Answer:
I think D but I'm not sure
Complete the statement about WYSIWYG editors when you use a WYSIWYG editor you typically specify the continent and blank A.layout B.Html Code C. Meta tags while the editor generates the blank A.layout B. Html code C. Meta tags
Answer:
When you use a WYSIWYG editor you typically specify the content and layout while the editor generates the HTML code
Explanation:
Required
Complete the blanks
In WYSIWYG, the user of the application provides contents to the WYSIWYG software and also designs the appearance; The appearance is referred to as the layout.
Throughout the design, the user will not use HTML codes; it is the duty of the WYSIWYG editor to generate HTML code based on the input designs by the user.
1. Samantha uses the RSA signature scheme with primes p = 541 and q = 1223 and public verification exponent e = 159853. (a) What is Samantha's public modulus? What is her private signing key? (b) Samantha signs the digital document D = 630579. What is the signature?
Answer:
Why is samantha asking us? She should find out herself smh
Explanation:
What is the relationship between optical drives and WORMs?
Optical drives are advanced versions of WORMs.
WORMs do not affect optical drives.
Optical drives are susceptible to WORMs.
WORMs are types of optical drives.
Answer:
When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.
Explanation:
Good luck
what would be the most constructive response
Answer:
we cant tell what your talking abt please repost with at pitcher or a exolination
Explanation:
in remote areas,your gps device may lose reception. its good idea to have a
Answer:
map or compass or follow a trail so you don't get lost
Explanation:
Which of the following is true of how packets are sent through the Internet?
Packet metadata is only included on important packets to indicate they should get access to faster paths through the network
Packet metadata is used to route and reassemble information travelling through the Internet
Information sent through the internet is only encapsulated in packets if the message is too large to be sent as a datastream
Information sent through the internet is split into two packets, one which contains the message and another which contains the metadata
Packet metadata is used to route and reassemble information travelling through the Internet
-scav
Hey does anyone think nervegear would be possible? (Just asking)
Answer:
Depends
Explanation:
Technology is not advanced yet, so building a fully functional nerve gear is difficult. It could be possible in a few years though.
Answer:
No, the Nerve Gear cannot be possible at the moment. However, in Japan, they are creating the Nerve Gear and is to be released in May 2022 told by the creator, Kayaba Akihiko. So, the Nerve Gear cannot be possible in 2020 but in 2022. We just have to wait for two more years.
Explanation:
please choose me as brainliest if that is ok ;)
Question 3 of 10 A compressed file containing visual data is called O A. a track O B. a video O C. an audio file . O D. an image file
it's called an image file
[tex]\huge{\textbf{\textsf{{\color{pink}{An}}{\red{sw}}{\orange{er}} {\color{yellow}{:}}}}}[/tex]
D. An image file.
ThanksHope it helpsPls mark as brainliestA software development company has created an application called FileCleanUp. When the application is run on a user device, it searches for all files (including pictures, videos, and documents) that have not been accessed in the past month, stores them on the company’s Web server, and deletes them from the user device. The application runs once each day. Users have the ability to manually retrieve files from the server if they are needed.
Which of the following is most likely to be a harmful effect of using FileCleanUp?
A. It prevents users from accessing frequently used files when there is no Internet connectivity.
B. It prevents users from accessing infrequently used files when there is no Internet connectivity.
C. It prevents users from accessing frequently used files when there is reliable Internet connectivity.
D. It prevents users from accessing infrequently used files when there is reliable Internet connectivity.
Answer:
B
Explanation:
The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection
The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection.
What is Software development?Supercomputing and other computing methods are sometimes used interchangeably. Yet, there are times when the synonyms aren't clear. To assist clarify some similarities and differences between various computer types, here are some common analogies.
While supercomputing typically refers to the process of complex and massive calculations used by supercomputers, high-performance computing (HPC) is the utilization of several supercomputers to execute difficult and huge computations.
Supercomputers are often known as parallel computers since they can perform parallel processing. Parallel processing is the simultaneous use of many Processors to solve a single calculation.
Therefore, The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection.
To learn more about Software, refer to the link:
https://brainly.com/question/985406
#SPJ6
How can users open a shared worksheet if they do not have Excel installed on a computer? visit Microsoft’s website use Office365’s home page open a PDF version for editing use Excel Online through the 365 portal
Answer:
use Excel Online through the 365 portal
Explanation:
just did it
Item 3
Which of the following describes new technology development?
A harmless process
A somewhat assured process
A partially risky process
A very risky process
Answer:
A somewhat assured process
B. A somewhat assured process is describes new technology development
What are the five phases in technology development process?Five phases guide the new product development process for small businesses: idea generation, screening, concept development, product development and, finally, commercialization.
What is technology development process?Technology Development Process, is a directed process at developing new knowledge, skills and artefacts that in turn facilitates platform development
To learn more about new technology development, refer
https://brainly.com/question/27090068
#SPJ2
Edhesive 8.3 lesson practice pls help
Answer:
String data type
Explanation:
See attachment for complete question
Required
Data type in stuff
On line 1 of the program, stuff is initialized as an empty list.
Line 2 to line 4; some elements are appended into stuff list
These elements are written in quotes
In programming, when an expression is written in quotes, such expressions are referred to as strings.
Hence, the elements stored in stuff are string datatypes
The data types in the elements "stuff" are string datatypes
What is strings data type?String data type are data types in programming which is used when an expression is written in quotes(" ").
What is programming?Programming can be defined as process of building or designing a computer program. It involves building computer instructions or algorithm and the use of the instructions to perform a particular task.
There are different types of programming language:
JavaJavaScriptPHPSQLpythonRubySwiftLearn more about programming:
https://brainly.com/question/16397886
The photograph shows a way individuals work together in groups a the photograph
Answer:
D. AdministratorsExplanation:
Hope it helps
#CarryOnLearning
In a word-processing program, what are the easily accessible icons that allow you to print, save and change fonts with a click of a button?
A- tool bar
B- keyboard shortcuts
C- preferences
D- printing options
The answer is A. tool bar
print a test page what is the answer.
Answer:
The keys "Ctrl" and "P"
List three features of the third generation of computers
Explanation:
Features:
1.They were small and efficient than previous generation.
2.They use integrated circuits as main electronic circuit.
3.The operating speed was increased unto nano seconds.
Hope it helps and have a good day.
jdr-wivg-vmb
co.me a.nd jo.in fa.st...
go.ogle me.et
Explanation:
what is this don't post like this
Write a program to create a list of numbers in the range of 1 to 10. Then delete all the even numbers from the list and print the final list.
Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in: a) agriculture and away from services b) services and away from agriculture c) industry and away from services d) agriculture, services, and industry
Answer:
^^^^^ what they said
Explanation:
its b
Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture. Thus, option C is correct.
What does the graph represents?According to the graph, the globalization process (period 2000-2019) has affected China by decreasing the proportion of workers in agricultural activities from more than the 40% to not much above the 10%.Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture.
Meanwhile, workers in the service sector have increased from less than the 30% to more than the 60%. The percentage of people working in manufacturing activities has remained more or less stable, around the 30%.
Thus, option C is correct.
Learn more about service sector on:
https://brainly.com/question/14606383
#SPJ7
Which of the following is the best example of a way in which a programmer can use abstraction to manage the complexity of a program?
Replacing each instance of repeated code with a call to a procedure
Replacing longer variable names with shorter variable names to reduce typing errors
Replacing several lines of documentation with a single line of documentation
Replacing lists with individual variables
The best example of a way in which a programmer can use abstraction to manage the complexity of a program is to Replacing longer variable names with shorter variable names to reduce typing errors.
Why the replacement?The act of Replacing longer variable names with shorter variable names to reduce typing errors is very important.
Conclusively, in any programming, to handle the complexity of a program, on can Replace the string variables such as name1, name2, name3, and name4 with the use of list of strings known as the shorter form called names.
Learn more about programmer from
https://brainly.com/question/23275071
New technology is NOT vital to businesses in which of the following ways?
Add to a product portfolio
Decrease market share
Help businesses stay competitive
Attract new customers
Answer:
The only option that would best fit this situoaion is Decrease market share, both Help businesses stay competitive and Attracting new customers are kind of similar and depend on new tech about 60-80% of the time usually, the first option dose no have any major connection with new technology.
hope this helps :)
If the cell to the right of the cell you are typing in is ________, the data can "bleed" over that cell.
A. Full
B. Numerical
C. Empty
D. Formatted
**ATTENTION** If you send me a file, or a link for something to download your answer will be reported. Please answer through text. Thank you!
HELP I HAVE A D RN PLEASE
Use the drop-down menus to describe how to encrypt a database with a password.
1. In Access, click Open on the File tab.
2. Select the database.
3. Click the drop-down arrow to the right of Open, and click
.
4. Click the File tab.
5. Click
, and select Encrypt with Password.
6. Enter a password when you are prompted
. Click OK.
7. Close and reopen the database.
8. To open the database again, you will need to
.
Answer:
1. Open Exclusive
2. Info
3. twice
4. enter a password
Explanation:
In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password
Which view is opened when File tab is clicked?The Backstage View is said to be opened. Note that one can use the Backstage through the clicking of the "File" tab that can be found on the top-left hand side of the system application window.
Note that In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password.
Learn more about password from
https://brainly.com/question/17174600
#SPJ2
PLEASE HELP Write a program that loads one three-digit number and prints the root of its largest
digits in python.
Answer:
num1 = float(input("Enter first digit of number: "))
num2 = float(input("Enter second digit of number: "))
num3 = float(input("Enter third digit of number: "))
if (num1 > num2) and (num1 > num3):
largest = num1
num_sqrt = num1 ** 0.5
elif (num2 > num1) and (num2 > num3):
largest = num2
num_sqrt = num2 ** 0.5
else:
largest = num3
num_sqrt = num3 ** 0.5
print("The square root of largest digit of the three digit number is",num_sqrt)
Explanation:
num1 = float(input("Enter first digit of number: "))
num2 = float(input("Enter second digit of number: "))
num3 = float(input("Enter third digit of number: "))
if (num1 > num2) and (num1 > num3):
largest = num1
num_sqrt = num1 ** 0.5
elif (num2 > num1) and (num2 > num3):
largest = num2
num_sqrt = num2 ** 0.5
else:
largest = num3
num_sqrt = num3 ** 0.5
print("The square root of largest digit of the three digit number is",num_sqrt)