What is the correct clases for this drugs

‏Compazine
heelp me please

Answers

Answer 1

Answer:

making sense of medication classification

Explanation:

i think helping


Related Questions


Data stored in an online server can be described as being:

O in ROM
in the cloud.
O in RAM
O a flash drive.

Answers

Answer:

B

Explanation:

Data that is stored in an online server can be described as being in the cloud. This may also be a reason why you might have heard about "cloud computing" or saving files "in the cloud."

---

Other Choices:

A - Read-only Memory (ROM) is a type of non-volatile memory (memory stays even after power is removed) and is useful in storing rarely-used software on the computer.

C - Random Access Memory (RAM) is a type of volatile memory that is used to retain active data and machine code.

D - A flash drive is a type of device that can electrically store, erase, and reprogram data by using flash memory. A USB drive (or "stick") is a common medium.

Four differences between general and special purpose conputer in points.......
( don't spam please )​

Answers

Explanation:

hope this helps to uhh...

What are the letters associated with home rows keys?​

Answers

Answer:

The letters are 'a s d f g h j k l ;' .These are the letters associated with the home keys.

Answer:

In order to maximize the range your two hands can reach on a keyboard, they should be positioned in the middle of the keyboard.Your left fingers should be resting on the letters A,S,D and F.And your right fingers should be resting on the keys J,K,Land semicolon.This set of eight keys is known as home row

If the system continuously reboots, what is most likely the problem?

Overheated CPU
Power Failure
Failed Hard Drive
Application Error

Answers

Aswer

overheated CPU

Explanation:

If the system is randomly shutting down or rebooting, the most likely cause is a heat problem. ·

How do you keep a class running after you use a class function once in Python 3.​

Answers

Answer: Primitive data structures—like numbers, strings, and lists—are designed to represent simple pieces of information, such as the cost of an apple, the name of a poem, or your favorite colors, respectively. What if you want to represent something more complex?

For example, let’s say you want to track employees in an organization. You need to store some basic information about each employee, such as their name, age, position, and the year they started working.

True or False

1. Files are the container to store folders =

2. You can change name of file by using delete option

3.Recycle bin allows us to delete the flies permanently.

4. MSDOS is GUI based operating system


Answers

Answer:

1. False

2. False

3. True

4. False

Explanation:

1. Folders are the containers to store files

2. The delete option deletes the file

3. Files are moved to recycle bin after being deleted, and can be permanently deleted from recycle bin

4. "MS-DOS was the main operating system for IBM PC compatible personal computers during the 1980s, from which point it was gradually superseded by operating systems offering a graphical user interface (GUI), in various generations of the graphical Microsoft Windows operating system."

source for #4: Wikipedia

In java.Find the output of the expressions i) 3 % 4 ii) 3 / 4​

Answers

Answer:

the odd one is 3%4

Explanation:

3% means 3/100 and there is 4beside it

Which of the following animation is not common to both slide transition and
custom animation?


Answers

Answer:

slide transition pls mark me branilest

Why were Daguerreotype cameras not intended for the general public?

Answers

Answer:

The exposure time was vastly too long to be intended for practical use by photographers.

Explanation:

"The very first daguerreotype cameras could not be used for portraiture, as the exposure time required would have been too long. The cameras were fitted with Chevalier lenses which were 'slow' (about f/14). They projected a sharp and undistorted but dim image onto the plate."

Type two statements. The first reads user input into person_name. The second reads user input into person_age. Use the int() function to convert person_age into an integer.

Answers

Answer:

brainliest

Explanation:

HOMEWORK: Bud, Not Buddy I NOTICE... What do you see? chpter 3-4

Answers

Answer:

Check Explanation for Chapter 3 - 4 Summary!

Explanation:

Chapter 3:

Bud tries hard not to panic in the pitch-black darkness of the shed. The eyeballs of three dried-out fish heads stare back at him as he tries the doorknob, which he hopes Mr. Amos only pretended to lock. While deciding where to lay his blanket and pillow, he remembers the story of the cockroach crawling into his best friend’s ear back at the Home. From the story his friend, Bugs, tells, the cockroach was yelling, “My legs! My legs! Why have they done this to my legs?” while adults tried to extract it with tweezers. Bud wants to avoid any encounters with the cockroaches that are surely crawling over the shed’s floor, ready to crawl in his ears. He spreads his blanket on the top of the woodpile and climbs up.

Bud attacks the bat with a rake, only to discover that he has disturbed a hornet’s nest. Hornets sting him as he grabs for the doorknob hoping for escape. In his haste, he forgets about the fish heads with their razor-like teeth. He screams as the teeth cut into him, and the hornets continue to sting. He manages to escape through a window above the wood pile and falls to the ground, slapping at the hornets still attacking him. He heads towards the Amoses’ house, set on revenge.

Chapter 4 Summary:

Bud climbs into the Amoses’ house through an unlocked window. He finds his suitcase still under the kitchen table and puts it on the back porch step. Back in the house, he grabs Mr. Amoses’ shotgun and hides it outside, so if the Amoses wake up, they wouldn’t use it on him.  

Bud returns to the kitchen. He fills a glass with warm water and heads up to Todd’s room. Todd is sound asleep. Bud dips Todd’s fingers in the warm water, hoping he’ll wet his bed. When he doesn’t, Bud pours the water on Todd’s pajama pants, causing Todd to soak his sheets. Bud creeps out of the house, grabs his suitcase, and heads toward the road, now “on the lam ... just like Public Enemy Number One.”

Hope this helps! Let me know if you have any questions! :)

What device is used to perform a loopback testing on a NIC

Answers

Answer:

A loopback cable is also known as loopback plug or loopback adapter, which is a plug used to test physical ports to identify network issue. It provides system test engineers a simple but effective way of testing the transmission capability and receiver sensitivity of network equipment. In a word, it is a connection device that is plugged into a port to perform a loopback test.

Explanation:

Mark me as brainliest please

1. Who was the first lady programmer?​

Answers

Answer:

ada Augusta Bryon

Explanation:

that is the answer

Answer:

lady Ada lovelace

Explanation:

This is the real answer

Is Lt possible to map the way of human thinking to artificial intelligence components

Answers

Answer:

The technique is mind mapping and involves visual representation of ideas and information which makes it easier to remember and memorize facts even in complex subjects. Here is an example of a mind map with the essential elements of AI and the industries where Artificial Intelligence is applied.

Explanation:

how do we use electricity?

Answers

Answer:

People use electricity for lighting, heating, cooling, and refrigeration and for operating appliances, computers, electronics, machinery, and public transportation systems.

Answer:

People use electricity for lighting, heating, cooling, and refrigeration and for operating appliances, computers, electronics, machinery, and public transportation systems.

mark me a brainlist

Designers are comparing performance between a multi-core processor equipped with 16 in-order cores and a dual-core superscalar processor. The dual-core superscalar processor has two identical Out- of-Order cores. Each core is a 4-issue superscalar. The multi-core processor has 16 in-order processor cores. Each in-order core of the multi-core processor can achieve about one third the performance of the OoO superscalar core. A benchmark program K includes both sequential codes that can only be executed on one CPU core and parallel codes that can be distributed to multiple CPU cores. For program K, execution of the sequential codes takes 30% of the total execution time.

Required:
Which processor would deliver faster performance for benchmark program K and show your calculations?

Answers

Explanation:

it will be k because it process faster an it comsume less elecricity

b. Explain five (5) procedures on how to copy slide master from one presentation to another in PowerPoint?​

Answers

Answer:

answer

Explanation:

Open both presentations: the one you want to copy a slide master from, and the one you want to paste the slide master into. In the presentation that has the slide master you want to copy, on the View tab, select Slide Master. In the slide thumbnail pane, right-click the slide master, and then select Copy.

what are the functions of super computer?

Answers

Answer:

Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling .

Explanation:

Hope it helps you

Answer:

Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modelling, etc.

how to enter date in a Date/Time field?​

Answers

Answer:

Right-click the document tab for the new table and click Design View. In the Field Name column, select the first blank row, and then type a name for the field. Select the adjacent cell in the Data Type column, and then select Date/Time or Date/Time Extended from the list. Save your changes.

Explanation:

Which requires large computer memory?

Answers

Answer:

Imaging , Graphics and voice..... requires large computer memory.

Explanation:

Write a research about the 5 major of computer applications

Answers

Answer:

At the Indian National Congress Karachi session in 1931, Congress passed resolution dissociating itself and disapproving the policy of political violence in any form. The resolution was drafted by Mahatma Gandhi which admired the bravery and sacrifice of the 3 Martyrs- Bhagat Singh, Sukhdev, and Rajguru.

Explanation:

list of functions of control unit​

Answers

Answer:

I guess it would help you

You are setting up a home network for your friend. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they are waiting on the children. However, she is concerned about keeping her own data private at home network. What wireless feature can you configure on her AP (Access Point) to meet her requirement?

Answers

Answer:

A guest network

Explanation:

Define basic logical gates with its symbol, algebraic expression and truth table.​

Answers

Answer:

A truth table is a good way to show the function of a logic gate. It shows the output states for every possible combination of input states. The symbols 0 (false) and 1 (true) are usually used in truth tables. The example truth table shows the inputs and output of an AND gate.

Explanation:

Which of the following tasks should be accomplished while preparing to write the body of an email?


Take a picture with of text messages with a camera and file it away


Back-up text messages from your phone to an email account


Send a copy of the text message to another phone


Write a copy of all the text messages you would like to save

Answers

Answer:

Write a copy of all the text messages you would like to save

The task that should be accomplished while preparing to write the body of an email is:

D. Write a copy of all the text messages you would like to save.

Activities involved while preparing to write body of an email

Preparing to write the body of an email involves organizing and gathering the necessary information to include in the email.

In this context, writing a copy of all the text messages that you would like to save is the most relevant task to accomplish before composing the email. This task ensures that you have the content you want to reference or include in the email readily available and helps you structure the email effectively.

The other tasks listed are not directly related to the email writing process and can be done separately at other times for different purposes.

Learn more about writing email at

https://brainly.com/question/24688558

#SPJ2

1. What kind of metrics would be useful that are based on testing knowledge after security awareness training? The metrics could be obtained immediately after training or at periodic intervals over several months.

Answers

Answer:

i hope it will helpful for your

mark me brainlist

Explanation:

Metrics refer to a system or standards of measurement.

These are measures of quantitative assessment for the purpose of comparing, tracking and performance measurement.

When it comes to measuring employee's awareness, people's knowledge of comprehensive security awareness it can be monitored through online security awareness programs. The knowledge of the employees can be tested in regard of a hot topic i.e cybersecurity practices.

Online quizes can be used to show whether employees know the risks of leaving a computer unmonitored.

Simulated or planned cyber attacks, mockdrills can be planned by the company to test the presence of mind, readiness of employees after the training.

These things should be done without any prior notice so that the employees feel the real pressure and the situation is same as the real world

The metrics used to test the security awareness of the trained staff must be consistent, cheap to gather, can be expressed as cardinal or in percentage , and most importantly they should be contextually relevant i.e they should faciliate decision makers to take actions and attain the desired objective.

Awareness surveys are important baseline to test the knowledge of employees after the training. They are simple to set up and easy to use as well.

For example- all employees know that there is a security team but do they know their goals and policies of the team. Awareness surveys can be used to check these parameters and get the desired results from it.

Online security awareness programs may be used to track people's understanding of complete security awareness.

What are metrics?

The metrics used to assess the security awareness of the trained staff must be reliable, inexpensive to collect, expressed as a percentage or as a cardinal value, and most importantly, contextually relevant—that is, they must make it easier for decision-makers to take action and accomplish their goals.

As we know, online security awareness programs may be used to track people's understanding of complete security awareness when it comes to gauging employee awareness.

Employee expertise in relation to a current issue, such as cybersecurity procedures, can be evaluated.

Thus, online security awareness programs may be used to track people's understanding of complete security awareness.

Learn more about the matrices here:

https://brainly.com/question/15823780

#SPJ2

1. Explain all the types of computer virus​

Answers

Answer:

1.File infecting virus

A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting.

2. Macro Virus

This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments.

3. Browser Hijacker

This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting. This virus can pose other threats such as changing the default home page of your browser.

4. Web Scripting Virus

A very sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.

5. Boot Sector Virus

These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling control of your computer.

6. Polymorphic Virus

This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.

7. Resident Virus

A resident virus stores itself on your computer’s memory which allows it to infect files on your computer. This virus can interfere with your operating system leading to file and program corruption.

8. Multipartite Virus

A type of virus that is very infectious and can easily spread on your computer system. It can infect multiple parts of a system including memory, files, and boot sector which makes it difficult to contain.

Explanation:

hope its help

thank you

150 komputer terbagi menjadi 4 bagian
a. 50 komputer dept pemasaran
b 30 komputer dep gudang
c 20 komputer dept pengiriman
d 50 komputer dept keuangan

soal
direktur menginginkan laporan dari setiap departement dapat dia akses dalam komputer pribadinya!!
bagaimana caranya

Answers

I’m pretty sure it’s c

Three enhancements with the following speedups are proposed for a new machine: Speedup (a) = 30, Speedup (b) = 20, and Speedup (c) = 15.

Answers

Answer:

mark me brainlist please

Explanation:

Three enhancements with the following speedups are proposed for a new machine: Speedup (a) = 30, Speedup (b) = 20, and Speedup (c) = 15. C should be have highest enhancement.

What is speedups?

Speedup is a metric used in computer architecture to compare how two systems perform when solving the same task.

Technically speaking, Speedup is the increase in task execution speed when performed on two comparable architectures with various resources.

Further Amdahl's law, which was primarily focused on parallel processing, developed the idea of speedup. However, speedup can be applied more broadly to demonstrate how resource improvements affect performance.

[tex]{\displaystyle L = frac 1 v = frac T W, where L = frac 1 v = frac T W.[/tex]

Where v is the task's execution speed, T is the task's execution time, and W is the task's execution workload.

Further The rate at which a task is executed is the throughput of an architecture:

[tex]displaystyle Q=rho vA=frac rho AWT=frac rho AL, Q=rho vA=frac rho AWT=frac rho AL[/tex]

Throughput and latency are two different types of quantities for which speedup can be defined. The relationship between latency and task execution speed is reciprocal.

Learn more about speedups:

https://brainly.com/question/29848325

#SPJ2

Programming challenge description: In this challenge, you're given a string containing jumbled letters from several concatenated words. Each word is a numeral from zero to nine. Each numeral may be used multiple times in the jumbled string. Write a program that returns integers corresponding to the numerals used to form the jumbled string. Integers must be sorted in ascending order. For example, reuonnoinfe are shuffled letters of the strings one four nine. Your program's output should be 149. Input: A string formed from jumbled letters of numerals. For example:

Answers

Following are the Java program to the given question:

import java.util.*;//import package

public class Jumbledletters //defining Jumbledletters class  

{

public static void main (String[] axv)//defining main method

{

String num[] = {"zero", "one", "two", "three", "four", "five", "six", "seven", "eight", "nine"};//defining an arrayof string

int i,j;

Scanner xc = new Scanner(System.in);//creating Scanner class object to input value

System.out.print("Enter value: ");//print message

String v= xc.next();//defining a String variable that input String value

for(i=0; i<num.length; i++)//defining a loop to count input String length

{

String s = num[i];//defining a string variable to hold array value

boolean f = true;//defining a boolean variable

for(j=0; j<s.length(); j++)//defining a for loop that convets value into integer

{

char c = s.charAt(j);//defining char variable that hold value

if(v.indexOf(c)==-1)//defining if block to check indexOf value

{

f = false;//use boolean variable that hold boolean value

break;//using break keyword

}

}

if(f) //use if to check boolean value

System.out.print (i);//use print method that print i value

}

System.out.println();//use print method for beak line

}

}

Output:  

Enter value: onefournine

149

Explanation of code:

Import package.Defining the Jumbledletters class and also define the main method in it.Inside the main method defining a string of array "num" that holds string value and two integer variables "i,j" is defined.In the next step, a scanner class object is declared that inputs the value.After input, a value a for loop is defined that uses a string variable that holds an array value and uses another loop that converts string value into a numeric value.

Learn more:

brainly.com/question/24379089

Other Questions
Three of eight kids in a class are randomly chosen to present their book reports today. How many different possible sequences of three presentations are there?A. 56B. 120C. 336D. 512 answer the question in one word-Name a class of vertebrate with homeothermic animal The area of a square garden is 72 m2. How long is the diagonal? Write the prime factorization of 80. find the distance between each pair of points (-1,4) and (1,-1) Answer the following question in 3-4 complete sentences.A white curved swoosh resembling a check mark on a black background. The silhouette of a woman dancing while listening to an m p 3 player, which is white and stands out against the black silhouette and green background.Examine the two advertisements above. In your opinion, is advertisement, like the two above, a form of art? Use terms and concepts from the lesson to support your opinion. Can you answer this and simplify this?Btw, the a, b, c stuff is the numbers, just replace each of them with the numbers including the powers. Where there is not a power put 1 Solve the inequality. Graph the solution - 30 points which of the following is a sign that your computer may have been infected with malicious codeA. Your computer runs faster than normal.B. The pages you open are not distorted.C. Your computer restarts on its own and then runs property.D. Your computer locks up or stops responding. A number is 10 more than another number. Twice the sum of the two numbers is 44. Find the two numbers. A car rental service charges a $500 flat fee for a car plus $100per additional day. Which equation correctly models the totalcost of renting a car for x number of days? PLEASE HELLPPPP THIS KS DUE SOON what is the starting salary of a pediatrician? ill give brainliest!!! - 1 3/5 - (-2 5/8) = ? Convection currents in the Earths crust cause volcanoes. PLSSSS HELPPPPPPPPPPPPP 1.What would the world be like if everyone had access to a good education?2.Does your government really care about education? Which of the following is an example of climate?The polar regions have long winters and short, cool summers.Humidity levels are high today.Canada experienced an unusually warm summer this year.Tornados formed across Oklahoma yesterday. what is formation of plan? How is it made? -4 over 5 plus 3 over 20