logo is as a
VML graphic.
JPG graphic.
GIF graphic.
RAW graphic.

Answers

Answer:

B

Explanation:

Answer:B

Explanation:

Companies that produce games for sale are called
A. publishers
B. promoters
C. producers
D. studios

Answers

Answer:

im pretty sure it is a. publishers

Explanation:

but dont get mad or quote me if im wrong

what is the first step in search engine optimazation process for your website​

Answers

the first step for optimizing your website. Any search optimisation begins with the hunt for keywords. You have to understand the current environment of the search and your keywords. This is not only important at the start of any marketing strategy, but also sometimes appropriate to re-evaluate

a software that interprets commands from the key board and mouse is know as

Answers

Explanation:

a virus does that............

Describe alternative storage location(s) that could be used for data backup storage. What are the advantages and disadvantages of using such locations

Answers

Answer:

fácil solo regalar a los jóvenes que y poner un stock en él

You are working part time providing computer support for a veterinarian’s office. When you arrive to work one morning, the receptionist informs you that the computer monitor is not displaying anything. List at least three steps you will perform to troubleshoot the problem, and list three possible causes.

Answers

reboot the whole computer,

Explanation:

someone being on it when they shouldn't have

A __________ is a special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent loops from happening in the first place.

Answers

bridge protocol data units (BPDU)s is a special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent loops from happening in the first place?

Write code to assign name and density properties to currMat, and store currMat in requestedMaterials. Input first receives a name value, then a density value. Input example

Answers

The code block creates a list of tuples which holds the name and Density values of materials. The program written in python 3 goes thus ;

name = input()

#accepts name input from user

name = [n for n in name.split()]

#split the inputs

density = input()

#accepts density inputs

density = [int(d) for d in density.split()]

#split the density inputs

currMat = list(zip(name, density))

#combines the inputs into a list of tuples

requestedMaterial = currMat

#assigns to another variable

print(requestedMaterial)

A sample run of the program is attached

Learn more :https://brainly.com/question/25700348

You will complete this task in your own editor and upload a file named menu1.py to the zybook.
Write a function called menu_info that has two required parameters, both strings.
The first string is the name of a csv file with 1 row per menu item and 1 column per piece of nutritional information (including a header row) and the second string is the name of 1 menu item.
The function should read in the csv file and then return a list of lists. The first list is the header row and the second list is all of the data for the specified menu item.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the list of lists that is returned from your function call.
Your code should work for any csv file with this structure. A sample file can be downloaded in the lab.
Menu Summary
In your own editor, create a file named menu2.py that you will upload to the zybook for your submission.
Write a function called menu_summary that has one parameter, a string with the name of a file with the menu for a restaurant. \
The first row of the csv file is the headers. The second row tells you if 'healthy' is defined as a high or low value for that category, and then there is 1 row per menu item.
The function should read in the csv file and then create a dictionary where the keys are the nutrition headers and the values are the menu items (one per nutrition category) that have the 'healthiest value for that category. Return the dictionary.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the dictionary that is returned from your function call.
Your code should work for any csv file. You may download a sample file from the lab.

Answers

Answer:

abc

Explanation:

Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Sample output with inputs 2014 777: Dog license: 77702014

Answers

Answer:

I am writing the program in JAVA and C++

JAVA:

public int createLicenseNum(int customID){  //class that takes the customID as parameter and creates and returns the licenseNum

       licenseNum = (100000 * customID) + licenseYear;  //licenseNum creation formula

       return(licenseNum);     }

In C++ :

void DogLicense::CreateLicenseNum(int customID){ //class that takes the customID as parameter and creates the licenseNum

licenseNum = (100000 * customID) + licenseYear; } //licenseNum creation formula

Explanation:

createLicenseNum method takes customID as its parameter. The formula inside the function is:

licenseNum = (100000 * customID) + licenseYear;

This multiplies 100000 to the customID and adds the result to the licenseYear and assigns the result of this whole expression to licenseNum.

For example if the SetYear(2014) means the value of licenseYear is set to 2014 and CreateLicenseNum(777) this statement calls createLicenseNum method by passing 777 value as customID to this function. So this means licenseYear = 2014 and customID  = 777

When the CreateLicenseNum function is invoked it computes and returns the value of licenseNum as:

licenseNum = (100000 * customID) + licenseYear;

                   = (100000 * 777) + 2014

                    = 77700000 + 2014

licenseNum = 77702014                                                                                                        

So the output is:

Dog license: 77702014          

To call this function in JAVA:

public class CallDogLicense {

public static void main(String[] args) {//start of main() function

  DogLicense dog1 = new DogLicense();//create instance of Dog class

dog1.setYear(2014); // calls setYear passing 2014

dog1.createLicenseNum(777);// calls createLicenseNum passing 777 as customID value

System.out.println("Dog license: " + dog1.getLicenseNum()); //calls getLicenseNum to get the computed licenceNum value

return; } }

Both the programs along with the output are attached as a screenshot.

A developer is responsible for defining the architecture of an app. Describe three parts of that architecture.

Answers

Answer:

Application Architecture: The application architecture is designed by an application architect, who is responsible for designing application layers, formulating application specifications, and defining APIs and data interaction protocols based on the needs of business scenarios.

Explanation:

Application architecture portrays the behavior of applications and their interactions. The app architecture includes a UI layer, a domain layer, and a data layer.

What is application architecture?

Application architecture is a domain in an information system that describes the interaction of the various application used for different purposes. This is designed by an application architect.

They design the application layers that include the UI, domain, and data layer that defines the APIs and other protocols that are followed to make the application work.

Therefore, application architecture defines the application interactions.

Learn more about application architecture here:

https://brainly.com/question/17347510

#SPJ2

13.12 LAB: Contains the character

Write a program that reads a character, then reads in a list of words. The output of the program is every word in the list that contains the character at least once. Assume at least one word in the list will contain the given character.

Ex: If the input is:

z
hello zoo sleep drizzle
the output is:

zoo
drizzle
Keep in mind that the character 'a' is not equal to the character 'A'.

Answers

Answer:

Explanation:

The required program prints words which have an occurrence of an inputted alphabet from a list of given words. The program written in python 3 goes thus :

character = input("Enter a character: ")

#prompts user of character of choice

words = input("Enter the words: ")

#prompts user to enter a list of words

split_words = words.split()

#split the words in the list given

for w in split_words:

#iterate through the splitted words

if character in w:

#if an occurence of the character exists in the word

print(w)

#print the word.

A sample run of the program is attached

1. A school has two separate computer networks One is used for keeping pupil and staff records
The other is for pupil to use in lessons to help in their learning and also store their work.
Pupils use the internet quite frequently in their lessons to help them with their work.Discuss the
advantages (3) and disadvantages(3) of this as far as a pupil is concerned.

Answers

Answer:

Explanation:The internet has both advantages and disadvantages

Some advantages includes:

The internet is used for research purposes,the internet enables students to learn on their own pace and basically provides vital information and online books for students to learn

Some of the disadvantages include:

Internet fraud on the part of students,exposure to ponographic materials etc.

write a program that reads a one-line sentence as input and then displays the following response: if the sentence ends with a question mark (?) and the input contains an even number of characters, display the word Yes. If the sentence ends with a question mark and the input contains an odd number of characters, display the word No. If the sentence ends with an exclamation point (!), display the word Wow. In all other cases, display the words You always say followed by the input string enclosed in quotes. Your output should all be on one line. Be sure to note that in the last case, your output must include quotation marks around the echoed input string. In all other cases, there are no quotes in the output. Your program does not have to check the input to see that the user has entered a legitimate sentence.

Answers

We use if-else structure to check if the sentence meets the requirements for each situation.

endswith() method is used to check if the sentence ends with the target character. modulo(%) operator is used to check if the sentence contains even or odd number of charactersescape character is used to print the quotation marks in the else part

Comments are used to explain each line of the code.

#get the user input

sentence = input("Enter a sentence: ")

#check if the sentence ends with ? and has even number of characters

if sentence.endswith("?") and len(sentence) % 2 == 0:

   print("Yes")

#check if the sentence ends with ? and has odd number of characters

elif sentence.endswith("?") and len(sentence) % 2 == 1:

   print("No")

#check if the sentence ends with !

elif sentence.endswith("!"):

   print("Wow")

#used for other situations

else:

   print("You always say \"{}\"".format(sentence))

You may see a similar question at:

https://brainly.com/question/14851610

Which process would benefit from the use of Robotic Process Automation?

Answers

Answer:

Cost-Effective.  Accuracy & Quality. Consistency.  Improved Analytics. Increased Employee Productivity.

¿Qué tipo de información deben proteger los sitios de comercio electrónico?​

Answers

Come Estás How are you
Deben proteger la información personal, como el lugar donde vive y su dinero.

(They should protect personal information like where you live and your money)


This sentence would typically be written by a student in Spanish 2-3.

Buena Suerte!

Happy Thanksgiving!!!!

Answers

Yoo, you too, bro!

                                            Have a nice time with your family

                                                   

You know what? I quit...

Answers

everytime i add a question I need help with it keeps saying it was removed because of community guidlines

Explanation:

What's wrong with SontungMTP's song?
A) The passing rain
B) laylalay
C) Bigcityboy
who is a fan i know

Answers

Answer:

A

Explanation:

The application window controls include: minimize, maximize, and close

A) true
B) false

Answers

Answer:

True

Explanation:

Look at the top right of your computer while having a chrome tab open. You will see a line, a box, and a x. Hover over each and you can see the names.

Evaluate the https://mwasalat.om/en-us/ website you should mention the following criteria in evaluating the website. Look & feel Usability . Readability Traffic & Suggestions to improve the system​


https://mwasalat.om/en-us/

Answers

Answer:

sorry i need points .................

Pls Help! Worth 30 Points ​

Answers

Answer:

Um I cant really see the questions type them in the comments then I can Help you

Other Questions
how did the open door policy and dollar diplomacy affect the economy in the united states? In the early 1900s, Robert Goddard proposed sending a rocket to the moon. Critics took the position that in a vacuum such as exists between Earth and the moon, the gases emitted by the rocket would have nothing to push against to propel the rocket. To settle the debate, Goddard placed a gun in a vacuum and fired a blank cartridge from it. (A blank cartridge fires only the hot gases of the burning gunpowder.) What happened when the gun was fired 1) What is revealed by the dependent clause in this sentence?A) what the people are doingB) how the people are doing what they are doingwhen the people are doing what they are doingD) where the people are doing what they are doing The ratio of the ages of father and son is 5:2. The summation of their present ages is 49 years. After how many years, the age of the father will be triple the age of son? how many years of history did the nfl celebrate during the 2019-2020 season? How much has our global temperature risen in the last 100 years? A. 5.0F B. 10F C. 0.5F D. 1.0F change it to singular to plural el profesor es trabajador y creativo. Why is it important for the immune system to distinguish self from other 1. Pedrotrabajamucho________________ganapoco.2. Ana___________________________trata,siemprellegatarde.3. Ir al baile_____ ayudo a mam lavando platos.4. Ingresar a la preparatoria____________ estudi todo el ao.5. __________________________ de que no llegaron a tiempo, me fui sola.6. Tengomuchofro___________________________traigochamarraygorro.7. Tendr mucho dinero______ trabajo todos los das.8. __________________________quehagomuchoejercicio,nobajodepeso.9. Estoytanfeliz________unalombriz Line G passes through points (-3,-2) and (1,4) what is the slope of line G? Can someone help please WILL MARK BRAINLIEST TO FIRST CORRECT ANSWER The relative who lives in my neighborhood is my grandma. is the adverb,noun,or relative? What kind of fiscal policy would work fastest during a recession and would be effective at growing the economy, as opposed to working more slowly during a recession What is the variable equal to? t 5 = 60 t = 300 t = 12 t = 13 t = 10 What are the two questions that you want to ask to clarify. Jordan is thinking of a number that is less than 10. Which inequality would put this into a number sentence?x > 10x < 10 C++ pleaseProblemIn the IDE to the left, the class MP3 is already defined. Complete the class Podcast that inherits from MP3. This class should do the following things:Inherit the constructor such that Podcast has the following attributes:title - a string that is the title of the episodelength - an integer that has the length of the podcast in secondsgenre - a string that is the genre of the podcastname - a string that is the name of the podcastdate - a string that represents when the podcast was released to the publicDO NOT EDIT the specified code or you might not receive credit for your work!Hint: Connecting the ConstructorsNote that a few of the attributes are present in both the MP3 and Podcast classes. To connect their constructors, you can use the same parameter values for the attributes that are the same, then use different parameter values for the attributes that are different. Finally, set the attributes to the parameters appropriately for the ones that are different. For example:Podcast(string t, int l, string g, string n, string d) : MP3(t, l, g, n, d) { name = n; date = d;}Given Code#include using namespace std;//DO NOT EDIT code below this lineclass MP3 { public: MP3(string t, int l, string g, string al, string ar) { title = t; album = al; length = l; genre = g; artist = ar; } string GetTitle() { return title; } void SetTitle(string new_title) { title = new_title; } int GetLength() { return length; } void SetLength(int new_length) { length = new_length; } string GetGenre() { return genre; } void SetGenre(string new_genre) { genre = new_genre; } string GetAlbum() { return album; } void SetAlbum(string new_album) { album = new_album; } string GetArtist() { return artist; } void SetArtist(string new_artist) { artist = new_artist; } private: string title; int length; string genre; string album; string artist;}; What do you think is the best horror game BATIM FNAF or Baldi's Basics? You have $150 in your checking account and have the choice of paying for a $100 purchase with either your credit card or your debit card. What will your balance in your checking account be after you pay for thatpurchase with your credit card?A. $50B. $200C. $100D. $150