Answer:
Microsoft PowerPoint
Explanation:
text images, videos and sound in the presentations are in the ppt file
Answer:
The extention is used for PowerPoint files exclusively.
4 effect by which we can see several keyframes at once is
a. Onion Skin b. Layer Effect o c. Timeline Effect
5. You can control the speed of animation by increasing or decreasing the value in
a. Timeline a b. Fps Box O ㅁ c. Tools Panel
Write T for True and 'F' for False statements.
1. Pencil2D has autosave option for saving your work after every few minutes
2. The source code of Pencil2D is not available for users.
3. You cannot erase unwanted part of object or drawing on the stage 4. Hand tool is used to quickly move different parts of the stage. 5. Bitmap layer is used for raster graphics, which is made up of pixels.
Fill in the blanks.
1. Pencil2D is used to create animation using and graphics
2. The big white rectangle in the middle of your screen is called the
3. The is used to mark current frame displayed on the stage.
4 You can a layer to clearly identify it in the timeline.
5. Frame is the little in the Timeline, in which we create an image
6. You can fill color in your enclosed drawing or shape with tool.
define data and user with example
Answer:
Any data the user creates or owns. The term user data may be used to emphasize that the data were created and owned by the user. For example, when deleting an application, an uninstall program may ask if user data is also to be deleted.
Explanation:
Hope this helps you. Have a nice day^_^
which are the four different methods of formatting text in libreoffice writer
Answer:
The Text Formatting Bar that is displayed when the cursor is in a text object, such as a text frame or a drawing object, contains formatting and alignment commands.
if my answer helps you than mark me as brainliest.
how is internet connection made possible.
Answer:
To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.
A program in the cyberspace and intercept messages containing specific text A. Virus B. Sniffers C. Worm D. Bomb
Answer:
B. Sniffer
Explanation:
The type of program that is being discussed is called a Sniffer. This can either be a software or hardware that allows the user to intercept data flowing from a computer to the internet in real-time before it reaches its destination. The program can be very vague and intercept all the data coming and going to the target computer or it can be very specific and intercept only the data in which it was programmed to target (sniff out). Cyber Criminals use these programs/devices to steal valuable information that they know a user is going to send sooner or later over the internet.
You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network
You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network?
(Select two).
a. Use shared secret authentication
b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE
c. Configure devices to run in ad hoc mode
d. Use open authentication with MAC address filtering
e. INSTALL A RADIUS SERVER AND USE 802.1X authentication.
Which three pieces of information must you include in a project goals document? (Choose 3)
A) Target audience
B) Project deadline
C) Project purpose
D) Color palette
E) Hero image
Answer:
A) Target audience
B) Project deadline
C) Project purpose
Explanation:
The project goals document outlines the scope of the project, detailing what the project entails to everyone that is to work on the project such that the objectives to focused on, the tasks to be completed, the timeline and deadline of the project, the project participants, and audiences are known or understood, thereby placing everyone in the project team on track
The three pieces of information that must be included in a project are therefore; the target audience of the document, the deadline of the project, clearly stated, and the purpose of the project; what the project is going to accomplish
The three pieces of information you must include in a project goals document are:
A) Target audience B) Project deadline C) Project purposeAccording to the given question, we are asked to show the three pieces of information you must include in a project goals document and why they are important when making a project goal.
As a result of this, we can see when making a project goals document, it is important to include the target audience, project deadline and the project purpose because it gives the project a clear objective and deadline which can be achieved.
Read more here:
https://brainly.com/question/17293938
Which information is required when designing a field? check all that apply.
Answer:
Explanation:
dimensions or calculation
Selena owns a bakery. She wants to compare the number of pies, cookies, cakes, and brownies that she sells in one month. Which charts are appropriate for this task? Check all that apply.
Answer:
Column, Bar, And Pie
Explanation:
got it right
Why are programming languages like Java and Python ideal for rapid development?
Because Java, as well as Python, are high-level programs that don't need generating or parsing, they are perfect for quick development. This implies that engineers can code a program without testing it first and then publishing it.
What are programming languages?A method of nomenclature for creating software applications is known as a computer program. The majority of formal programming are text-based, though they can also be graphical.
A substantial rise in the use of Python for machine learning and data analysis supports its status as the programming with the biggest growth. Python is a programming language with dynamic typing, while Java is a structured query and compiler language. Java is faster at play and simpler to debug thanks to this one difference, while Python is simpler to utilize and read.
Learn more about programming languages, Here:
https://brainly.com/question/12696037
#SPJ5
Which category was originally developed to protect both digital and hard-copy sensitive information?
Answer:
Information assurance
Explanation:
Information assurance was originally developed to protect both digital and hard-copy sensitive information.
Guys can anyone tell me answer from this photo Get Branilliest
Answer:
1. A computer itself
2.I don't no
Binary 10110 into oct & hex Binary 10001 into oct & hex with full process
Answer:
yes binary 10001into oct hex with full process.
8. Compare the advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report.
Answer: the advantage of using a smartphone rather than a laptop computer is that you can talk to people across the world, call people, make texts, and get easy access to the internet. but the disadvantages are that a lot of people stay inside their house because of phones, not getting enough exercise.
Explanation:
The advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report. have been compared below.
The advantages of using a smartphone rather than a laptop computer are;
Portability; Smartphones are portable enough that they can fit into pockets and some purses and as such can be taken with you anywhere easily unlike a laptop computer that doesn't have such physical property.Cost; Smartphones are largely cheaper than the average laptop computer. Thus, cost is a good factor.Disadvantages of using a smartphone rather than a laptop computer are;
Screen size; Smartphone screen size are always smaller than that of laptop computers .Software's; Smartphones can't run many of the type of powerful software's that can run on laptop computers.Data entry and user input; Due to the portability of smartphones, their keyboards are usually smaller than that of laptop desktops which makes data entry more difficult for those that have big fingers.Read more about smartphones and laptops at; https://brainly.com/question/21283135
Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
Use the Insert tab and select the appropriate function from the Functions group.
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Right-click the cell to access the context menu to insert the function.
Use the View tab and choose the correct function from the displayed list.
Answer:
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Explanation:
Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;
1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.
2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.
3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).
4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").
5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.
In Microsoft Excel, to insert the IF, COUNTIF, or SUM function into a cell, you should type an equal to (=) sign in the cell, followed by the name of the particular function and the relevant arguments.
For example, to use the SUMIF function, you should type; =SUMIF(A2:B5, "Peter", C1:C9).
write the function of storage unit
Answer:
A storage device is any type of computing hardware that is used for storing, porting or extracting data files and objects. Storage devices can hold and store information both temporarily and permanently. They may be internal or external to a computer, server or computing device.
please mark me as brainliest
Define Data communication
Explanation:
Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses.
Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions
Answer:
The company's account policy
Explanation:
If there's no common naming system, It's best to go with the company's account policy.
2. Give technical terms for
a) A feature which computer never gets tired.
b) A memory to be used on fifth generation of computer.
c) Computer that used continues data
. d) An illegal activity that harms people by using computer.
e) A machine developed by Charles Babbage in 1833AD.
Answer:
Cccccccccccccccccccccccccccccccccc
what are the main charactericts of a computer
Answer:
1.Diligence
2.speed
3.Accuracy
4.Versatility
5. Storage etc
A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet.
Answer:
The answer would be Spoofing
Distinguish between afax and a telephone call (5points)
The head of small organization wants to install a network so that all the employees of different department can share various resources: I. What type of network he/she needs to set up in the organization? II. Name the resource that the employees will be able to share after setting up the network.
Answer:
While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.
An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).
CLIENT-SERVER
The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.
INTRANET
Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.
EXTRANET
Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.
Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).
is computers takes lots of time to do any mathematical calculations.
Answer:
I think the answer is a computer take lost of time to do any mathematical calculations because problem in the book or questions.
Hope this helps you ^^
An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible. Which tool should you use
Answer:
Intrusion Prevention System (IPS)
Explanation:
Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.
A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.
Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer
Thus, the tool you should use is an intrusion prevention system (IPS).
Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to include an additional subnet. Rachel has installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server. When she checks the server icon in the DHCP Management console, she notices the server has a down icon. The DHCP server service has started, but the server does not respond to DHCP lease requests. What should Rachel do to solve the problem
Answer: Ask a member of the Enterprise Admins group to authorize the server.
Explanation:
From the information given, we are informed that Rachel installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server but then realizes that the DHCP server service has started, but that the server does not respond to DHCP lease requests.
In this case, the reason for this can be attributed to the fact that the server hasn't been authorized, therefore, she can ask a member of the Enterprise Admins group to authorize the server.
Write the contribution of Charles Babbage in the history of computer.
Answer:
The main contributions of Charles Babbage are;
1 ) He invented difference engine and analytical engine.
2) He gave basic concept of of mathematics in his analytical engine.
3) He also keep the concept of using binary digits in his machine.
4) He had led to the the foundation of modern computer in his analytical engine including the concept of of input, processing and output
Hope it helps.... :)What stage in the process of media production involves discussing the budget and timelines as well as identifying stakeholders? create/develop upload/display research/define plan/design
Answer:
research/define
It is C
The wiring and connectors that carry the power to a motor must be in good condition. When a connection becomes loose, oxidation of the copper wire occurs. The oxidation ____. A. acts as an electrical resistance and causes the connection to heat more B. has no effect on the electrical connection C. decreases the resistance D. none of the above
Answer: A. acts as an electrical resistance and causes the connection to heat more.
Explanation:
The wiring and connectors that carry the power to a motor must be in good condition. It should be noted that in a case whereby the connection becomes loose, then the oxidation of the copper wire occurs and thee oxidation will act as an electrical resistance and then results in the connection to heat more.
In such case, this has an effect on the electrical connection and increases the resistance. Therefore, the correct option is A.