Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File

Answers

Answer 1

Answer:

Explanation:

1.Save and Save As

The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name

2.Blank Document and Template

Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template

3. Existing File and Recently Open File

Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist


Related Questions

Which of the following statements is true about scalability? Choose 3 options.

Horizontal scaling has fewer limits than vertical scaling.

Scalability refers to the ability of hardware components to increase their capacity.

Scalability should be considered very early in the project.

The cloud offers services to automatically scale your system and balance the workload between components.

An example of vertical scaling is adding a new server to the network.

Answers

Answer:

Horizontal scaling has fewer limits than vertical scaling.

The cloud offers services to automatically scale your system and balance the workload between components.

Scalability should be considered very early in the project.

Explanation:

Hope this helps :) If not, please let me know what answers are wrong

The statements that is true about scalability are:

The clouds provide resources to scale the system and balance the workload between components

Scalability should be considered at the beginning of the project.

Horizontal scaling has fewer limits than vertical scaling.

Horizontal scaling is a type of scaling by adding more machines to your po of resources.

It is also called adding more power.

The difference between scaling up and scaling out is that horizontal scaling simply adds more machine resources to your existing machine infrastructure.

Vertical scaling is simply known to adds power to your existing machine infrastructure by increasing power from CPU or RAM to existing machines.

Conclusively, Scalability part of a system that handle a growing amount of work by adding resources to the system.

Learn more from

https://brainly.com/question/17661222

Which of these functions may be used with positional arguments? Select four options.

AVERAGE
COUNTIF
COUNT
SUM
MAX

Answers

Answer:

AVERAGE

COUNT

SUM

MAX

Explanation:

The functions that may be used with positional arguments include:

AVERAGE

COUNT

SUM

MAX

The basic functions formulae include SUM, AVERAGE, COUNT, MAX and MIN.

SUM: This is the sum total of all the numbers in the rows.

COUNT: This is the used to count the range of cells that contains numbers.

AVERAGE: This is the average of all the numbers in the rows.

MIN: This is the lowest number in the rows.

MAX: This will return the highest number that is found in the set of values.

It should be noted that the COUNTIF is not used with positional arguments.

You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your network. You have decided to create global groups as shadow groups for specific departments in your organization. Each global group will contain all users in the corresponding department. In this lab, your task is to: Create the following global security groups on the CorpDC server in their corresponding OUs: OU Creation Location New Group Name Accounting Accounting Research-Dev Research-Dev Sales Sales

Answers

Answer:

1. Select Tools then Active Directory Users from the Server Manager

2. Navigate to the relevant Organizational Unit, OU, in the Active Directory

3. Select New then Group in the OU in which a global securities group is to be created

4. The group name (Accounting, Research-Dev, or Sales) is entered into the Group name field

5. Select the scope of the group

6. The group type is then selected (Domain Local, Global, or Universal)

7. The user accounts are then added to the group as follows;

i) Selecting the Add to a group option after right clicking a user account

ii) Enter the name of the appropriate group in the field to Enter the object names to select

iii) A group scope and group type is then selected

iv) Click on Check names

v) Other users can be added to the group by repeating steps i), ii), iii), and iv)

8) To add additional users to the group, the step 6, 7, and 8 is to be repeated

Explanation:

How to principal payment calculation in EMI? Give me example.​

Answers

Answer:

o calculate EMI

The mathematical formula to calculate EMI is: EMI = P × r × (1 + r)n/((1 + r)n - 1) where P= Loan amount, r= interest rate, n=tenure in number of months.

Answer:

yea

Explanation:

Define Fiber optic cable​

Answers

an assembly similar to an electrical cable, but containing one or more optical fibers that are used to carry light

Explanation:

An optical fiber is a flexible, transparent fiber made by drawing glass or plastic to a diameter slightly thicker than that of a human hair.

What is the difference between Packaged and tailored soft ware?​

Answers

Answer:

Package software is developed by computer technicians. modified or changed if there is need because these software are custom-built. Tailored Software- Tailored software is the software that is developed as per the specifications and requirements of the users.

Explanation:

hpithlps.

Who said the following, and what does it mean? Conceit, more rich in matter than in words, Brags of his substance, not of ornament. They are but beggars that can count their worth; But my true love is grown to such excess I cannot sum up half my sum of wealth. (II. vi. 33-37) Juliet; she is saying that she doesn't care about money. Lady Capulet; she is reminding Juliet how lucky she is to be marrying Paris. Romeo; he is saying that true understanding has made him realize how very lucky he is to be marrying Juliet. Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Answers

Answer: Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Explanation:

Juliet was talking to Romeo in this instance and trying to tell him that it was easy to speak words but that for those words to be properly understood, action must follow them.

In other words she was telling him that to truly understand something, actions must back it up. She then goes on to say to him that the love she has is so much that it has made her feel more wealthy.

Name the type of token x belongs to: x=10+20+30 a) Keyword b) Literal c) Identifier d) Operator
Computer class 11

Answers

Answer:

C) Identifier is the answer I am answering question of class 11 but I read in class7. Thank you!!!

Computer hardware refers to: Group of answer choices the mechanism through which users interact with a computer. handheld computing devices meant largely for mobile use outside an office setting. a precise set of instructions that orchestrate the functioning of the computer. a program that fulfills the requests of a client. the physical components of information technology.

Answers

Computer hardware is referred to as: E. the physical components of information technology.

A computer refers to a programmable-electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an output (information) that could be used by the end user.

Generally, the components of a computer is broadly classified into two (2) main categories and these include:

Software: such as operating system (OS).Hardware: it include speaker, keyboard, CPU, monitor, etc.

In conclusion, a computer hardware is simply the physical components of an information technology (IT) because they can be seen and touched.

Read more on computer hardware here: https://brainly.com/question/959479

the second generation computer used. as a memory device

Answers

Answer:

The period from 1959-1965 was the second generation. Transistors that are cheaper, consumed less power, were used in this generation, were more compact, were more reliable, and were faster than first-generation vacuum tubing machines.

Explanation:

The primary memories and the magnet tapes and magnetic discs were used as secondary storage equipment in this generation.

The montage language and high programming languages such as FORTRAN, COBOL, have been used in this generation. The computers used batch processing and operating system multi-programming.

A memory is like the brain of human beings. It is used for storing information and instructions. Computer memory is the storage space on the computer that processes data and saves instructions for processing.

The memory is split into many small parts known as cells. There is a unique address for each location or cell, which varies from 0 to memory minus one.

There are three basic types of memory:

Memory Cache

Main Memory/Primary Memory

The Memory of a Second Kind

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

tres areas donde se aplica la ciencia y tecnologia

Answers

Possible Answers:

- Medicemanto - Medicine, especially applied.

- Ingeniería - Engineering. Modern scientific engineering is making use of technology to help solve problems and understand cause and effects.

- Comunicación - Communication. Public broadcasting to raise awareness of environmental or other scientific concerns.

Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.

Answers

Answer:

True

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

Answers

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

list any six area where computer used

Answers

Answer:

I. Banking and finance.

II. Hospitals.

III. Schools.

IV. Defense and military.

V. Office.

VI. e-commerce.

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.

The six (6) areas in which a computer can be used are;

I. Banking and finance.

II. Hospitals.

III. Schools.

IV. Defense and military.

V. Office.

VI. e-commerce.

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

computer cannot do anything without instructions true or false

Answers

Answer: True

Explanation:A computer (specifically the CPU, or central processing unit, within the computer system) needs instructions in order to do even the simplest things. Without instructions, it can't do anything. Just to boot your computer requires executing many many instructions.

Hope it helps✌✌

You are the Administrator for a large company that has offices around the world. Each office has employees in the Sales department and each location has created their own Sales folder for storing important Sales related files. You would like to implement a Window Role to minimize the duplication of files within the Sales department. Which File System can you install as a Windows Role to help you accomplish this goal?

Answers

Answer:

Transactional File System

Explanation:

To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.

pasar el número 12875 del sistema decimal al sistema octal.

Answers

Answer:

Va Bene

Explanation:

Insiama ma parla da auditore

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

The CPU is responsible for?

Answers

The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

please hurry i need urgent

Answers

Answer:

Algorithm

1. Begin

2. num_bottles = 0

3. While num_bottles != 500

   3.1 Create bottle

   3.2 num_bottles = num_bottles + 1

4. Switch off machine

5. End

The flowchart has been added as an attachment

Explanation:

Begin algorithm

1. Begin

Initialize bottles to 0

2. num_bottles = 0

Repeat loop until 500 bottles is created

3. While num_bottles != 500

Create a new bottle

  3.1 Create bottle

Increment the number of bottles by 1

  3.2 num_bottles = num_bottles + 1

End Loop

Switch off the machine after loop ends

4. Switch off machine

End algorithm

5. End

Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.

Answers

Edward Snowden is a retired CIA employee, and an NSA contractor is regarded by many as a whistle-blowing hero or a treasonous villain. This individual obtained sensitive digital data from the U.S., British, and Australian agencies and leaked them to the press, exposing the breadth of government surveillance efforts.He is a former computer intelligence consultant who released a highly classified central intelligence agency (NSA) in 2013 while serving as a contract for the Central Intelligence Agency.That's why the answer is "Edward Snowden".

Learn more:

Edward Snowden: brainly.com/question/3426041

You manage several Windows systems. Desktop users access an in-house application that is hosted on your intranet web server. When a user clicks a specific option in the application, they receive an error message that the pop-up was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do

Answers

Answer:

Add the URL of the web site to the local intranet zone.

Explanation:

An intranet can be defined as a private computer network established within an organization and is typically used for securely sharing organizational informations, computing resources, operational system, and collaboration tools between employees through an internet protocol (IP). Thus, it's mainly a private network that is only accessible to authorized users or employees within an organization.

An intranet web server is a type of server that manages the request for files that are stored on it and are generally not exposed to the general public.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address. Also, the uniform resource locator (URL) is converted to an internet protocol (IP) address, which then points it to a web server.

In this scenario, when a desktop user clicks a specific option in the in-house application that is hosted on an intranet web server, they receive an error message that the pop-up was blocked.

Hence, it's necessary that the security settings of the web server is configured so that users are able to see the popup without compromising overall security. Thus, you should manually add the uniform resource locator (URL) of that particular website to the local intranet zone.

The local intranet zone is a security feature that is typically used for setting web content permissions on a local area network (LAN). Thus, this policy setting or security feature is used for adding websites that aren't residing on a computer or an intranet web server.

Which of the following are true statements about the Java wrapper classes (Select all that apply.): Select one or more: a. Objects of these type are immutable b. Objects of these types are mutable c. The wrapper classes do not have no-arg constructors d. The wrapper classes do have no-arg constructors

Answers

Answer:

a. Objects of these type are immutable.

Explanation:

Java wrapper classes are used to convert data into objects. The primitive data is not object and it does not belong to any class. Therefore Java wrapper classes help the user to convert primitive data into object. These objects are immutable and they have no arg constructor.

ways you will use to reach all pupils who are living at a

disadvantaged area

Answers

Answer:

?

im confused

Explanation:

DONDE PUEDO VER LA HABITACIÓN EN ROMA?? ONLINE SIN PAGAR (ES UNA PELI)

Answers

Answer:

Sorry, Room in Rome is not available on Indian Netflix, but you can unlock it right now in India and start watching! With a few simple steps you can change your Netflix region to a country like Japan and start watching Japanese Netflix, which includes Room in Rome

Lo sentimos, Room in Rome no está disponible en Netflix indio, ¡pero puedes desbloquearlo ahora mismo en India y empezar a mirar! Con unos simples pasos, puede cambiar su región de Netflix a un país como Japón y comenzar a ver Netflix japonés, que incluye Room in Rome.

If anyone knows how to use Access, how would I create a table like this one? (Add the fields in Table 2-29 Into the table and set field properties.)

Answers

Answer:

Explanation:

To create tables in Access using “Design View,” click the “Create” tab in the Ribbon. Then click the “Table Design” button in the “Tables” group. A new table then appears in the tabbed documents area. Type the name of a field into the “Field Name” column.

What is a protocol in digital technology plwwes help

Answers

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

which country has the most common features of analogue and digital computer​

Answers

Explanation:

i don't think rhis question could be..

Other Questions
If m2 DOC = 44 and m2 COB = 80,find the measure of the indicated arcin circle o.mCB = [?] which equation represent this relation Find the value of x. PLEASE HELP ASAP!A.4B. 16. 5D. 12 which article of the present constitution deals with the federal executive? explain the power and function of the Federal executive in Nepal Which statement describes the law of conservation of energy?All systems will exchange matter and energy with their surroundings.All systems can exchange energy, but not matter, with their surroundings.Energy cannot be created nor destroyed, but it changes from one form to another.Energy is destroyed in most chemical reactions when new products are formed. Review Question 1 What is meant by deadweight loss? Why does a price ceiling usually result in a deadweight loss? Deadweight loss is a _____________________. A price ceiling results in a deadweight loss when the ceiling price is set ________________ the market clearing price. A. net loss in output; above B. net loss of consumer and producer surplus; below C. net loss in output; below D. net loss of consumer and producer surplus; above Click to select your answer and then click Check Answer. All parts showing I will give brainly.How do you determine if a slope is positive or negative? Los hmsteres tienen 22 cromosomas y sus clulas haploides. Cuntos cromosomas hay en su clula diploide heredera? I need help I don't understand this. \sqrt{2x+1} = 2+\sqrt{x-3} two difference between endocrine and exocrine glandplease give me ans What is the need for satellite communication elaborate what do you mean by occupation?? anxiety: a. is never normal. b. is common of many psychological disorders c. is identical to fear d. is a modern development, unlikely to have roots in human history How many moles of iron is equivalent to 4.45 x 10^22 atoms of iron Read the story description and historical context for the short story "Rules of the Game" and answer the question.Story Description:"Rules of the Game" tells the story of a girl who lives in San Francisco's Chinatown. She learns the strategies of chess but struggles to see eye-to-eye with her motherpossibly her wisest opponent and best teacher. In chess and in life, there are rules and choices. What's your next move?Historical Context:As a result of wars, famine, and political oppression, Chinese immigration to the United States dates back to the mid-1800s. Chinese immigrants came to the United States looking for better economic opportunities so they could provide for their families and send money to their relatives back home. San Francisco became a hub of Chinese culture; however, immigrants still faced many challenges like reduced wages, long work hours, and discrimination.What can you infer about the narrator of "Rules of the Game"? She is a bad competitor. She is a clever chess player. She is a poor decision maker. She is too young for competition. what we're two main reasons that the british granted independence to india? 11. Choose the best answer.A spore is a reproductive structure that contains a haploid cell anda food supplya stylea protective coatinga diploid cell Administrative: A client named Sarah sent you an email regarding an error ontheir invoice. You are not sure what went wrong, but you have to respond. Whatwould you say? *Your answer any four source of energy