Answer:
Keyboard
Explanation:
l think it is the key board
Nilsu is attempting to train a new administrative assistant on using a word processing program. Since the program is fairly complex and has many independent components (e.g., creating mail merge documents is very different from formatting a letterhead), she should:
Answer:
teach the assistant bits and pieces of the program.
Explanation:
Given that the program is fairly complex and has many independent components, the most ideal way Nilsu should train a new administrative assistant on using a word processing program is by "teaching the assistant bits and pieces of the program."
This will make the administrative assistant understand and operate the program at a gradual pace without anhthing looking confusing.
The internet and intranet have many different uses.
Explain what is meant by the intranet.
Answer:
Intranet is a local or restricted communications network, especially a private network created using World Wide Web software.
Answer:
internet-The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.
Intranet- A system of computers inside an organization that makes it possible for people who work there to look at the same information and to send information to each other.
Which best describes the Quick Access toolbar and the ribbon tabs?
Answer: D
Explanation: The Quick Access Toolbar is customizable, and the Ribbon tabs are collapsible.
Answer:
d
Explanation:
Write a program that uses a while loop to calculate and print the multiples of 3 from 3 to 21. Your program should print each number on a separate line. Expected Output:
3
6
9
12
15
18
21
Code:
num = 3
while num <= 21:
print(num)
num+=3
Output of code:
3
6
9
12
15
18
21
Explanation:
The condition num <= 21 will ensure that the program will only print multiples of 3 up to 21. We set num as 3 since we want to start printing from 3, and we add 3 each time to get the multiples.
Hope this helps :)
which member of the Jackson family was the spokesperson for the Psychic Friends Network.
Answer:
La Toya Jackson
Explanation:
The material (text, pictures) to be put into a document is called________________
Please help me
ME ARMY HALPPP!
Answer:
Inline (my guess)
Hope this may help u
What is output? x = 10 if (x > 10): print(1) elif (x = 10): print(3) else: print(4)
Answer:
There are three logical operators: and, or, and not. The semantics (meaning) of these operators is similar to their meaning in English. For example, x > 0 and x < 10 is true only if x is greater than 0 and less than 10.
n % 2 == 0 or n % 3 == 0 is true if either of the conditions is true, that is, if the number is divisible by 2 or 3.
Finally, the not operator negates a boolean expression, so not(x > y) is true if (x > y) is false, that is, if x is less than or equal to y.
Explanation:
After running the following pseudocode, what will the value of VARIABLE be? 1. Set value of VARIABLE to 5 2. Increase the value of VARIABLE by 3 3. If the value of VARIABLE is odd, increase its value by 1 4. If the value of VARIABLE is even, increase its value by 1 5. If the value of VARIABLE is odd, increase its value by 1
Answer:
10
Explanation:
you start with 5 5
you add 3 8
the variable is not odd so skip 8
the variable is even so add 1 9
the variable is odd so add 1 10
10
hope this helps <3
HELLLLLLLLLLLLLLLLLLLLP PLSSSSSSSSSSS HELLLLLLLLLP
Which of the following is an example of a Boolean Operator?
A. HTML
B. SEO
C.
D. BUT
c is
TITLE
Answer:
HTML?
Explanation:
That looks like the best answer, correct me if I'm wrong ^^U
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this
Answer:
Phishing
Explanation:
A phishing attack may be defined as a attack made on social platform that is used to steal the data, which includes the credit card details or credentials of individuals, etc. It is a fraudulent attempt to collect important information.
In the context, the employees receives an email asking them to click on the link and login using their credentials. It is a fraud email which no one in the company has sent. So this is a phishing attack.
Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHING!!!HELP PLZ!!
Explanation:
You may try opening the Brainly website using your browser's incognito mode. In other words,
Go to the Brainly website on Incognito mode > click Join and then follow the process to create an account.
However, if the issue persists you may then click the Contact Us button on the Homepage of the website and fill the accompanying form to send in your complaints.
Fill in the blank: PMML, PFA, and ONNX are __________________. 1 point Open standards for predictive model serialization, exchange, and deployment. Codes for getting rid of undesired data or models. Robots that are plotting to take over the planet. Passwords for some super-secret system. Abbreviations for machine learning algorithm names.
Answer:
Option A: Open standards for predictive model serialization, exchange, and deployment.
Explanation:
PMML which is also known as Predictive model markup language, is basically an open interchange format for predictive models.
ONNX which is also known as the Open Neural Network Exchange Format is simply an open format that is used to support the storing and porting of predictive models spanning across libraries and languages.
PFA which is also known as Portable format for Analytics is used to provide a platform for analytic applications to explain and exchange predictive models that are produced by analytics and also machine learning algorithms.
From the definitions of PMML, PFA, and ONNX above, we can see that they are all used for predictive model arrangement and exchange.
Thus, the correct answer is option A.
Who finds the exact web server that hosted the website by looking in a huge database of internet addresses
Answer:
The ISP - Internet service provider
Explanation:
The internet service provider ISP finds the exact web server that hosted the website by looking in a huge database of internet addresses.
An internet service provider (ISP) is a company that provides internet connection and services to individuals and organizations.
how are you going to preserve cultural heritage you social practices even when using ICT ?
Answer:
Cultural heritage is central to protecting our sense of who we are.
It gives us an irrefutable connection to the past – to certain social values, beliefs, customs and traditions, that allows us to identify ourselves with others and deepen our sense of unity, belonging and national pride.
Answer:
In Slovenia, an interactive geographic information system shows information about important natural areas. Since 2008, the system is available online also via an interactive map. The Slovenian Register is one of the most comprehensive and advanced tools in the EU, and can serve as an inspiration for other countries and regions aiming to improve digitisation of natural and cultural heritage.
Source: CD-ETA E-bulletin
Cheers! :)
What is one disadvantage of transmitting personal data using digital signals?
A. The data cannot be accessed by other computers.
B. The data could be accessed or stolen.
C. The data are easily changed into different data.
D. The data can be changed by being transmitted.
Answer: The answer to your question is B i hope this helps
the reason for this is because useing digital signals can be hac,ked or accessed by another person so there for you maybe have to use another way.
Explanation:
i hope this helps if it does have a brilliant day and have a smile
Which of the following statements is true?
O Secondary storage stores data for short periods of time.
O A hard drive is an example of secondary storage.
O The CPU holds instructional data for programs.
Audio data is saved to a computer's CPU.
The statement true for the secondary storage device, is that hard drives are the example of secondary storage. Thus, option B is correct.
What is a secondary storage?A secondary storage in the computer system is given as the non-volatile form of the storage media that has the ability to form the storage without being connected to power.
The secondary storage can be of solid state, optical and magnetic storage devices. Hard drive is the example of magnetic secondary storage devices. Thus, option B is correct.
Learn more about secondary storage, here:
https://brainly.com/question/86807
#SPJ2
Josh is searching for information online about the conservation status of blue jays. He enters the phrase blue jays and most of the results are about the baseball team. What can he do to get the specific results he wants?
Answer: specify the bluejay bird
Explanation:
by specifically mentioning it is birds he wants that Is the results he will get
If Josh wants to get the specific information in the context of the conservation status of blue jays, then in that case can add birds in the search bar along with the name of blue jays.
What are blue jays?Eastern North America is home to the beautiful blue jay, a bird of prey that belongs to the Corvidae family. It inhabits the majority of eastern and central America; some eastern populations might be migratory.
Breeding populations can be found all over southern Canada; resident populations can also be found in Newfoundland, Canada. Blue Jays are renowned for their brilliance, intricate social structures, and strong familial ties.
It is believed that their love of acorns contributed to the proliferation of oak trees following the last glacial period.
Learn more about blue jays from here:
https://brainly.com/question/3034695
#SPJ2
Which of the following best describes the purpose of an IP address?
Answer: C
Explanation:
Each connected device has its IP address. However, all the connected devices are included under your main public IP address for your network.
Your ISP (Internet Service Provider) provides a public IP address via your router. The ISP will have a sizeable pool of IP addresses they have bought. They distribute these to their various customers.
Ziad tells his son Marc: " This year my age is triple yours, but in 10 years, it will be the double". Find their ages.
Answer:
Ziad age would be like 30
Explanation:
10x3=30
want some points you get some also stay away from people
Answer:
lol
Explanation:
thank YOUUUUUUUuuuuuuu
rebecca smith was the top scorer in a women’s professional basketball league
Answer:
awesome
Explanation:
what is low level language
Answer:
The language which is spoken by low aged people is called as low level language
Answer:
A low level language is a language with few layers between itself and actual machine code.
Assembly is an example of a very low level language, where you're giving direct instructions to the processor. C is often called a fairly low level language as it gets compiled very directly into machine code.
By contrast, high level languages have many more layers between themselves and the processor. Java would be an excellent example, as you have a full object oriented language that gets parsed, linked and assembled to run on a virtual machine which itself runs on the hosting system. Javascript is another, as it in precompiled and executed by the browser, which itself is running on the platform.
what is the size of 4th generation of computer and what language does they use?
Answer:
Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.
Fourth-generation language (4GL), Fourth-generation computer programming language
(brainliest please)
Explanation:
The period of fourth generation was from 1971-1980. Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.
Fourth generation computers became more powerful, compact, reliable, and affordable. As a result, it gave rise to Personal Computer (PC) revolution. In this generation, time sharing, real time networks, distributed operating system were used. All the high-level languages like C, C++, DBASE etc., were used in this generation.
Fourth Generation
The main features of fourth generation are −
VLSI technology used
Very cheap
Portable and reliable
Use of PCs
Very small size
Pipeline processing
No AC required
Concept of internet was introduced
Great developments in the fields of networks
Computers became easily available
Some computers of this generation were −
DEC 10
STAR 1000
PDP 11
CRAY-1(Super Computer)
CRAY-X-MP(Super Computer)
in Kakegurui at the end of the what happens
Answer:
ok
Explanation:
မင်းငါ့ကိုငိုနေတာကိုမလိုချင်တဲ့လူငယ်များရဲ့ဆူနာမီကိုမကြည့်ချင်ဘူး
Answer:
me tiamo kisses me ddeee
Explanation:
is it okay if i call you my prada bae?
(take me serious :3)
7.
A videographer wants a fast computer to use to edit video files. What does this customer need to
consider when selecting RAM?
Answer:
16GB RAM
Explanation:
Primary functions of lighting are sufficient light to...
make things sound good
power the cameras
feed the crew
create 3 dimensional on 2 dimensional tv screens
Answer:
I would say, a guide to use for studying.
__________ are organizations of special interest groups that solicit contributions from donors and fund campaigns to help elect (or defeat) candidates based on their stances on specific issues. Group of answer choices
Answer:
The appropriate approach is "Political action committees".
Explanation:
Committees created among moneyed interests to donate to presidential campaigns that are inclined to endorse whose stance regarding controversial factors. Due to various established campaign finance laws, Campaign contributions or PACs have been permitted to make contributions that are far greater just like groups of people would.true false.
(c) In Animate, only one layer
can be activated at a time. ( )
PLZ HELP ME IN MY STUDY
Answer: true
Explanation:
The following image is the basic syntax for a python function definition
def fuctionname( arguments ) :
statement1
statement2
statement3
A. True
b.False
LMK ASAP PLEASE
Answer:
A. True
Explanation:
You didn't post the image, but if the statements on your image are indented, the answer to this problem is A.
Answer:
This is true, the python language follows these syntax orders.