Answer:
91
Explanation:
Fill in the blank
please help.
_______________________ _____________________ software allows you to prepare documents such as _______________________ and _______________________. It allows you to _______________________, _______________________ and format these documents. You can also _______________________ the documents and retrieved it at a later date.
Answer:
Application software allows you to prepare documents such as text and graphics. It allows you to manipulate data , manage information and format these documents. You can also store the documents and retrieve it at a later date.
In Super Mario 64, a character called Lakitu follows Mario around on a cloud, filming him with a camera as though he were shooting a news broadcast. What type of character perspective is this an example of?
Second-person perspective
First-person perspective
third-person perspective
over-the-shoulder perspective
Answer:
A second person prespective
Explanation:
Answer:
i had dat gam i think its 3rd person but i am not positive... i have never even heard of over the shoulder perspective.
Help PLEASE ILL MARK as brainlest
Answer:
computer animation (3d)
Assume that the method call slope(1, 2, 5, 10) appears in a method in the same class. What is printed as a result of the method call
Answer:
8\4
Explanation:
hope it hepl
According to the question, the answer would be 8/4.
What is the Result?something that happens as a result of a cause, problem, or conclusion; a positive or observable result.
The modifications or consequences that are anticipated to occur once the project is implemented are referred to as project results. The recipients' lives have typically improved as a result of the results. Three categories of results are presented: Outputs. Outcomes.
Results reflect how successful we are as people. In project management, it's very crucial to track your progress. The results of a project should always be evaluated. How would we recognize our accomplishments and draw lessons from our mistakes if we didn't measure?
To know more about the Results follow the link.
https://brainly.com/question/27751517
#SPJ5
Which is a function of an operating system?.
Answer:
An operating system is known as the interface between the computer hardware and the user itself. It is one of the most essential parts of a computer, and is the most integral software. It's responsible for executing programs, handling other inputs i.e an additional mouse, keyboard, etc. as well as handling storage for data and other files. In addition to this, it manages the computer's resources as well as executes and enables services.
Is noreasters the kind of weather that a place has over a long period of time (true)or (false) ?
tax preparation software can help prepare and file your taxes by _________.
List four types of Web browsers
Answer:
internet explorer safari tor firefox
Explanation:
Edward scissorhands Of course, Jim is the villain, but who or what is the antagonist in the film? Explain in detail.
5G can support more users simultaneously than LTE, but it may not provide any improvements in terms of data rates. True or False
Choose the correct function to yield the shown result.
>>>____(3)
3.0
- int
-round
-float
-str
Answer:
int
Explanation:
Correct on edg test 2021
Which component of a DC motor ensures electrical connectivity to the rotor?
What is the value of the current in x?
Answer:
ketchup?
Explanation:
4.2.5 codehs text messages answer
Answer:
public class TextMessage
{
private String message;
private String sender;
private String receiver;
public TextMessage(String from, String to, String theMessage)
{
sender = from;
receiver = to;
message = theMessage;
}
public String toString()
{
return sender + " texted " + receiver + ": " + message;
}
}
Which process refers to the process of translating between a set of private addresses inside a network and a set of public address outside the network
Answer:
The process of translating between a set of private addresses inside a network and a set of public addresses outside the network is called
IP pulling through use of a subnet mask bypass
Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name using that registered name along with his country code. The name has already been registered by someone else. What should Bob do
Answer:
bobo
Explanation:
Which animation category provides custom animations for objects on the slide?
*it's d. motion paths
Answer:
d. Motion Paths
Explanation: is correct. post protected
Write a function ComputeVal that takes two integer parameters and returns the product of the two parameters plus 9. Ex: ComputeVal(4, 6) returns 33.
Answer:
#include <iostream>
using namespace std;
/* Your code goes here */
int main() {
int input1, input2;
int result;
cin >> input1;
cin >> input2;
result = ComputeNum(input1, input2);
cout << result << endl;
return 0;
Explanation:
If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account
A lot of services are being provided over the Internet. If you do not want to use your Internet service provider (ISP) for your email account, you can you acquire a webmail account through online services
An online service is simply known as body that gives access to various types of data for different uses through the use of the the Internet.Examples are: online banking, news, shopping, social media networks, e-mail etc.
This services done online gives an avenue in which subscribers can communicate with one another via exchanging e- mail messages or through online conferences or forums.
Learn more from
https://brainly.com/question/9930336
What is the largest integer that can be represented with 4 bits?.
Answer:
15
Explanation:
You can calculate the maximum number using a simple formula:
2^N (Where N is the number of bits) - 1
So 2^4 - 1 = 16 - 1 = 15
What is the difference between the dom api and the html dom api.
I recorded a video on my windows PC, but when i tried to play it i got this message:
Windows Media Player cannot play the file. The Player might not support the file type or might not support the codec that was used to compress the file
is there a free online way i can fix this
Answer:
rename the file then type ".MP4" at the end and it should work
by the way big warriors fan as well
Explanation:
If you want to share information with individuals who are internal to your organization, which type of network would you want to use
it is globe because I want a successful the all people
Identify the link element that accesses a style sheet file named output. Css only when the device is a printer or a projection device.
There are different types of link element. The link element that accesses a style sheet file named output is:
<link href="output.css" media="print, projection" />
Style sheets often shows a key growth for Web page designers, widening their ability to boast the appearance of their pages.In the web environments, people are very concerned with the content of their documents than the way it was presented.
There are techniques that often work for some of the people but not for all of the people and there is need therefore to make new techniques.
Learn more about link element from
https://brainly.com/question/25608430
Which option ensures that items in a text box or table cell will be in the absolute center of that element?
*i chose b. center, align, middle and got a 100 edg21
Answer:
Center, Align, Middle
Explanation:is correct. post protected
What happens as a blog's audience grows?
A. It acquires more insurance.
B. Its influence widens.
O C. Its HTML becomes longer.
O D. It acquires more domain names.
Answer:
ᴀ. ɪᴛ ᴀᴄǫᴜɪʀᴇs ᴍᴏʀᴇ ɪɴsᴜʀᴀɴᴄᴇ.
Explanation:
Hᴏᴘᴇ Iᴛ's Hᴇʟᴘ
Explanation:
[tex]a \: it \: acquiresmore \insurance[/tex]
A. it's acquires more insurance
Sort the options for formatting a table under the tab where they are located.
Answer:
yes those are the correct order
Explanation: post protected
How do you calculate the file size of a text file?
Answer:
It is calculated by multiplying the surface area of a document (height x width) to be scanned by the bit depth and the dpi2. Because image file size is represented in bytes, which are made up of 8 bits, divide this figure by 8.
HELP ME!!!!!!! %) select all the correct answer. What will be the output of using the element in the given HTML code? 1011 2 A. 10112 B. 10112 C. 21011 D. 21011
Answer:
A or B
Explanation:
I'm not sure I used HTML a bit but I am not a pro on it so this might be not correct
Tell me if I'm wrong :)
Answer:
The answer is B: 1011 with the two under
Explanation:
I got it correct on my test.
NO LINKS Please
Based on the information presented in the article, do you think that schools should invest in technology to improve academic outcomes for their students? Explain.
Answer:
ok po majsbejwwlaodhd susbvskwmoskwaubsbsiwnwis sisbsbsb is a good 2AM 2AM 2nd edition 2and I am a nanny 2and and u 2122feet 225feet to see how 2nd grade are you 22feet but not yet a lot more because it has alot of people who is the key to the girl in your life of your own life NATO is the most powerful and I was a great person in a sentence and a very nice meeting you had to do nothing babe and she had an affair in a way maker that I am in a relationship with u are in bed now babe and my mom and my dad a lot of my cousn and my kids in the morning and my kids were in the same boat and 5PM was the first of my two 5th grade boys in school to be with u at work now babe on my messenger then the Lord was in bed and she had no probs and no babe to be in Philippines and my kids had to be a good 58 and a little more because I was so happy bday sis had a lot to say about the girl and she was busy with me I will be having dinner with the kids on me sometime next time because she is very good at home now babe ruth is it ur wife is still single forever ni mama ne is a good girl also a big part in her to be the center babe if I will be a good person and I think they 5th 5 and 5 and u have a lot more to lose than me if u have a lot
Answer:
Yes because using technology in classrooms has the potential to create increased student motivation, increased social interactions, positive outcomes, enhanced student learning, and enhanced student engagement.
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.