Under foreign corrupt practices act, under what conditions is a bribe not unlawful explain and provide an example

Answers

Answer 1

Answer:

ex. telling your children if you clean up you get new toys


Related Questions

full meaning of ENDVAC

Answers

Answer:

EDVAC was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors John Mauchly and J. Presper Eckert proposed the EDVAC's construction in August 1944.

Explanation:

Here is the full meaning

Which statement is true for slide or positive film?
A.
Slides or positive films give low color saturation and contrast.
B.
Slides or positive films give high quality pictures with higher color saturation and contrast.
C.
Slide or positive films cannot be used to digitize and scan pictures.
D.
Slide or positive films are useful for cheaper compact cameras.

Answers

Answer:

B.

Slides or positive films give high quality pictures with higher color saturation and contrast.

Explanation:

The above is true for slides with positive film. This is because, the positive film happens to have a high resolution when it was been used thereby giving out a high quality video at the end of the recording. The higher colour saturation and contrast are also an attribute of a slide  or positive film.

Answer:

B

Explanation:

Create the HTML code for this
1.Font size for the text is 20px2.Background color for table dataiscyan and table headeris lightgrey.3.Text is center aligned.4.Height of the table is 200px andwidth is 500px.5.Border thickness 2px,colour black and collapsed

Answers

Answer:

index.html:

<!DOCTYPE html>

<html>

 <head>

   <title>Brainly</title>

   <link href="style.css" rel="stylesheet" type="text/css" />

 </head>

 <body>    

   <table id="myTable">

     <caption>Duty Roster for last two days</caption>

     <tr><th>Day</th><th>Morning</th><th>Afternoon</th></tr>

     <tr><td>Monday</td><td colspan="2">John</td></tr>

     <tr><td>Tuesday</td><td rowspan="2">Tom</td><td>Peter</td></tr>

     <tr><td>Wednesday</td><td>simon</td></tr>

   </table>

 </body>

</html>

style.css:

#myTable {

 background-color: Cyan;

 border-collapse: collapse;  

 height: 200px;

 width: 500px;

 font-size: 20px;

}

#myTable td,th {

 border: 2px black solid;

 text-align: center;

}

#myTable td:first-child, th {

 background-color: lightgray;

 font-weight: bold;

}

One of the following represent class B IP address? A.255.255.255.0 B. 125.123.132 C.24.67.11.8 D.191.23.21.54​

Answers

Answer:

D.191.23.21.54

Explanation:

Class B networks use a default subnet mask of 255.255. 0.0 and have 128-191 as their first octet. The address 191.23.21.54 is a class B address

(Please heart the answer if you find it helpful, it's a motivation for me to help more people)

What are the inputs and outputs of the app "Spotify"?

Answers

Hey the I/O for Spotify would be. for I or input keyboard and mouse.

and for O or output the sound files being sent from the server to the pc

Hope this helps.

-Toby  aka scav

Answer:

Input is for mics and other tools, output is your audio interface, speakers, headphones, so on. 3. At the top you'll find general system-wide settings, below you find dedicated settings for each open app. You'll need to have Spotify open to see it there.

Explanation:

In MS Excel, a function is written as =FUNCTION_NAME(_____________________).​

Answers

Explanation:

A function is a predefined formula that performs calculations using specific values in a particular order. All spreadsheet programs include common functions that can be used for quickly finding the sum, average, count, maximum value, and minimum value for a range of cells. In order to use functions correctly, you'll need to understand the different parts of a function and how to create arguments to calculate values and cell references.

Companies sometimes pay search engine companies to have their websites located at the top of the search results. Do you think this is fair/ethical?

Answers

Answer:

I really don't think that it is fair or ethical.

Explanation:

When companies pay to put their websites at the top it is known as an ad. They are in top search engines like the ones we use every day. I believe this is unethical because it often results in confusion and sometimes misleads the user as the titles often use clickbait.

why is it important to give files name that are descriptive of their content​

Answers

Answer:

Provide a descriptive document file name and title

A unique, descriptive file name helps individuals understand the general topic of a document. Include similar information when writing the title of the document, and apply appropriate punctuation, e.g., no underscores.

Explanation:

Please give thanks to all my answers and please mark as brilliant and please follow me

list out various computer generation long with their basic characteristic ​

Answers

Answer:

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ... 1956 – 1963: Second Generation – Transistors. ... 1964 – 1971: Third Generation – Integrated Circuits. ... 1972 – 2010: Fourth Generation – Microprocessors

Explanation:

there are 4 generations ok

please mark me as brainlist

Explain different types of networking-based attacks

Answers

Answer:

Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it

Implement the function permutations() that takes a list lst as input and returns a list of all permutations of lst (so the returned value is a list of lists). Do this recursively as follows: If the input list lst is of size 1 or 0, just return a list containing list lst. Otherwise, make a recursive call on the sublist l[1:] to obtain the list of all permutations of all elements of lst except the first element l[0]. Then, for each such permutation (i.e., list) perm, generate permutations of lst by inserting lst[0] into all possible positions of perm.

>>> permutations([1, 2])

[[1, 2], [2, 1]]

>>> permutations([1, 2, 3])

[[1, 2, 3], [2, 1, 3], [2, 3, 1], [1, 3, 2], [3, 1, 2], [3, 2, 1]]

>>> permutations([1, 2, 3, 4])

[[1, 2, 3, 4], [2, 1, 3, 4], [2, 3, 1, 4], [2, 3, 4, 1],

[1, 3, 2, 4], [3, 1, 2, 4], [3, 2, 1, 4], [3, 2, 4, 1],

[1, 3, 4, 2], [3, 1, 4, 2], [3, 4, 1, 2], [3, 4, 2, 1],

[1, 2, 4, 3], [2, 1, 4, 3], [2, 4, 1, 3], [2, 4, 3, 1],

[1, 4, 2, 3], [4, 1, 2, 3], [4, 2, 1, 3], [4, 2, 3, 1],

[1, 4, 3, 2], [4, 1, 3, 2], [4, 3, 1, 2], [4, 3, 2, 1]]

Answers

Answer:

def permutations(myList: list)-> list:  

   if len(myList) <= 1:  

       return [myList]  

   perm = []  

   for i in range(len(myList)):  

      item = myList[i]  

      seglists = myList[:i] + myList[i+1:]  

      for num in permutations(seglists):  

          perm.append([item] + num)  

   return perm

 

data = [1,2,3]  

result = permutations(data)  

print(result)

Explanation:

The program defines a python function that returns the list of permutations. The program checks if the length of the input list is less than or equal to one. The function declaration identifies the input and output as lists.

The for loop iterate through the list and the permutations are saved in an empty list in the next loop statement. At the end of the program, the list of lists is returned.

when you value stored in a variable its previous value gets _________.
a) Accepted b) Overwritten c) Overlapped​

Answers

Answer:

B

Explanation:

You wore more a thu friends


What are examples of object types that can be viewed in the Navigation pane? Check all that :

commands
forms
options
queries
tasks
tables

Answers

Answer:

2.) Forms

4.) Queries

6.) Tables

Explanation:

The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the CREATE TABLE statement that inserts the following movies:
Title Rating Release Date
Raiders of the Lost Ark PG June 15, 1981
The Godfather R March 24, 1972
The Pursuit of Happyness PG-13 December 15, 2006
Note that dates above need to be converted into YYYY-MM-DD format in the INSERT statement. Run your solution and verify the movies in the result table have the auto-assigned IDs 1, 2, and 3.
CREATE TABLE Movie (
ID INT AUTO_INCREMENT,
Title VARCHAR(100),
Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')),
ReleaseDate DATE,
PRIMARY KEY (ID)
);
-- Write your INSERT statement here:

Answers

Answer:

INSERT INTO Movie(Title,Rating,ReleaseDate)

VALUES("Raiders of the Lost ArkPG",'PG',DATE '1981-06-15'),

("The Godfaher",'R',DATE '1972-03-24'),

("The Pursuit of Happyness",'PG-13',DATE '2006-12-15');

Explanation:

The SQL statement uses the "INSERT" clause to added data to the movie table. It uses the single insert statement to add multiple movies by separating the movies in a comma and their details in parenthesis.

name 20 input device​

Answers

Answer:

I wish that is helpful

.........

Answer:

Some Input devices are;

KeyboardMouseLight penMicrophoneDocument scannerCharacter readerBar-Code readerTrack pointTouch padTrack ballDigital cameraMagnetic Ink Character readerMagnetic stripTouch screen

A company utilizes a specific design methodology in the software design process. They utilize concepts of encapsulation in design. Which design
methodology would they be using?
A
structured design
B.
modular design
C.
object-oriented design
rapid application development
D
E
use-case design

Answers

Answer:

C. object-oriented design

Explanation:

Answer:

c. object- oriented design.

Explanation:

i took the test.

Use the five-step decision-making process discussed in Chapter 1 to analyze the following situations and recommend a course of action.

You are a new salesperson at a large software manufacturing firm. It is three weeks from the end of the sales quarter and you and your sales manager are sitting pretty—you have both already met your sales quota for the quarter. In addition, you just closed another deal with a new customer for $100,000 of software and customer service. This order would put you way over your sales quota for the current quarter. Your manager suggests that you hold this new order so it gets recorded against next quarter. She explains that because sales during the next three months tend to slow down, salespeople frequently miss their quotas and associated sales bonuses for that quarter. Holding this large order to next quarter would help you get an excellent start and almost guarantee that you meet your quota. What would you do?

Answers

Answer:

The responses to this question can be defined as follows:

Explanation:

Yeah, their numerous sponsorships brands have potential. Every business does have its Trademarks for a commodity, that distinguishes others. It's an infringement for trademarks, it has only provided to those trivialities, which success and if I would plan this for my friend. I would never list or show those points of his accomplishments I never would Numerous sponsors. This should include all its information using its trademarks as well as other Site partners are excluded even though they are or are browsing their trademarks where the law is prohibited.

____________ reference is used when you want to use the same calculation across multiple rows or columns.

Answers

Answer:

relative cell

Explanation:

So, if you want to repeat the same calculation across several columns or rows, you need to use relative cell references. For example, to multiply numbers in column A by 5, you enter this formula in B2: =A2*5. When copied from row 2 to row 3, the formula will change to =A3

Answer:

Relative

Explanation:

Relative  reference is used when you want to use the same calculation across multiple rows or columns.

Convert (24) 10 to binary​

Answers

Answer:

Decimal 24 to Binary Conversion

The base-10 value of 24 10 is equal to base-2 value of 110002.

I hope it's helpful!

Answer:

The binary of 24 is 11000

what is the file extension if the file editing​

Answers

Explanation:

"A file extension (or simply "extension") is the suffix at the end of a filename that indicates what type of file it is. For example, in the filename "myreport. txt," the . TXT is the file extension.Sometimes long file extensions are used to more clearly identify the file type."

What is one way to use proper netiquette when communicating online? Ask permission before posting private information. Post a message when you are angry Use CAPS when sending a message. Use unreliable sources.

Answers

Answer: A

Explanation:

Being a responsible netizen you must respect anyone using internet. Be mindful of what you share which include fake news, photos and video of others. Watch you're saying, if you wouldn't say something in real life dont say it online. You must think before you click not to hurt others.

Answer:

Ask permission before posting private information.

Explanation:

Just the most logical answer

Advantages of special purpose computer

Answers

Answer:

The main advantage of the special-purpose systems is the possibility to utilize a much higher fraction of available silicon to actually do calculations. ... All the rest of the calculation, such as the time integration of the orbits of particles, I/O, and diagnostics are handled by a general-purpose host computer..

Explanation:

algorithm and flowchart of detect whether entered number is positive, negative or zero​

Answers

What is this how many times are you going to say that unless it’s a visual glitch on my part?

What happens when two users attempt to edit a shared presentation in the cloud simultaneously? The second user is unable to open the presentation. When the second user logs on, the first user is locked out. A presentation cannot be shared in the cloud for this reason. A warning notice will alert the users that the presentation is in use.

Answers

Answer:

a warning notice will alert the users that the presentation is in use

Explanation:

I did it on edge

Answer:

D; A warning notice will alert the users that the presentation is in use.

Explanation:

Edge

It is important to create a strong password because it will

let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus

Answers

Keeps your private information safe and secure...
PLP 2021

1. What characteristics are common among operating systems? List types of operating systems, and
examples of each. How does the device affect the functionality of an operating system?

Answers

The fundamental software applications running upon that hardware allow unauthorized to the interface so much with the equipment because then instructions may be sent and result obtained.

Some characteristics of OS are provided below:

Developers provide technology that could be suitable, mismatched, or otherwise completely at odds with several other OS categories throughout various versions of the same similar OS.Throughout two different versions, the OS's are often 32 as well as 64-Bit.

Type of OS:

Distributed OS.Time-sharing OS.Batch OS.

Learn more about the operating system here:

https://brainly.com/question/2126669

Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: handy man, restart, shut down, call, and thank you.

Answers

Answer:

You should restart your computer

Answer:

You could call a handy man to take a look at your computer if you are having drastic issues. You could also restart or shut down you computer a few times because it might need a massive update. You might need to call the company  you bought your computer from and ask about what to do when that problem is happening. Thank you for reading my answer!

Explanation:

I think these answers make since.


Name the eight areas in which computers are used.
1.
2.
3.
4.
5.
6.
7
8.
s Review (Page 121​

Answers

Answer:

pakistan

india

usa

china

uk

afghanistan

iran

iraq

israel

1
When collection of various computers
look like a single coherent system to its
client, then it is called​

Answers

Answer:

The appropriate answer is "Distributed system".

Explanation:

Whenever used by linking several autonomous computers as a single system, considered as distributed system. It could be consist of several kinds of  mainframes, processors as well as stationary machines, it can be programmed. A distributed machine has massive program modules, which operate as a single device on many machines.

A local real estate company can have its 25 computers upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?

Answers

Answer:

it is

Explanation:

400 dollars for 10 systems and 200 dollars for 5 systems

explanation

first

find the price of 1 system or computer which is done by dividing 1000 by 25

25)1000(40

100

____

00

00

__

0

then multiple it by 10 =40 ×10=$400

Answer:

400!!

Explanation:

Other Questions
Find the unknown angle Find y. Simplify completely.y = [?]Enter the number that belongs in the green box.Please helpppp Which statement best describes the status of women in ancient Egyptian society? A. Women In ancient Egypt had many legal rights, including the right to own property and businesses. B. Women in ancient Egypt could hold government positions but could not become pharaoh. C. Women In ancient Egypt were banned from taking part in religious rituals.D. Women in ancient Egypt could not hold jobs other than the traditional roles of wife and mother. what is this for question 2 If our sales cant grow this season, there___serious problems.(A) will be (B) will have Why is it will be not will have, what is the difference between them? please do part b A=5 and B=4 You are considering buying stock A. If the economy grows rapidly, you may earn 40 percent on the investment, while a declining economy could result in a 15 percent loss. Slow economic growth may generate a return of 3 percent. If the probability is 19 percent for rapid growth, 39 percent for a declining economy, and 42 percent for slow growth, what is the expected return on this investment Can you please help meee The hate you give 1. What important milestone do Stariand Chris hit via text? How does Starrfeel about it? 2.How is Oprah important to the theme of silence versus voice in the story 3. What the judicial process will be used for officer 115 and the incident with Khalil? How does this differ from a normal, criminal trail? Please help me!! There is 2 answer!! Consider the polynomial function h(x) = x^6 - 3x^5 - 17x^3What is the end behavior of the graph of h?Choose 1 answer:PLEASE HELP PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!!PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!!The Explorers' Legacy - After a wet and hungry winter in Oregon, the explorers headed home and finally returned to St. Louis in September 1806, two years and four months after setting out. Lewis proudly wrote to Jefferson, In obedience to our orders, we have penetrated the Continent of North America to the Pacific Ocean.Lewis and Clark had good reason to be proud. Although they had not found the Northwest Passagefor it did not existthey had traveled some 8,000 miles and had mapped a route to the Pacific. They had established good relations with western Indians. Most of all, they had brought back priceless information about the West and its peoples.Of their many goals, which one were they not able to accomplish and why? NOTE: Angles not necessarily drawn to scale. Is (4, 20, 100,...)geometric On Earth, the number flux of solar neutrinos from the p-p chain is:f_neutrino = 2fo/2.62MeVOther nuclear reactions in the Sun supplement this neutrino flux with a small additional flux of higher-energy neutrinos. A neutrino detector in Japan, named SuperKamiokande, consists of a tank of 50 kton of water, surrounded by photomultiplier tubes. The tubes detect the flash of Cerenkov radiation emitted by a recoiling electron when a high-energy neutrino scatters on it.Required:a. How many electrons are there in the water of the detector? b. Calculate the detection rate for neutrino scattering, in events per day. Please help math 1-2 high school solving proofs. Henri challenges Emile to a walking race. Because Emile's walking rate is faster, Emile gives Henri a 45-meter head start. Emile knows his brother would enjoy winning the race, but he does not want to make the race so short that it is obvious his brother will win. How long should the race be so that Henri will win in a close race? Ruben's football team lost 2 yards, which means went backwards, on their last play. Which integer best represents this? If you want to go to the mall, you'll have to clean your roomA: SimpleB: CompoundC: ComplexD: Compound-Complex can you please help me with this problem