Chords based on scale degrees create appropriate harmonies for a piece of music. True False

Answers

Answer 1
I think the answer to this is True.
Answer 2
The answer would be true

Related Questions

Although virtual memory is beneficial at times, why can it also be detrimental?
a:It converts data from nonvolatile to volatile storage devices.
b:It relies on data that is placed on the hard drive, which slows down the computer.
c:It increases the likelihood that data can become corrupted.
d:It requires a larger amount of bus width, which slows down the computer.

Answers

b used to be the reason. Magnetic hard drives are considered 1000 times slower than RAM because to disk accesses are measured in microseconds and memory accesses are measured in nanoseconds. With the new Solid State drives, I would expect the access times to be MUCH closer.

Why is system software dependent on underlying machine architecture?

Answers

Once a source code is compiled to machine code, it becomes specific to the platform targeted, to the machine architecture. So, this is the reason why the system software is dependent on the underlying machine architecture. It is the reason why you cannot run a Linux program on Windows , for example. Source code can be compiled to target different architectures and executable formats. 
T

What is an acceptable alternative to installing an audible backup alarm?

Answers

One alternative is the use of an observer/signal person. Due to the piercing noise that is usually associated with audible back-up alarms and its noise intrusiveness to nearby residents, having an observer who signals to others of oncoming construction equipment will meet the same safety requirement as having an audible backup alarm

what happens if a spelling checker doesn't have a suggestion for a misspelled word?

Answers

The word is most likely correct.

A ____ can interpret physical addressing information.

Answers

The answer is a Bridge can interpret physical addressing information.

You have drafted a new report that you will be saving for the first time. Select the steps you will take to save your file.

Click on the Save icon.
Minimize the file.
Name the file.
Select Save from the start menu.

Answers

Explanation:

There are the following steps to save your file which is drafted a new report, such as:

Step 1- Select the save option from the start menu.

Step 2- then, click on the save icon shown.

Step 3- Give any name to your file, by which you have to save it.

Step 4- Minimize the file.

With the help of four steps that are mentioned above, your file will be saved.

• a relief print created out of a sheet of linoleum is called ________.

Answers

It is called Linocut. Linocuts can likewise be accomplished by the cautious utilization of expressions on the surface of the lino. This makes a surface like a delicate ground drawing and these harsh lino plates can be imprinted in either an alleviation, intaglio or a thickness printing way.

A relief print created out of a sheet of linoleum is called a linocut.

A relief print created from a sheet of linoleum is called a linocut or linoleum cut. In this process, the image is carved into the linoleum material, and the areas that are meant to be ink-free are cut away. The remaining surface is inked, and then the image is transferred to paper by pressing.

A linocut produces bold and graphic images with strong contrasts because of the stark differences between the inked areas and the blank cut-away sections. While the relief printmaking technique doesn't allow for intricate details, it is valued for its simplicity and impactful visuals.

To add color to the entire background of a page, users will select the ___ feature?

Answers

Final answer:

To add color to the entire background of a page, users should utilize the Format Background feature, accessible in various software through the Design tab. This allows for customization through solid colors, gradients, or images, with additional settings for transparency and offset percentages to ensure content readability and visual appeal.

Explanation:

To add color to the entire background of a page, users will typically utilize the Format Background feature. This tool is fundamental in customizing the look and feel of documents or presentations across various software platforms. When utilizing this feature, one can apply a range of background customizations including solid colors, gradients, or even images. The selection of colors can be made through named colors, hexadecimal values, or through specifying the red, green, and blue (RGB) components of a color. It is important to consider the contrast between the background and the text to ensure that content is easily readable. To fine-tune the appearance, features like Transparency and Offset percentages allow for deeper customization, influencing how the background interacts visually with the content.

For example, in PowerPoint, this feature can be accessed through the Design tab by selecting the Customize group and then clicking on Format Background. This opens a pane where various customization options are available, including setting up a solid or gradient fill, inserting a picture, or adjusting transparency. Applying a color or design as background aids in highlighting different elements of the site or document, contributing significantly to the presentation's overall aesthetic. The choice of background is crucial for creating visual interest and ensuring the content's readability, hence the necessity to tweak the background settings carefully.

What entity created the open systems interconnection (osi) seven-layer model?

Answers

The ISO developed the 7 layer OSI model.

Which routine is configured to be called by another routine?
A. Fault
B. Start
C. Subroutine
D. Main

Answers

A routine called by another routine may be called a subroutine.

The routine that is configured to be called by another routine is Subroutine. Therefore option C is the correct resposne.

What is a Subroutine?

When a computer program doesn't return a value, a function or subroutine is a group of program instructions that work together to complete a single task. Then, whenever that specific task has to be carried out, this unit may be used in programs.

Programs may define functions internally or externally in libraries that are accessible to many different programs. A function may be referred to as a routine, subprogram, subroutine, method, or procedure in various programming languages. Technically, each of these phrases has a unique definition, and each language has its own nomenclature. Sometimes, the all-encompassing phrase "callable unit" is used.

While working on the ENIAC, John Mauchly developed the idea for a function for the first time. In January 1947, at a Harvard symposium on "Preparation of Problems for EDVAC-type Machines," he wrote about this idea. Commonly credited with formalizing this concept are Maurice Wilkes, David Wheeler, and Stanley Gill. In a contrast to an open subroutine or macro, they referred to it as a closed sub-routine.

To read more about Subroutine, refer to -  https://brainly.com/question/15870277

#SPJ2

What is another name for a blue screen error which occurs when processes running in kernel mode encounter a problem and windows must stop the system?

Answers

Answer:

The Blue Screen of Death (BSoD) — also known as "blue screen," "stop error," or "system crash" — could happen after a critical error occurs that Windows 10 is not able to handle and resolve automatically.

Explanation:

The Blue Screen of Death (BSoD) — also known as "blue screen," "stop error," or "system crash" — could happen after a critical error occurs that Windows 10 is not able to handle and resolve automatically.

If the boolean expression a is true and b is false, the value of the logical expression a or b is ________.

Answers

since one of the conditons(a) is true the value of the logical expression is true!

If the Boolean expression a is true and b is false, the value of the logical expression a or b is true. The correct option is a.

What is Boolean expression?

A logical statement that is either TRUE or FALSE is referred to as a Boolean expression.

As long as both parts of the expression have the same basic data type, Boolean expressions can compare data of any type.

Boolean Operators are simple words (AND, OR, NOT, or AND NOT) that are used as connectives in an exploration to combine or exclude keywords, yielding more focused and productive results.

This should save time and effort by removing irrelevant hits that must be scanned before being discarded.

The OR operator is used in a Boolean expression to ensure that at least one true value exists.

If both sides are correct, the entire expression is correct. If only one side is correct, the entire expression is correct. If both sides are incorrect, the entire expression is incorrect.

Thus, the correct option is a.

For more details regarding Boolean expression, visit:

https://brainly.com/question/13265286

#SPJ2

Your question seems incomplete, the missing options are:

a. True

b. False

c. 1

d. 0

What Web browser element is responsible for reading Web page content and presenting it to the reader?

Answers

The parser "reads" the page and puts it into the DOM (Document Object Model), the layout manager decides how/where elements will be displayed and the display manager takes care of drawing the screen.

What languages do most of the students at Miami High School speak?

Answers

spanish is the most language spoken in the highschool

I would say English, but Spanish could be a possibility.

A rich text format (RTF) provides an electronic image of a document and can be viewed, printed, and electronically transmitted.

True
False

Answers

False RTF is not an image

Answer:

It's False :)

Explanation:

Hope this helps! :)

The encapsulation unit on the data link layer of the osi model is _________

Answers

The encapsulation unit on the data link layer of the OSI model is the Date link, layer 2.

Final answer:

The encapsulation unit on the data link layer of the OSI model is the frame. Frames encapsulate data with header and trailer fields that contain important control information.

Explanation:

The encapsulation unit on the data link layer of the OSI model is the frame.

At the data link layer, the data is divided into frames, which include both the data and control information necessary for transmitting it over the network. The frame encapsulates the data with header and trailer fields that contain information such as source and destination addresses, error detection, and flow control.

For example, in Ethernet networks, the frame consists of the MAC addresses of the sender and receiver, as well as other control information.

To rotate text in a worksheet, in the format cells dialog box, you can click and drag the ________.

Answers

To be able to rotate the text in your worksheet as you work on it, it is best to click on the format cells dialog box in which it will feature the following options but in order to allow you to rotate, after having it clicked on, click and drag the alignment tab in which will allow you to rotate the text.

In Step 7, you listed three elements commonly listed in charts. What are all of those options?
data points


WordArt


a data series


an x-axis


a y-axis


an icon


a legend

Answers

I don't understand your question please go into further detail.

To restore a document to the default theme for the template on which the document is based, click the themes button, and then click ____.

Answers

depends on the program you are using

Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.

Answers

The Neighbor Discovery protocol is used to determine the link-layer address of a neighbor on the same network, to check the reachability of a neighbor and to tack neighboring devices. 
Neighbor discovery (ND) performs many of the functions that ICMP router discovery and ICMP redirect handled in IPv4.

What memory below is the largest?
1TB
1GB
10GB
55000Bytes

Answers

The answer is a 'Terabyte'.

The answer to your question is 1TB It's the largest of all the choices:)

 

Cissy looks up a number in the phone book, pushes the book away, and then dials the number. why does she discourage any interruptions during this process?

Answers

Because information only lasts 20-30 seconds in short term memory.

Answer:

Because she pushes the book away before dialing the number.

Explanation:

She pushes the book away and then calls the person. If she is interrupt, she is going to forget what number to dial, and then she has to look up the book again before dialing.

Which of the following is the BEST example of a strong password. Question 8 options: brian12kate5 chEwbAccAp!zza w3st! 123abccba321

Answers

chEwbAccAp!zza would be the best example for a strong password. But I don't think anybody that is going to use that password is going to remember that for a long time.

Among the options given, chEwbAccAp!zza would be the best example of a strong password. Thus, the correct option for this question is B.

What are the characteristics of a strong password?

The characteristics of a strong password are as follows:

It has at least 8-12 characters long.It effectively utilizes the combination of uppercase letters, lowercase letters, numbers, and symbols.It consists of a word or character that can not be found in a dictionary.It also possesses specific types of keywords like a hash, asterisk, at the rate, etc.

A strong password should be at least 8 characters long and include a mix of upper and lower-case letters, numbers, and special symbols. It is also required to remember your password each time when you log in. So, always try to frame your password that is strong enough along with easy to remember.

Therefore, among the options given, chEwbAccAp!zza would be the best example of a strong password. Thus, the correct option for this question is B.

To learn more about Strong passwords, refer to the link:

https://brainly.com/question/14396089

#SPJ6

________ are devices in a computer that are in either the on or off state

Answers

The appropriate response is Electrical Switches. These are electromechanical gadgets that are utilized as a part of electrical circuits to control, recognize when frameworks are outside their working reaches, flag controllers of the whereabouts of machine individuals and work pieces, give a way to manual control of machine and process capacities, control lighting, et cetera.

A file that contains program code is called a ____________.

Answers

executable or binary

What is the Doppler Effect? How can the Doppler Effect be useful for a forensic investigation involving a shooting?

Answers

The Doppler effect is an increase (or decrease) in frequency of sound, light, or other waves as the source and observer move toward (or away from each other).
They use this is forensic investigation involving a shooting because witnesses can identify the type of firearm and the noise. 

Final answer:

The Doppler effect is the change in frequency or wavelength of waves, such as sound or light, as observed by someone moving relative to the source. Forensic investigations can help determine the direction and speed of a shooter in a shooting event by analyzing audio recordings.

Explanation:

The Doppler effect refers to the change in frequency or wavelength of waves to an observer who is moving relative to the wave source. It occurs with all types of waves, including sound, light, and water waves. The effect is commonly experienced when an ambulance passes by with its siren blaring; the siren's pitch appears to decrease as the ambulance moves away. This is due to the sound waves being 'stretched' out, leading to a lower frequency and hence a lower pitch.

Applications in Forensic Investigations:

In forensic investigations, the Doppler effect can be particularly useful in analyzing audio recordings of shootings. By examining the change in frequency of the gunshot sounds, experts can determine the direction and speed of the shooter or the vehicle from which the shots were fired. This can be vital in reconstructing the sequence of events and establishing the positions of the shooter and the victim(s) at the time of the incident.

Using the Doppler effect, forensic teams can also establish whether a recording is authentic or if it has been manipulated since the characteristics of the Doppler shift must conform to the laws of physics and the known movements at the scene of the crime.

A network administrator has configured ospfv2 on the two cisco routers as shown. the routers are unable to form a neighbor adjacency. what should be done to fix the problem?

Answers

Add the network 192.168.255.2 0.0.0.0 area 0 command to router R1 and remove the network 192.168.255.1 0.0.0.0 area 0 command.

Add the passive-interface S0/0 command to router R1.

Add the network 192.168.10.0 0.0.0.255 area 0 command to router R1 and remove the network 192.168.10.1 0.0.0.0 area 0 command.

Add the network 192.168.255.0 0.0.0.3 area 0 command to router R1 and remove the network 192.168.255.1 0.0.0.0 area 0 command.

How can i appear offline without fb messenger saying "last active 1 minute ago"?

Answers

Go to settings and hit privacy to change who can see your posts

What is a good project I can do for Artificial Intelligence? It has to be some type of Technology that covers Artificial Intelligence.

Answers

Look at the fields that utilize artificial intelligence and expand further. 

You can talk about A.I. being used to operate on patients in complex surgeries. 

A.I. in space exploration or roaming in the deep trenches of our oceans looking for information about our planet.

A.I. in law enforcement and rescue squads.

A.I. in security.

A.I. in engineering. 

Programming of A.I.

Integration of A.I.

Outlook of A.I. in our future and how it may be used.

Artificial Intelligence in warfare.


Final answer:

A good AI project can be developing technology that enhances human capabilities, like driver-assisted vehicles, or an AI system that ensures legal transparency and ethical governance. These projects should acknowledge and address the sociotechnical implications of AI in the leading industries, ensuring they contribute positively to society.

Explanation:

A good project you could undertake for Artificial Intelligence (AI) is developing a technology that augments human capabilities rather than replacing them. One such area to explore could be driver-assisted vehicles, which leverage AI to enhance safety and driving experience without fully automating the driving process. Another avenue could be creating an AI system that focuses on ethical considerations and governance, such as legal transparency in AI operations, helping to address the social concerns of AI ethics and the impacts on privacy and autonomy.

When considering AI projects, it is important to be aware of the leading industries where AI is employed, such as autonomous vehicles and smart home assistants.

Additionally, it is beneficial to identify leading industries in AI and consider how your project could fit or make an impact within these sectors. Successful AI projects often recognize the existence of a spectrum of thought surrounding the ethics and governance of AI, reflecting on how the technology could shape society and address current and future challenges.

______ brings the computer into the realm of mass communication: select one:
a. video conferences
b. chat rooms
c. e-mail
d. multi user domains (muds)
e. the world wide web

Answers

]the answwe is chat rooms
B. chat rooms

hope this helps
Other Questions
What evidence from jefferson's first term supports the quids assertion that he had abandoned the democratic republican party? Which of these locations is the only country in the region that is predominantly Christian?MyanmarPhilippinesLaosThailand Probably the most revolutionary aspect of the industrial revolution was: ordering numbers from greatest to least is called putting them in *blank* order When analyzing the results of a scientific experiment, Kevin should base his conclusion on ASAP HOMEWORK Which statement defines your rights as a consumer 1 the right to information 2 the right to consumer protection by the government and 3 _________.A the right to complainB the right to avoid fraudC the right to evaluate claimsD the right to not payPlease Only Answer If You Know This Answer For SURE!!!!! when 1 carbon atom combines with 2 oxygen atoms, the resulting substance is called a(n) A.) Element. B.) Compound. C.) Isotope. D.) Ion. For your business to be successful you will need a strategy for beating the competition, that is, a ________. What tissue are specialized cells that react to tension/stress? How much greater is the area of a square with a side length of 9 inches than the area of a circle with a radius of 3 inches? What conclusion can you make about how the declaration of independence affect of the revolutionary war Is a regulatory mechanism in which the end product of a metabolic pathway inhibits an enzyme that catalyzes an early step in the pathway? A scuba diver swimming at the Deppe shown, and then swim 0.5 feet toward the surface every three seconds. What is the location of the scuba diver, relative to the surface, after 15 seconds? Information processing in the body involves neurons communicating with each other at their _____. The way in which your emotions affect your physical and overall health is part of? A. setting goals.B. heredity.C. the mind-body connection.D. your cultural environment. Outlet malls sell goods _____ The two brassica morphs used in this lab differ at the body color locus. list 3 other aspects of phenotypic variation that you might reasonably expect to see among plants: Fines are __________ when speeding violations occur within a school or construction zone. What is 129,543 rounded to the nearest ten thousand (04.04 LC) Which Reformation idea did Martin Luther support? (10 point)The necessity of doing good works in order to attain salvationThe duty to reject organized religionThe superiority of faith over works as a path to salvationThe superior authority of the pope over religious matters Steam Workshop Downloader