TOPIC: BIOLOGICAL MACROMOLECULES
answer !
1. Define proteins, nucleic acids, carbohydrates and lipids
2. Summarize the general characteristics of each biomolecule and
3. Appreciate the importance of eating a balance diet
What is bookbinding printing? Letterpress or book printing refers to a certain specialized printing process that produces letterpress stationery. Letterpress, also a type of relief printing, is the process of cutting out the surface and printing from the raised residue. You may have seen letterpress paper before. Most modern letterpress papers can be recognized by their distinctive look on thick paper. Today, letterpress printing products are known for their high quality and unparalleled sophistication. Most people are unaware of the long history behind typographic techniques and tools. Modern letterpress products would not have been possible without a combination of centuries of refinement of old letterpress methods and modern polymer plate technology. Get a behind-the-scenes look at how Minted pays tribute to this centuries-old art form, and learn why book printing is a unique fusion of past and present. Browse Minted's hundreds of gorgeous typographic Christmas cards and typographic wedding invitations to find one that fits your style.
history of printing
"Letterpress" or "letterpress" refers to a printing technique developed by German innovator Johannes Gutenberg in the 15th century. Gutenberg was dissatisfied with modern printing methods and saw an opportunity to develop more effective printing techniques. Gutenberg was also driven by his desire to make books more accessible to the general public and improve literacy. Before the invention of the printing press, printing was time consuming, labor intensive and tedious. The pages of the book he carved into individual wooden panels, one at a time. The letters were left intact while the remaining space was clipped, resulting in raised letters. To further complicate this, printing resulted in a mirror version of the stamp or plate used, so all letters and words were upside down. The lettering in relief is then inked and the paper is lightly touched against the wooden panel where the craftsman has inked it. Because of this, the original typography never quite got the embossed look and feel that is so popular today. This made one page of the book. Gutenberg's attempt to change this method began with a small plate containing a single upside-down letter. These panels, called movable types, can be placed on a sturdy wooden frame to form any word or sentence. However, certain images and designs had to be freely engraved on wood or metal plates. Gutenberg used his knowledge from his background in blacksmithing to invent this wooden-framed printing press. There, the letters were coated with a permanent ink that he had prepared. This is another of his famous inventions. The rotating handle of the press allowed the paper to be scrolled. This paper is flattened and pressed against the inked letters on the crate to create the final product. Hence, this process has rightly earned the name "book printing".
letter printing today
Today, typography is making a comeback in high-quality wedding invitations, wedding dates, Christmas and holiday cards, birth announcements, and more. This revival, especially in the last 30 years, is due not only to unique aspects of modern book printing that cannot be replicated by other printing methods, but also to the support of people like Martha Stewart. Stewart praised 1990s typographic products, especially wedding invitations. Consumers saw a tangible quality of the design pressed into the cardboard, called embossing, in the image of the typographic product Stewart was promoting. This has increased the demand for book printing products. However, this was not the intention of the original book publishers. It's actually a result of the recent use of polymer plates. As such, this handmade tactile typographic stationery is notorious for not being representative of historical typographic products. A modern addition to centuries-old typographic technology, this feature embodies a bridge between classical craftsmanship and modern technology. Today, you might also see letterpress variations such as foil stamping and embossing. One of the only drawbacks of modern letterpress technology is that it loses the uniqueness of the original letterpress product. You can print many identical sheets of polymer from one design on your computer, producing indistinguishable products. This consistency may be desirable in some cases. B. Wedding invitations. However, modern letterpress stationery will never have the rare quality of printing made from unique carved panels of wood or metal. I need to print on very thick paper. Cotton paper is ideal for letterpress printing because of its soft feel, texture, and thickness. Also, cotton paper is more environmentally friendly than paper made from trees. Another modern variation of historical typography is blind printing. In blind letterpress printing, the polymer plate is not inked prior to printing.
A construction company is in charge of building a house for a client. The construction company completes the project, and then invites the client to take a look at the house. The client looks at the house and is unhappy with the final outcome and wants it redone. What could the construction company have done better?”
Answer: The construction company could have drawn a 3D model on a CAD app.
Explanation: This would help the blueprints look more realistic and easy to measure the leangths.
The following flowchart symbol is used to repeat instructions:
A. Rectangle
B. Square
C. Circle
D. Hexagon
d
Explanation:
⇛σ=
n
∑f(x−
x
)
2
Find f(x-x^-)²
It's
313.29+806.45+474.32+72.9+58.19+532.9+605.16+0+497.29
3360.5
Now
\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{\dfrac{3360.5}{50}\end{gathered}
\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{67.21}\end{gathered}
⇛σ=
67.21
\begin{gathered}\\ \rm\Rrightarrow \sigma=8.2\end{gathered}
⇛σ=8.2
write a program to calculate sum of first ten natural numbers
Answer:
Explanation:
total = 0
i = 0
while i<=10:
total = i +total
print(total)
Differentiate between
Operating system and
language translator
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?.
Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated
Answer:
class Foo:
def F(self, n):
if n == 1:
return 1
return self.F(n - 1) + 3 * n - 2
Explanation:
This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.
def F(n):
if n == 1:
return 1
return F(n - 1) + 3 * n - 2
Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!
Time machine could not create a local snapshot to back up from
Answer:
Time machine could not create a local snapshot to back up from Disk Error.
Which example best describes an impact of computers on the economy?
A. Bullying on social media has increased dramatically and across
multiple platforms.
B. Some local businesses have closed because they couldn't
compete with large online sellers.
C. Apps give points for purchases that buyers can use to obtain
discounts.
D. A platform designed to make all user content publicly available
creates privacy issues.
Answer:
B
Explanation:
The reason I say "D" is not the answer because I put the answer in and it was wrong.
How many internet browser sessions can you have open at one time?.
_________ is a method of encoding data so that it is unreadable to unauthorized individuals. The data can only be decoded if the receiver of the encoded message has access to a special key.
Answer:Encryption
Explanation:I took my test for CIS 110 and guessed and got this question right.
How do we ensure that future technologies are fair to society? IT professionals and governments must follow ethical principles in the creation of new technology. IT professionals and governments must follow ethical principles in the creation of new technology. It is not possible to utilize ethical principles when creating new technology. It is not possible to utilize ethical principles when creating new technology. Allow the IT industry to regulate itself. Allow the IT industry to regulate itself. Encourage IT professionals to apply current laws and regulations.
To ensure that future technologies are fair to society, IT professionals and governments must follow ethical principles in the creation of new technology and also apply current laws and regulations.
What is technology promotion?The use of technology is one that can promote student zeal by given them a form of positive experiences.
Note that to make sure that future technologies are fair to society, IT professionals and governments have to follow all ethical principles in the development of new technology and also they should use the current laws and regulations that are governing IT technologies.
Learn more about technologies from
https://brainly.com/question/25110079
Dose brainly give you notifications on you're phone when you go into the site
Answer:
Yep it does ^_^
Explain the relative advantages and disadvantages of an embedded OS based on an existing commercial OS compared to a purpose-built embedded OS.
The relative advantages of an embedded OS based on an existing commercial OS is known to be a lot and it is given below.
What are the Advantages of an embedded OS based on the above scenario?The embedded OS is known to be gotten from a commercial general-purpose OS and as such, it is often based on a composition of familiar interfaces, that boast portability.
Note that It is very fast and can be predict a lot when compared to the purpose-built embedded OS that is often used in an embedded system.
Disadvantages of an embedded OS based on based on the above scenario?This general-purpose OS is known to be not optimized in terms of real-time thing and in terms of embedded applications.
Based on this a lot of modification is often needed to achieve good performance.
Learn more about commercial OS from
https://brainly.com/question/3837126
Which service works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends
The service that works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends is target tracking.
How can I employ Predictive Scaling with target tracking?Predictive Scaling works is known to be one that works in line with target tracking. They both help to make one's EC2 capacity to change more better to one's incoming application traffic.
Note that target tracking scaling policies is one where a user has to select a scaling metric and set a target value.
Learn more about Autoscaling from
https://brainly.com/question/17661222
A class researching the world’s population would like to include a graph that shows historical changes. They have information from several online media resources.
Which options should they choose during their evaluation process? Check all that apply.
a teacher’s aide who creates world population materials for a class
a professor who publishes world population research in a journal
a United Nations report that analyzes trends in the world’s population
a nonprofit that tracks how the world’s population affects policy decisions
a local news program that evaluates why some countries are overpopulated
A professor who publishes world population research in a journal
Answer:
b,c,d
Explanation: i took the test and bc im awsome
A cybersecurity specialist facilitates penetration testing by using functional exercises. The specialist decides to use a war game approach and create teams. Which team operates the security system
The team that should operates the security system is the blue team.
What is war gaming strategy?In a war game approach, the teams of the senior managers of a firm is said to often play their own firm, and they do make selection of any group of its competitors and marketplace.
Note that this form of exercise is said to help simulates a composition of business conditions and gives a lot of lessons and guidance for the main thing. Note also that the blue team do defend the system against and responds to any form of attack from the red team.
Learn more about cybersecurity from
https://brainly.com/question/26260220
The way in which information travels on the internet, not as a single piece but in chunks.
which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website
Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?
a. Each person needs to send email with his/her part of the project individually every day
b. Each person should be on a cloud folder and sync their files as they are working through their project
c. Each person needs to send a group email to the team as soon as any updates are completed
d. Each person should post their updated information on a team website so it is available for anyone to see
The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.
What is cloud computing?Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.
In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.
Read more on cloud computing here: https://brainly.com/question/19057393
C-13 You just got a call from the University system administrator, who says that either you or your roommate is issuing denial-of-service attacks against other students from your shared network segment. You know you are not doing this, but you are unsure about your roommate. How can you tell if this accusation is true or not
Answer:
take a subtle aproach
Explanation:
[C Pointer] Not all arithmetic operations may be performed on pointers. For example, you cannot ________ or _______ a pointer.
It is not all arithmetic operations may be performed on pointers. For example, you cannot multiply or divide a pointer.
What arithmetic operations cannot be done on pointers?We cannot carry out all type of arithmetic operations with the use of the pointers.
Note that the Pointer arithmetic is said to be a little bit different from arithmetic we normally use and as such, the only used arithmetic operations applicable on pointers are known to be the addition of numbers.
Learn more about arithmetic operations from
https://brainly.com/question/4721701
Which ready-to-use features do WYSIWYG editors offer?
A.
meta tags
B.
database
C.
HTML tags
D.
web host
E.
image gallery
Answer:
C. HTML tags
Explanation:
In computing, WYSIWYG, an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed.
Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas
Answer:
The answer is ( D ) I hope this answers your question
a customer willl borrow
Answer: C. the PC
Explanation: The motherboard is not included in the passage
The master program that manages how other software can use the computer hardware is called the:.
the master program that manages how other softwares use the computers hardware is called the bios
Please help me on this it’s due now
I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.
Definition:
Logistics Manager: person in charge of overseeing the purchasing
and distribution of products in a supply chain
Material Handlers: responsible for storing, moving, and handling
hazardous or non-hazardous materials
Inventory Managers: oversee the inventory levels of businesses
Hope that helps!
Which of the following is NOT a correct flowchart shape?
A. Parallelogram
B. Oval
C. Diamond
D. Rectangle
E. Star
Answer: Star
Explanation:
define a touch-sensitive pad and state one use
Answer:
A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.
Explanation:
You can access elements in a list by using an index the same way that you can index a character from a.
One can access elements in a list by using an index the same way that you can index a character from indexing into the string.
What is String Indexing?Strings are known to be a form of ordered method of character data, 00:15 and the specific characters of a string.
They can be accessed straight through the use of numerical index. String indexing in Python is known to be a kind of zero-based in nature.
Learn more about indexing from
https://brainly.com/question/4692093
In the Linux boot process, the master boot record (MBR) loads a(n) __________ program, such as GRUB or LILO
Answer:
Boot loader
Explanation:
This is a small program that is stored within the MBR or the GUID partition table that is used to help load in an operating system into the memory