What are the most common forms of information?
Answer: web search
Explanation:
Which best defines what a script tag does?
Answer:
The answer to your question would be C , A tag used to write programming scripts.
Explanation:
The element either contains scripting statements, or it points to an external script file through the src attribute. Common uses for JavaScript are image manipulation, form validation, and dynamic changes of content. Hope this helps you! </p><p></p>
Collaboration, listening, and negotiating are considered __________ skills.
interpersonal
mathematical
personal
verbal
VERBAL IS NOT THE ANSWER SOMEONE HELP
Answer:
interpersonal
Explanation:
Interpersonal skills are the types of skills that enhance the individuals' social interaction and communication means with others whereby there is the establishment of social rules and references.
It involves social communication activities such as collaboration, listening, and negotiation.
Hence, in this case, the correct answer is "INTERPERSONAL SKILLS.
Answer:
A. is correct
Explanation:
Choose the term that completes the sentence.
A bubble (sort/function/search) starts by comparing the first item in the list to the rest of the items.
If the first one is greater than a later item, the items are swapped.
Answer: BUBBLE SORT
I hope I've been helpful to you.
Answer:
Sort
Explanation:
I Answered this in Edge.nuity and it was correct
If you would like to compare information on two different Web pages, you should _____.
scroll through the pages
the home page
use tabs
organize bookmarks
Answer:
Use Tabs
Explanation:
I had this lesson on odyessy ware and this was right the other guy is wrong
Answer:
Use Tabs is also correct on Edge nuity
Explanation:
i have Keyboarding and Apps
A student who might find digital learning challenging.
Digital learning exists mostly online, while traditional learning takes place in a classroom building.
Answer: it is "A"
|Likes meeting other students.|
Kerri is adding text and graphics to her presentation. She does this work in the _____. Normal (Slide) view Task pane Formatting toolbar Slide Sorter
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is Normal View.
Kerri can add text and graphics to her presentation. She does this work easily in the Normal view of the slides. In normal view, you can edit your slide by slide and navigate with the thumbnail.
while other options are not correct because:
Task pan is used to show information about the current slide.
Formatting toolbar is used for formatting the contents in the slide
Slide sorter is a view that is used to see the thumbnail of all slides in your presentation to easily rearrange them.
For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used
Answer:
These technologies are: Dual Stack Routers, Tunneling, and NAT Protocol Translation.
Explanation:
Dual Stack Routers - This is the process in which a router’s interface is attached with IPv4 and IPv6 addresses
Tunneling -Tunneling is used as a medium to help the different IP versions communicate with the transit network.
NAT Protocol Translation - This helps the IPv4 and IPv6 networks communicate with each other since they do not understand the IP addresses of each other since, they are different IP versions.
The two technologies that are used when Internet Protocol (IP) v6 traffic travel on an IP v4 network are datagrams and ipv6.
A datagram can be defined as a transfer unit that is associated with a packet-switched network. Internet Protocol version 6 (IPv6) is a protocol used for packet-switched inter-networking. The IPv6 is a protocol used for end-to-end datagram transmission through multiple Internet Protocol networks.In conclusion, the two technologies that are used when Internet Protocol (IP) v6 traffic travel on an IP v4 network are datagrams and ipv6.
Learn more in:
https://brainly.com/question/14851068
Fill in the blanks : To store 3 character a computer occupies...................bytes memory space
Answer:
Umm was there supposed to be a picture????
Explanation:
Hope you have a wonderful Christmas Eve time with your family!!❄️
Eight bits are called a byte. One byte character sets can contain 256 characters. The current standard, though, is Unicode, which uses two bytes to represent all characters in all writing systems in the world in a single set.
What is memory space?Memory refers to the location of short-term data, while storage refers to the location of data stored on a long-term basis. Memory is the power of the brain to recall experiences or information.
Memory is most often referred to as the primary storage on a computer, such as RAM. Memory is also where information is processed. It enables users to access data that is stored for a short time.
Learn more about Memory here,
https://brainly.com/question/23423029
#SPJ2
Question # 3
Dropdown
Finish the code for this bubble sort.
length = len(myList)
for n in range(length - 1):
for test in range(n + 1, length):
if myList[n] _____ myList[test]:
temp = myList[n]
myList[n] = myList [test]
myList[test] = temp
print(myList)
Answer:
The answer is >
Explanation:
I did the assignment on edge this was the correct answer
The complete code is length = len(myList), for n in range(length - 1):, for test in range(n + 1, length):, if myList[n] > myList[test]:.
What is coding?Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming (i.e., the source code).
Although learning to code is not difficult, it might be scary at first. The initial stages of learning something new might be difficult. With practice, persistence, and patience, coding becomes simpler. If you're thinking about learning to code, it's simple to get caught up in the challenge.
Languages written in an imperative, functional, logical, or object-oriented style are common. These coding language paradigms are available for programmers to select from in order to best meet their demands for a given project.
Therefore, the correct term to complete the code bubble sort is >.
To learn more about coding, refer to the link:
https://brainly.com/question/20712703
#SPJ2
How can you make the drawing tools contextual tab appear
Answer:
C. place the insertion point in any text in the text box.
Typically, the Ribbon contains the Draw tab. Here's how to add it, though, if you can't see it on yours. Customize the ribbon by selecting it with the right mouse click. Click OK after selecting the checkbox next to draw. Thus, option C is correct.
What make the drawing tools contextual tab appear?If your Draw Tools are hidden, you can reveal them by bringing up the View menu, selecting Toolbars, and then selecting Drawing. Look at the Draw Tools' features for a bit.
When you click outside these objects, the tools in the contextual tabs are put away, giving you the options and resources you need to deal with them.
Clicking on the item causes the tab to reappear, and you can get them back. Your workspace remains uncluttered as a result.
Therefore, place the insertion point in any text in the text box.
Learn more contextual tab about here:
https://brainly.com/question/14139335
#SPJ2
Write pseudocode for washing a car using at least five steps.
Answer:
Step 1: Prepare the Cleaner
Pour a capful of car wash cleaner into a bucket and fill it a little over halfway with tap water. Car wash soap is specially designed to clean a car's exterior surfaces without stripping off wax, and it is typically sold alongside wax and car-detailing products in stores. Toss the first sponge in the bucket to let it soak up water and cleaner.
Step 2: Use the Garden Hose First
Spray water all over the car, starting at the top and working down the body of the car.
Step 3: Wash the Roof
Wash the top of the car first by squishing most of the excess water out of the sponge, then begin washing. Rinse the top as soon as you finish to ensure that the cleaning product does not dry on your car's paint. Blot the excess water off with your chamois or a terry cloth towel.
Step 4: Wash the Car's Body
Wash the car's body in sections, one panel at a time. Spray each panel with the garden hose again before washing with the sponge and cleaner. Rinse immediately after washing.If the water is not drying too fast, complete one whole side of the car before drying. If the water is drying quickly, dry each panel as soon as you finish washing.
Step 5: Wash the Wheel and Tires
Spray the wheel and tire cleaner on the wheels and tires.Using the second sponge, a brush or a rag, rub the cleaner into the tires to remove any remaining road dirt.
Step 6: Drying Your Car
Check your product's label to see if it needs to be washed off with water or buffed with a clean rag to complete the project.
Which tab in MS Word would you select to insert a shape into a document? Question 6 options: Insert Review View File
Answer:
Insert
Explanation:
Under the insert tab, shapes will be an option to put in under the illustrations category.
Answer:
um insert?
Explanation:
im assuming its insert bc you said "to insert a shape into a document" so yh
i hope this helped?
I have a problem with my Nintendo DS lite does anyone know how to fix it?
Try checking if the battery is still working, they usually tend to give out at times.
How do you do that ( the bit that I circled in the picture)
Grades are numbers or ________ that show how a student performed in a course.
Select four Microsoft programs.
a. Serrer
b. Visio
C. Office
d. Windows 7
e. Red Hat
Answer:
Windows, office serrear and Visio
Explanation:
HELP PLZZ Which statement is true? Select 3 options.
A. A function must have a return value.
B. A function can use variables as parameters.
C. The definition of a function must come before where the function is used.
D. The definition of a function can come before or after it is used.
E. A function can have more than one parameter.
Answer:
B. C. E.
hope this helps :D
Answer:
The definition of a function must come before where the function is used.
A function can have more than one parameter.
A function can use variables as parameters.
Explanation:
what is bespoke software???
Answer:
custom-built to address the specific requirements of a business
Explanation:
Answer:
As such we are going to highlight a number of examples of bespoke software. As enthusiastic business owners, we all want to be unique.
...
2. Customer Relationship Management (CRM)
Business Process Automation System. ...
Automated Invoicing. ...
Company-Facing / Customer-Facing Web Portals. ...
Ecommerce software solutions.
Explanation:
There ya go
The French horn was originally used as a hunting horn.
A. True
B. False
Subject: Music Technology.
Answer:
A. True
Explanation:
The French horn is a brass instrument delivered from the hunting horn. The first development of the instrument was in service of the hunt or signal of danger. Additionally, they were used in Jewish religious rituals. It was less complex than the instrument used today. Around the beginning of the 18th century, it started to be widely used as a musical instrument.
Today, it is played by the musicians called hornists, and there are usually four horns in the symphony orchestra. There are few variations of the instrument – single horn, double horn, compensating double horn, and triple horn.
What does the "zoom tool" do in Photoshop?
O
A. All of the above
o
B. It gives the illustrator the ability to zoom in and out of the image
o
C. It gives the illustrator the ability to edit the image at a closer look
O D. It gives the illustrator the ability to erase the image better by having a closer look
Answer:
A. All of the above
Explanation:
As a programmer, why do you think that skills and training are needed? Give 5 reasons.
computer network reduces the cost of operation
Answer:
Computer Networks can allow businesses to reduce expenses and improve efficiency by sharing data and common equipment, such as printers, among many different computers. At the same time, the network may be connected by cables, telephone lines, infrared beams etc, which is cheaper and helps to reduce the expenses.Explanation:
Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated with password databases.
Answer:
Pluggable authentication modules (PAM).
Explanation:
These are schemes that are seen to be used in API authentication. It is relyed on to provide high authentification protocool in any correct form it is seen to be in use. also its ability to grant access to each other within two people interface are reasons big user clients refer to it in most of their policies that deals with their working system passwords and their database passwords to most of their files. This is why the company in the context which is a big firm rely on it for its services.
anyone else parents take your phone and you ask for it nicely and they say no and you ask why and they ignore you
Answer:
that's the same situation with me but with other objects cuz me no have ph0nE
Explanation:
when i was a smol chiLd i would get beat if i didnt know my multiplication table l0l
Which actions help to protect a computer and keep it running properly? Check all that apply.
performing regular scans
deleting any unwanted files
backing up files and other data
saving Internet browsing history
saving and storing all junk files
Answer:
ABC
Explanation:
100% EDGE 2022
help plz, u just gotta select all that apply :)
Answer:
Concept: Graph Analysis
We want to know all those that produce around 0.01 kg: Parsly, Coriander, Mint, Strawberry Rate positively and give brainlist69.147.76.15 is an example of what?
Answer:
IP address.
Explanation:
An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.
Hence, 69.147.76.15 is an example of an IP address.
In Computer networking, IP address are classified into two (2) main categories and these are;
1. Local (internal) IP address.
2. Global (external) IP address.
Generally, when this IP address such as 69.147.76.15 is translated by a domain name system (DNS), it is mapped to the domain name yahoo.com which is much more understandable or comprehensible to the end users.
heeeeeeeeeeeelp idek plz help
Answer:
b
Explanation:
Write a program that prints the numbers 1 - 50. If the number is even print the word 'EVEN!' next to it. If the number is odd print the word 'ODD!' next to it.
In python 3.8:
for x in range(1,51):
print(str(x)+" EVEN!" if x %2==0 else str(x)+" ODD!")
This works for me. Best of luck.