As Jane was setting up her projector, she realized that the images on the screen appeared blurred. How would Jane sort out the issue by herself?
A.
check that the monitor is connected properly with the projector
B.
adjust the distance between the screen and the projector
C.
make changes in the system settings
D.
adjust the focus

As Jane Was Setting Up Her Projector, She Realized That The Images On The Screen Appeared Blurred. How

Answers

Answer 1
it would be D, adjust the focus
Answer 2
The answer is D. Adjust the focus

Related Questions

17
Select the correct answer.
What is the key length of each key in triple DES?
OA 168 bits
ОВ.
56 bits
128 bits
OD
256 bits
OE.
192 bits

Answers

Answer:

OB

Explanation:

bc i said lol

bc i said lol to be 128 bits

Why would an organization need to be aware of the responsibilities of hosting

personal data in its platforms?

Answers

Answer:

Providing transparent services for platform customers. Following data protection regulations to avoid disruptions from lack of compliance.

Under which menu option of a word processing program does a star appear?
A star appears under the
menu of the word processing program.

Answers

UNDER THE MENU OPTION INSERT.

Answer:

shapes

Explanation:

Plato got it correctly

Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles. Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout << fixed << setprecision(2); once before all other cout statements.

Answers

Answer:

Explanation:

The following is written in C++ and asks the user for inputs in both miles/gallon and dollars/gallon and then calculates the gas cost for the requested mileages using the input values

#include <iostream>

#include <iomanip>

using namespace std;

int main () {

   // distance in miles

   float distance1 = 20.0, distance2 = 75.0, distance3 = 500.0;

   float miles_gallon, dollars_gallon;

   cout << "Enter cars miles/gallon: "; cin >> miles_gallon;

   cout << "Enter cars dollars/gallon: "; cin >> dollars_gallon;

   cout << "the gas cost for " << distance1 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance1 / miles_gallon << "$\n";

   cout << "the gas cost for " << distance2 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance2 / miles_gallon << "$\n";

   cout << "the gas cost for " << distance3 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance3 / miles_gallon << "$\n";

   return 0;

}

can someone write the answers pls :(?

Answers

Answer:

A:  job sharing.

B: part-time working.

C:  flexible hours.

D:  compressed hours.

A: Payroll workers, Typing pool workers, Car production workers, Checkout operators, Bank workers

B: Website designers, Computer programmers, Delivery drivers in retail stores, Computer maintenance staff, Robot maintenance staff.

3: Can lead to unhealthy eating due to dependency on ready meals, Can lead to laziness, Lack of fitness/exercise, Manual household skills are lost.

4: Microprocessor controlled devices do much of the housework, Do not need to do many things manually, Do not need to be in the house when food is cooking, Do not need to be in the house when clothes are being washed, Can leave their home to go shopping/work at any time of the day, Greater social interaction/more family time, More time to go out/more leisure time/more time to do other things/work, Are able to do other leisure activities when convenient to them, Can encourage a healthy lifestyle because of smart fridges analysing food constituents, Do not have to leave home to get fit

Explanation:

I tried really hard to solve these. I hope this answers your questions. can you make me the brainliest, that all I ask since I answered it for you. Pleasure solving these. C:

You can Hyperlink by:

Question 5 options:

Press CTRL+K (shortcut)


Go to Insert tab, Link Group, Click on Link Icon


Right click on a word / shape / picture and choose Link


All of the above /

Answers

Answer:

All of the above

Explanation:

I tryed them all

Answer: All of thee above

Consider the regular expressions:

R1 = (01)* (0*1*) (10)
R2 = (101)* (01)*
R3 = (10) (01*)*(01)
R4 = 10(R2*)|R3

Recall that, for a list of regular expressions, the function getToken() returns the next token from the input that matches one of the regular expressions. If there is more than one match, the longest match is returned. If there is more than one longest match, the token with the longest match that appears first in the list is returned. If there is no match, ERROR is returned. If the function getToken() is called once on input 1000101, it will return:

a. R1
b. R2
c. R3
d. R4
e. ERROR

Answers

Answer:

c. R3

Explanation:

For R1;

there are 10 matches, after these 10 no matches occur again

for R2;

this also does not match more than 10 as we have in R1

for r3;

R3 has the longest match. Its matching can be done 1000101 times.

for r4;

The whole of r4 can be matched.

Error;

we cannot have an error because matches exist.

so in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first. R3 came first

In this exercise we have to use computer knowledge to identify which is the correct sequence of code that best corresponds to the given question, in this way we have that the correct alternative is:

[tex]c. R3[/tex]

So analyzing the first alternative, we find;  

For R1, there are 10 matches, after these 10 no matches occur again.

So analyzing the second alternative, we find;

For R2, this also does not match more than 10 as we have in R1

So analyzing the third alternative, we find;

R3 has the longest match. Its matching can be done 1000101 times.

So analyzing the fourth alternative, we find;

For R4, the whole of r4 can be matched.

So analyzing the fifth alternative, we find;

Error; we cannot have an error because matches exist.

So in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first.

See more about computer at brainly.com/question/950632

whats difference between DCE AND DTE serial interface

Answers

DCE stands for data circuit-terminating, data communications, or data carrier equipment - this is a modem or more generally, a line adapter.

DTE stands for data terminal equipment which generally is a terminal or a computer.

Basically, these two are the different ends of a serial line.

In a word processing program, under which tab or menu option can you adjust the picture brightness?

Answers

Explanation:

You must have selected a picture in order the tab format to be available. you should click the picture then you want to change the brightness for and u under picture tools, on the format tab,in the adjust group, click corrections.

Modify the following code so that:
Make the pool start with a random number ([20, 30] inclusive) of coins.
Based on the number of the randomly generated coins at the beginning,
let the computer determine whether Player 1 or Player 2 will be the
winner based on the winning strategy (by printing out the winner).
After deciding the supposed winner and loser, let the computer play
out both of the roles. For the winner, the computer should be applying
the winning strategy; for the loser, the computer should generate a
random amount of coins while following all the rules of the game
Rules of the game:
a) The game starts with 22 coins in a common pool
b) The goal of the game is to take the last coin
c) Two players take turns removing 1, 2, or 3 coins from the pool
d) A player can NOT take more coins than remaining coins in the pool
e) After each turn, the judge announces how many coins remain in the
pool
f) When the last coin is taken, the judge announces the winner
turn=0 #turn=1 remaining coins-24 print(Take turns removing 1, 2, or 3 coins. ) print(You win if you take the last coin.)

Answers

Answer:

Explanation:

The following code makes all the necessary changes so that the game runs as requested in the question. The only change that was not made was making the number of coins random since that contradicts the first rule of the game that states that the game starts with 22 coins.

turn = 0

remaining_coins = 22

print("Take turns removing 1, 2, or 3 coins. ")

print("You win if you take the last coin.")

while remaining_coins > 0:

   print("\nThere are", remaining_coins, "coins remaining.")

   if turn % 2 == 0:

       # Player1

       taken_coins = int(input("Player 1: How many coins do you take?"))

       turn += 1

   else:

       # Player2

       taken_coins = int(input("Player 2: How many coins do you take?"))

       turn += 1

   if taken_coins < 1 or taken_coins > 3 or taken_coins > remaining_coins:

       print("That's not a legal move. Try again. ")

       print("\nThere are", remaining_coins, "coins remaining.")

       if turn % 2 == 0:

           # Player1

           taken_coins = int(input("Player 1: How many coins do you take? "))

           turn += 1

       else:

           # Player2

           taken_coins = int(input("Player 2: How many coins do you take? "))

           turn += 1

       remaining_coins -= taken_coins

   else:

       remaining_coins -= taken_coins

   if remaining_coins - taken_coins == 0:

       print("No more coins left!")

       if turn % 2 == 0:

           print("Player 1 wins!")

           print("Player 2 loses !")

       else:

           print("Player 2 wins!")

           print("Player 1 loses!")

           remaining_coins = remaining_coins - taken_coins

   else:

       continue

Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this future network, anti-spoofing and directed broadcast filters are widely deployed. Also, the security of PCs and workstations is much greater, making the creation of botnets difficult. Do the administrators of server systems still have to be concerned about, and take further countermeasures against, DoS attacks? If so, what types of attacks can still occur, and what measures can be taken to reduce their impact? Explain in detail with valid diagram and example.

Answers

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

hy plzz help me friends​

Answers

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

Answer:

Ram which stands for random access memory, and Rom which stands for read only memory are both present in your computer. Ram is volatile memory that temporarily stores the files you are working on. Rom is non-volatile memory that permanently stores instructions for your computer

Give me good answers

1- what is the money?

2- what is the wealth?

How can it be used for good

Answers

Answer:

Money is currency

Explanation:

Is is how you pay for items

How should employees behave during interactions with clients and co-works

Answers

Answer:always be nice and welcoming

Explanation:

with the utmost respect, you are supposed to respect and listen to your superiors, they are paying you and giving you a job after all, they can easily take it.

How should you schedule a meeting with someone in another time zone?

Answers

If you know what timezone they're in, try to work out what time in your own timezone your free, then tell the other person to do the same. Tell them what times in your timezone and the other can search up what the time is in their own timezone. If there is a specific time when you are both free, use that.

Ex:

You live in the U.S. but you have a meeting with someone in the U.K. You're only free at 4:00pm-6:00pm and they're only free from 10:00am-11:00am. 11:00am in England is 4:00pm in the U.S. so do at that time!

Hope this helps!

please help me faster plzzz
correct plzz​

Answers

Answer:

a. A numeric keypad.

b. An interpreter.

c. A 3D printer.

d. A speaker.

Explanation:

An output device can be defined as a hardware device that typically receives processed data from the central processing unit (CPU) and converts these data into information that can be used by the end user of a computer system.

Also, an input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since output and input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, mouse, scanner, projector etc.

Basically, the three (3) key element of a computer system are: a set of memory modules, processor and a set of input-output (I/O) modules. Each of the input-output (I/O) module interfaces to the central switch or system bus and are used to control one or more peripheral (external) devices.

a. A numeric keypad is a device used to input a PIN. It comprises of numbers ranging from 0 to 9.

b. An interpreter analyses and executes a program line by line.

c. A 3D printer produces output in the form of solid objects. It is typically used for inscribing or printing textual informations or graphic images on an object in three dimensions.

d. A speaker produces output in the form of sound. It is an electronic device that converts electrical signals into sound energy (waves).

The information technology (IT) department of a real-estate group cosponsored a data warehouse with a County governement. In the formal proposal written by the IT team, costs were estimated at 8,000,000/- the project’s duration was estimated to be eight months, and the responsibility for funding was defined as the business unit’s. The IT department proceeded with the project before it even knew if the project had been accepted. The project actually lasted two years because requirements gathering took nine months instead of one and a half, the planned user base grew from 200 to 2,500, and the approval process to buy technology for the project took a year. Three weeks before technical delivery, the IT director canceled the project. This failed endeavor cost the organization and taxpayers 25,000,000/-.

Why did this system fail?

Why would a company spend money and time on a project and then cancel it?

What could have been done to prevent this?​

Answers

The system fail because the company had to pay and spend more money in order to pay the workers.

2. How has the internet changed the way that people get news?

Answers

Answer:

Explanation:

you can access news from anywhere and know what is going on

Answer:

Most of the news is fact due to the ablilty of anybody can make it

Explanation:

Which of the following statements is false?


Copyright exists the moment a work is created.


Copyright protects intellectual property such as text, art, film, music, or software.


Omitting the © copyright symbol means your work is not copyrighted.


Copyright is free.


You are not required to register your copyright.

Answers

Everything is false except the third one :)

It is false that omitting the © copyright symbol means your work is not copyrighted. The correct option is C.

What is a copyright?

Original works of authorship are protected by copyright, a type of intellectual property, as soon as the author fixes the work in a tangible form of expression.

The creators of the works of expression typically control the copyrights, however there are some significant exceptions: When an employee produces a work while employed, the employer is the rightful owner of the copyright.

Some individuals think that a work isn't covered by copyright law if it doesn't display a copyright emblem. That is untrue. The copyright symbol need not be used in most situations.

Thus, the correct option is C.

For more details regarding a copyright, visit:

https://brainly.com/question/14704862

#SPJ2

For this exercise, you are going to complete the printScope() method in the Scope class. Then you will create a Scope object in the ScopeTester and call the printScope.
The method will print the name of each variable in the Scope class, as well as its corresponding value. There are 5 total variables in the Scope class, some of which can be accessed directly as instance variable, others of which need to be accessed via their getter methods.
For any variable that can be accessed directly, use the variable name. Otherwise, use the getter method.
Sample Output:
The output of the printScope method should look like this:
a = 5
b = 10
c = 15
d = 20
e = 25
public class ScopeTester
{
public static void main(String[] args)
{
// Start here!
}
}
public class Scope
{
private int a;
private int b;
private int c;
public Scope(){
a = 5;
b = 10;
c = 15;
}
public void printScope(){
//Start here
}
public int getA() {
return a;
}
public int getB() {
return b;
}
public int getC() {
return c;
}
public int getD(){
int d = a + c;
return d;
}
public int getE() {
int e = b + c;
return e;
}
}

Answers

Answer:

Explanation:

The following is the entire running Java code for the requested program with the requested changes. This code runs perfectly without errors and outputs the exact Sample Output that is in the question...

public class ScopeTester

{

public static void main(String[] args)

{

       Scope scope = new Scope();

       scope.printScope();

}

}

public class Scope

{

private int a;

private int b;

private int c;

public Scope(){

a = 5;

b = 10;

c = 15;

}

public void printScope(){

       System.out.println("a = " + a);

       System.out.println("b = " + b);

       System.out.println("c = " + c);

       System.out.println("d = " + getD());

       System.out.println("e = " + getE());

}

public int getA() {

return a;

}

public int getB() {

return b;

}

public int getC() {

return c;

}

public int getD(){

int d = a + c;

return d;

}

public int getE() {

int e = b + c;

return e;

}

}

1. How important is e-mail communication to you? Why?

Answers

Answer:

Communicating by email is almost instantaneous, which enhances communications by quickly disseminating information and providing fast response to customer inquiries. It also allows for quicker problem-solving and more streamlined business processes.

U $ er Ideas for R 0 B 1 0 X?

Answers

Answer:

umm huh

Explanation:

english please

Answer:

i play ro blox add me wwekane9365

Explanation:

is a
square-shaped blade perfect for digging holes for plants and
bushes.​

Answers

Answer:

Yes. Designed to use in tight spaces, the square-shaped blade is perfect for digging holes for plants and bushes, especially in established gardens where you don't want to disturb existing plants.

Explanation:

Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later
date?
O Waiting on someone else
O In Progress
O Not started
O Deferred

Answers

I think it’s in progress

Answer: D: Deferred

Explanation:

took test

Write a program that would determine the day number in a non-leap year. For example, in a non-leap year, the day number for Dec 31 is 365; for Jan 1 is 1, and for February 1 is 32. This program will ask the user to input day and month values. Then it will display the day number day number corresponding to the day and month values entered assuming a non-leap year. (See part II to this exercise below).

Answers

Answer:

In Python:

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

day = int(input("Day: "))

month = input("Month: ")

ind = months.index(month)

   

numday = 0

for i in range(ind):

   numday+=daymonths[i]

numday+=day

print(numday)    

Explanation:

This initializes the months to a list

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

This initializes the corresponding days of each month to a list

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

This gets the day from the user

day = int(input("Day: "))

This gets the month from the user

month = input("Month: ")

This gets the index of the month entered by the user

ind = months.index(month)

This initializes the sum of days to 0

numday = 0

This adds up the days of the months before the month entered by the user

for i in range(ind):

   numday+=daymonths[i]

This adds the day number to the sum of the months

numday+=day

This prints  the required number of days

print(numday)    

Note that: Error checking is not done in this program

What Are the Components of a Web Address? *​

Answers

Answer:

What Are the Components of a Web Address?

1.Protocol. The first component of a web address is the protocol, which is also known as the scheme. ...

2.Domain Name. The domain name part of the web address is the unique identifier for the website on the internet. ...

3.Domain Extension. ...

4.Path & Filename.

what are the importance of web browser​

Answers

Answer:

Web browser​ helps to access www.

Explanation:

A web browser is a software program that acts as a person's portal and portal to the Internet. It's easy to forget the browser's value now that it's so popular in our everyday lives. Users had to download software only to talk, watch videos, or play music until web browsers were invented.

Libby’s keyboard is not working properly, but she wants to select options and commands from the screen itself. Which peripheral device should she use?
A.
voice recognition
B.
microphone
C.
mouse
D.
compact disk

Answers

C. mouse is the answer

For a company, intellectual property is _______________.


A) any idea that the company wants to keep secret


B) the same as the company’s policies


C) any topic discussed at a meeting of senior management


D) all of the company’s creative employees


E) a large part of the company’s value

Answers

Yea I think it is b but I’m not sure

For a company, intellectual property is any idea that the company wants to keep secret. Thus the correct option is A.

What is intellectual Property?

The type of integrity is defined as "intellectual property" which includes intangible works developed by humans with an innovative and problem-solving approach.

These intellectual properties are protected by companies to avoid leakage of the secret of development as well as to avoid imitation of the creation. This protection of the intellectual property is legally bounded.

If any violation of this act has been noticed and found guilty will have to face consequences in terms of charges of violation as well as heavy penalties based on the type and importance of the work.

Therefore, option A any idea that the company wants to keep secret is the appropriate answer.

Learn more about intellectual property, here:

https://brainly.com/question/18650136

#SPJ2

Which three of the following statements are true about using a WYSIWYG editor?

You can preview the web page you’re creating, but it might appear very differently in a web browser.
After creating a web page, you need to inspect the code the editor generates for correctness.
You can write your own HTML code to create a web page.
You can modify the HTML code the editor generates.
You don’t need any knowledge of HTML to be able to create a web page.

Answers

Answer:

It would be 3

You can preview the web page you’re creating, but it might appear very differently in a web browser. You can modify the HTML code the editor generates. You don’t need any knowledge of HTML to be able to create a web page.

What is WYSIWYG editor?

A WYSIWYG editor stands for "What You See Is What You Get" editor. It is a software application that allows users to create and design web pages without needing to know HTML or other coding languages.

The following are true statements about using a WYSIWYG editor:

You can preview the web page you're working on, but it may look very different in a browser.The HTML code generated by the editor can be modified.You do not need any HTML knowledge to create a web page.

It is not always necessary to inspect the code generated by the editor for correctness after creating a web page, as the editor should ideally generate correct code.

Thus, while you can write your own HTML code to create a web page, this is not a feature unique to WYSIWYG editors.

For more details regarding WYSIWYG editors, visit:

https://brainly.com/question/31574504

#SPJ2

Other Questions
Predict the products of the electrolysis of molten nickel(II) iodide. Write an ionic half-equation for the formation of one of these products. products:ionic half-equation: 2. Why is socialization important? Running a stop sign A. Moving ViolationB. Non-Moving Violation What stands out for you about Danny and Annie's relationship? What will happen? (Newton's 1st Law Egg Drop) Please check my work. I made a lot of mistakes!!! Memos and EmailsEmailOk so here's the thing: 90% of the emails I get from students look like texts. When I was a grant writer, if I sent an email like that, I would have been in my boss's office so fast. SO let's learn proper etiquette for sending emails. 1) Start with a salutation. Hello, Hi, Dear _____, Hi _______, Greetings! any of these work. Make sure your initial email has these. If you don't know the person personally, use Mr., Mrs., Ms., or the new Mx. and their last name. 2) Body: The body has to be right to the point and formal. Most work emails are all business. You can say something like "I hope your Monday is going well!" but beyond that, get to the point. 3) End it well. Best is a good way to go if you don't know the person. Sincerely is good too. It's all personal preference. Just make sure you end it. Also, ALWAYS include your last name. I get so many emails that say "Jackie" or whatever short name people go with, and I have 5 classes. Let's do some math here. Your job is to create an email that you, as the CEO, are sending to one or more of your staff. One is preferable. Set up an issue you wish to address with that person (I really don't care what it is). Make it at least 100 words. Memo An intra-office memo is very important for giving widespread information to your employees. For this piece, you will create a big problem that your employees created, and then send them a memo explaining how you fixed it and how to prevent it from happening again. Use your imagination. Play with this. Make it funny. I want to laughCan someone give me an example I need help pls can anyone help ? What is comparative anatomy and how do scientists use it to study evolution? You can buy 3 CDs for $36.00. Assuming these rates are proportional, what would be the cost of 5 CDs? What is the domain of the function? PLZ HELP ME, 20 POINTS! In the poem the new colossus by Emma Lazarus How does the rhyme scheme and structure of the poem contribute to the poem's meaning? (YOUR ANSWER HAS TO BE ATLEAST A PARAGRAPH LONG, If you post links as answers or if you troll in the answer YOU WILL BE REPORTED.) The Cougars basketball team sold tins of flavored popcorn as a fundraiser. The players competed for prizes to see who could sell the most tins. This box plot shows the results.Popcorn tins soldWhat fraction of the players sold between 8 and 16 popcorn tins? On a road trip, a family drives 350 miles per day. How many days, d, must they travel to reach a distance of at least 1,400 miles?350d ___ 1,400(> or < or less than/more than equal to) Look at the part of this dictionary definition that shows how to pronounce the word feline. Do you see the word eye in the phonetic spelling?feline (FEE leyen) adj. relating to cats; smooth and graceful like a catWhat phrase does feline rhyme with?be minebell pensea greenfall in Find the slope of the line.The slope of the line is ___. Which answers describe the shape below? Check all that apply.O A. TrapezoidO B. ParallelogramO c. SquareD. QuadrilateralE. RhombusF. Rectangle At Home Depot, Johnny bought 3 rose bushes and 7 flats of petunias for a total of $114.75. Rosie bought 2 rose bushes and 6 flats of petunias for a total of $89.50. How much does a rose bush cost? How much does a flat of petunias cost? Please help me!Will mark brainliest and a thanks + five stars if correct Determine the y intercept (8gtade