If you need to take a printout of a report, how can you specify the paper size you re using?.

Answers

Answer 1

When someone needs to take a printout of a report, they can specify the paper size that they are using by choosing these options:

Page Layout (tab) ---> Page Setup (group) ---> Size.What is the page layout in Windows?

The Page Layout tab has all of the options for arranging your document pages exactly how you want them. Set margins, apply themes, manage page orientation and size, insert sections and line breaks, show line numbers, and customize paragraph indent and lines. To change the paper size in a page layout, follow these steps:

Choose the Page Layout or design tab.Select the size from the Page Setup groupClick the symbol that reflects the desired page size. For instance, select Letter (Portrait) 8.5 x 11".If you don't find the size you're looking for, either click "more preset page sizes" or click "create new page size" to make your own.

Learn more about margin in windows here: brainly.com/question/14629384

#SPJ4


Related Questions

you manage the desktop computers at your company. you are in charge of 100 computers, all of which run windows 7. you want to upgrade all computers to windows 10. prior to the upgrade, you need to verify the compatibility of each computer with windows 10. you want to gather the necessary information as quickly as possible.

Answers

A clean install is required if you want to install a 64-bit version of Windows on a machine that currently runs a 32-bit operating system.

whenever another operating system, such as MacOS or Linux, has to be able to read the device. You can create, store, and launch administrative tools, known as consoles, that control the hardware, software, and network components of your Microsoft Windows operating system using the Microsoft Management Console (MMC). All currently supported client operating systems can run MMC. You will need to enter a product key if you are using bootable installation media to complete a clean install on a computer that has never been upgraded to Windows 10 and activated.

Learn more about operating here-

https://brainly.com/question/13375207

#SPJ4

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
a. Change management
b. Acceptable use
c. Resource allocation
d. SLA

Answers

Change management policies outlines the process you should follow before implementing that device.

What is change management policies?Change management is the term used to describe the procedure used to manage the entire lifespan of changes. Change Management Policy: Change Management Policy is the guiding standard that outlines the processes for various sorts of Changes as well as the regulations and degrees of permission necessary to approve them.The extent of the change, locations affected, back-out procedure, testing completed, communication plan, and anticipated date of deployment must all be specified in the documentation. This should be done at a level that guarantees the scope can be completed as defined and that the change will result in the anticipated outcome.

To learn more about Change management policies refer to:

https://brainly.com/question/20373684

#SPJ4

Drag the terms in the left-hand column to the appropriate blanks on the right ► View Available Hints) Reset Help base level 1 Ain is a bend in a step narrow bedrock valley terrace 2. The lowest level to which a stream can code is called Incised meander meander 3. An is the remnant of a former floodplain 4. Examples of local base level include a stream or any Noodplain 5. A sweeping bend of a stream which is migrating laterally in a wide, at valley is called ain) 6.The flat, broad are surrounding a stream a referred to as an Submit 6:58 12/1/2 Prisen Home End PgUp PODE 96 & 7 ( 6 00 0 T Y U o Р H J К. L ViewPotterdasignment Problemid=1355555 9 of 11 A Revi Take a moment to think about to the Colorado River has evolved through time. Focus on how changing base level and stream inclusion created andforms, such as incised meanders and incons, and arrange the events accordingly Rank from oldest to youngest ► View Available Hints Reset Help Atramenty across foodplan voloping menor This amata which nused meanders for The base level of the streams wted by hulplift the begins to ince downward A consome by the cutoff of an incise manner which are the Oldest Event Youngest Event Submit O et E 8:59 PM 12/1/2020 ) Prtsen Home 19 End POUR POD & % 5 6 7 8 ) 0 9 Il I Y I P

Answers

It is needed to find the possible sequence of events.

What should be the correct order?

Here is one possible sequence of events:

The base level of the streams was lowered by uplift, causing the streams to incise and create incised meanders.The streams continued to erode and cut off the meanders, forming abandoned meanders or "incised meanders."The streams began to deposit sediment on the floodplain, creating a terrace.The base level of the streams was raised by the formation of a delta or by sea level rise, causing the streams to deposit sediment and form a floodplain.What does this tells us about?

It's worth noting that this is just one possible sequence of events, and the exact sequence and timing of events may vary depending on the specific location and geologic conditions.

To Know More About Prisen, Check Out

https://brainly.com/question/21116776

#SPJ1

assume that the string oldstring contains at least 4 characters. a programmer is writing a code segment that is intended to remove the first two characters and the last two characters from oldstring and assign the result to newstring.

Answers

A programmer is creating a segment of code with the goal of removing the first two and last two characters from oldString and assigning the outcome to newString.

What is a Java String? A string is an object in Java that symbolizes a collection of characters or char values. A Java string object is created using the java.lang.String class.A String object can be created in one of two ways:using Java's string literal Double quotes are used to produce string literals.

For instance: s="Welcome" string;

Using the keyword "new," a Java String can be produced.

For instance: String s=new String("Welcome"); This creates two objects—one in the heap and one in the string pool—as well as one reference variable, with the variable's' referring to the object in the heap.Let's now examine Java String pool in more detail.Java String Pool: Heap memory is used to store a collection of Strings as the Java String Pool. In this, the first thing the String Pool does after creating a new object is to determine whether or not the object is already in the pool. If it is, the variable receives the same reference back if not, a new object will be created in the String pool, and the appropriate reference will be returned. For better understanding, please see the diagrammatic representation.Two Strings, "Apple" and "Mango," were created using literal in the image above. Now, when the third String is created with the value "Apple," the existing object reference is returned rather than creating a new object. That is the rationale behind the introduction of the Java String pool.Before we continue, it's important to note that Strings in Java are immutable, unlike other data types. Immutable refers to the fact that Strings are constant; once they are created, their values cannot be altered. String objects can be shared because they cannot be changed. As an illustration:The following is the equivalent of the string str="abc":

char data[] = 'a', 'b', 'c';

String str = new String(data);

Let's now examine a few of the built-in methods in the String class.

To Learn more About newString refer To:

https://brainly.com/question/14675668

#SPJ1

mashup developers usually include additional apis on the mashup site that generate revenue by linking to customized

Answers

Mashup developers usually include additional APIs on the mashup site that generate revenue by linking to customized advertisings.

What is mashup?

In web development, a "mashup" is a web page or web application that combines content from various sources to produce a single new service that is presented in a single graphical user interface. This term comes from the computer industry.

A user could, for instance, make a map mashup by fusing the locations, images, and contact information for their local library branches with a G∅∅gle map.

The term suggests simple, quick integration, frequently utilizing open application programming interfaces (open API) and data sources to produce enriched results that were possibly not the intended use for the original raw source data. By combining elements from two or more sources, the term "mashup" first appeared.

Learn more about mashup

https://brainly.com/question/29523786

#SPJ4

Sam wanted to create a variable to store a list of movies that he was excited about seeing. They wrote !movie = "The Dark Depths" but got an error message. What was wrong with the code? A. A variable name needs a capital letter. B. A variable name can’t begin with a special character such as !. C. Instead of an equals sign, the code should use the word is. D. There can’t be spaces in between the words "The Dark Depths". No links pls

Answers

If Sam wanted to create a variable to store a list of movies that he was excited about seeing, then wrote !movie = "The Dark Depths" but got an error message. The problem with the code is: "A variable name can’t begin with a special character such as !." (Option B)

What is a Variable Name in programming?

A variable is a symbolic name (or reference to) data. The name of the variable symbolizes the information it contains. Variables are so named because the information represented by them can change while the actions on the variable stay constant.

A variable name must begin with a letter or an underscore ( ). A variable name must not begin with a number. Variable names are limited to alphanumeric letters and underscores (a-z, A-Z, 0-9, and ). The case of variable names matters (age, Age and AGE are three different variables)

Learn more about Coding:

https://brainly.com/question/14461424
#SPJ1

while working on your linux server, you want to enable anaconda.service and disable vmtoolsd.service using the systemctl command. in this lab, your task is to complete the following: use the systemctl command to enable anaconda.service. use the systemctl command to disable vmtoolsd.service. after each command, check the service status with the systemctl is-enabled command.

Answers

In regards to the case above, At the prompt, type systemctl isolate rescue.target and press Enter to change the runlevel to rescue.target.

2. Enter the password 1worm4b8 and press Enter to log in to the root account after changing the current target.

Why does Linux run on servers?

The fact remains that Linux servers outperform ordinary Windows servers in terms of stability, security, and flexibility, they are currently among the most extensively utilized and are also among the most well-liked. The fact that Linux is completely open-source as opposed to closed-source programs like Windows is another significant advantage.

Therefore, a server that runs the open-source Linux operating system is known as a Linux server. It gives companies a low-cost choice for providing their customers with content, apps, and services. Because Linux is open-source, users also gain access to a large network of advocates and resources.

So, one can say that an open-source distribution of Python and R for data research called Anaconda seeks to make package management and deployment easier.

Learn more about password from

https://brainly.com/question/15569196
#SPJ1

Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)
1) *The data link layer uses LLC to communicate with the upper layers of the protocol suite.
2) *Logical link control is implemented in software.
3) Logical link control is specified in the IEEE 802.3 standard.
4) The LLC sublayer is responsible for the placement and retrieval of frames on and off the media.
5) Logical link control is implemented in software.

Answers

The two statements describe features or functions of the logical link control sublayer in Ethernet standards are:

The data link layer uses LLC to communicate with the upper layers of the protocol suite. (Option A)Logical link control is implemented in the software. (Option C)

What are Ethernet standards?

The logical link method is achieved in software and allows the data link layer to interface with the protocol suite's upper levels. The IEEE 802.2 standard defines logical link control. IEEE 802.3 is a set of standards that defines several Ethernet kinds.

The MAC (Media Access Control) sublayer is in charge of placing and retrieving frames on and off the media. The MAC sublayer additionally adds a header and a trailer to the network layer protocol data unit (PDU).

Learn more about Ethernet standards:
https://brainly.com/question/28239269
#SPJ1

Which of the following is not true about static methods? a. It is not necessary for an instance of the class to be created to execute the method. b. They are created by placing the key word static after the access specifier in the method header c. They are called from an instance of the class. d. They are often used to create utility classes that perform operations on data, but have no need to collect and store data.

Answers

It is not necessary for an instance of the class to be created to execute the method that is not true about static methods. Thus, option A is correct.

What is static methods?

A static method is a procedure that is declared as a constituent of the an object but can only be accessed from constructor of either an API object, not from an instances of both the object generated using the constructor.

A static method serves two primary objectives: For assistance or utility methods that don't necessitate called as data. Static methods remove the requirement for the client to create the item only to call its method because class variables are not required to be accessed.

Static methods do not require the creation of a standards for different in order to be used; this is false. Therefore, option A is the correct option.

Learn more about static methods, here:

https://brainly.com/question/29217325

#SPJ1

Compared with a large-scale integrated multi-purpose computer, a quantum computer is a _____ computer. high-powered multi-purpose slower integrated high-speed parallel high-speed integrated

Answers

high powered multipurpose computer.

What is a computer?

A computer is a piece of electronic equipment used to manipulate data or information. Data can be stored, retrieved, and processed by it. You may already be aware of the fact that you can use a computer to browse the Internet, send emails, type documents, and play games. It can also be used to edit or make presentations, videos, and spreadsheets.

What is multipurpose computer?

These computers have an operating system that allows multiple applications to run simultaneously. Devices like servers, laptops, and smartphones are a few examples.

To know more about computer, check out:

https://brainly.com/question/21474169

#SPJ1

In the four-phase approach to the SDLC, feasibility of implementing the system and identifying resources is completed during the phase of the SDLC Question 12 options: planning analysis design implementation'

Answers

In the four-phase approach to the SDLC, the feasibility of implementing the system and identifying resources is completed during the design phase of the SDLC. The correct option is c.

What is SDLC?

The systems' development life cycle, also known as the application development life cycle in systems engineering, information systems, and software engineering, is a method for planning, creating, testing, and deploying an information system.

A software development process is a method of splitting software development work into smaller, parallel, or sequential steps or sub-processes in order to better design and product management. I

Therefore, the correct option is c, design.

To learn more about SDLC, refer to the link:

https://brainly.com/question/28097466

#SPJ1

a(n) _____ scans the entire source code, looking for errors in the form of the code.

Answers

A compiler is one that scans the entire source code, looking for errors in the form of the code.

What is a compiler and  use of it?

A compiler is a language processor that reads a whole source program written in a high-level language in one go and converts it into an equivalent program written in machine code. Example: Java, C, C++, and C#.

Uses of a compiler: Some advance compilers have multiple languages interfaces like they have python 3 and java script etc along with that the compilers actively show the errors in the program done. So online compliers are also being used without downloading the entire software.

Hence we can conclude that the compiler scans the entire source code, looking for errors in the form of the code.

To know more on compilers follow this link:

https://brainly.com/question/28390894

#SPJ4

The statement: return 37, y, 2 * 3; returns the value ____.
a. 6 b. 2 c. y d. 3

Answers

The statement returns the value of 6

What is meant by a return statement?
A function's execution comes to an end when control is returned to the calling function. The moment the call is made, the calling function resumes execution. A value from the a return statement might be passed to the calling function. To learn more, visit Return type.

Since y = 2 *3  which gives the value of 6 the function returns 6

Since the only value is to multiply the statement and store in the y value,

A return statement returns the value of the y statement

Hence to conclude the value of y is 6

To know more on functions follow this link:

https://brainly.com/question/17043948

#SPJ4

which of the following is not true of active directory? group of answer choices it uses multimaster replication. it is a single monolithic database with all the information about the network. within active directory, windows servers can be either member servers or domain controllers. it uses the same naming convention for domains and objects contained in these domains as dns.

Answers

it is a single monolithic database with all the information about the network  is not true about Active Directory.

What is Active Directory?Microsoft created the directory service known as Active Directory for Windows domain networks. As a collection of processes and services, it is present in the majority of Windows Server operating systems. Active Directory was initially only employed for centralized domain management. Directory objects are categorized by name and properties in Active Directory. A user's name, for instance, can contain the name string as well as details about the person, such passwords and Secure Shell credentials. Domains, trees, and forests make up the three primary parts of the Active Directory organization. A domain is a collection of objects, such as users or devices, that are connected to the same AD database.

To learn more about Active Directory refer to;

https://brainly.com/question/28235161

#SPJ1

FILL IN THE BLANK. When division by zero occurs and the problem is not addressed, the program crashes with an error message that is ____ dependent.

Answers

Answer: The answer would be IDE.

I hope this helps <3

SIEM includes the following log: May 21 07:41:22 pcx02 sshd[703): Accepted password for root from 10.10.1.1 port 55811 ssh2 does that mean? a. pcxO2 connection was established at 07:42 with a root username. b. ApexO2 connection was established on 05/21 with an admin username, c. An SSH connection was established on 05/21 with a root username. d. An SSH connection was established on 05/21 with an admin username.

Answers

If SIEM includes the following log: May 21 07:41:22 pcx02 sshd[703): Accepted password for root from 10.10.1.1 port 55811 SSH2, what this means is that "An SSH connection was established on 05/21 with a root username" (Option C).

What is a root username?

In OS X 10.10 or before, the user called root, or superuser, is a special user account with unfettered read-and-write capabilities to all sections of the file system. However, with OS X 10.11 or later, the root user's write access to some file system locations is limited.

The distinction between a normal user and a root user is that the root user is essentially identical to the administrator user on Windows – the root user has full access to the system and can do anything. Normal Linux users have limited rights, for example, they cannot install software or write to system folders.

Learn more about SSH Connection:
https://brainly.com/question/29023393
#SPJ1

T/F mis is part of the it department in a business. which is a true statement regarding where it fits in porter's value chain model of a business.

Answers

The true statement regarding where it fits in porter's value chain model of a business is option D: IT is a primary activity because it produces revenue for the company.

What is value chain model?

"The value chain" refers to the entire gamut of activities needed to take a good or service from conception through the various stages of production (involving a combination of physical transformation and the input of different producer services), delivery to final consumers, and final disposal after use.

Therefore, one can say that Porter's value chain consists of five main processes: marketing and sales, operations, outward logistics, inbound logistics, and service. Over all of the primary tasks, a vertical column of supporting activities is depicted. These include infrastructure for the company, technology development, human resources, as well as procurement.

Learn more about value chain model from

https://brainly.com/question/1380316
#SPJ1

See full question below

MIS is part of the IT Department in a business. Which is a FRUE statement regarding where IT fits in Porter's Value Chain model of a business. IT is a primary activity because it does not produce revenue for the company. IT is a support activity because it produces revenue for the company. IT is a support activity because it does not produce revenue for the company. IT is a primary activity because it produces revenue for the company.

Previous question

the critical path for the network activities shown below is ________ with duration ________.

Answers

The critical path for the network activities shown below is A-D-E with duration 13.

What is Critical path method ?

The Critical Path method is a software engineering strategy for outlining the ideal sequence for project tasks to be carried out in order to finish the project as quickly as possible.

Activities on the critical path are those that, if not finished on time, will cause the entire project to be delayed. In this instance, action A immediately precedes activities A and D, while activity E serves as the last activity.

To know more about Critical path, check out:

https://brainly.com/question/15091786

#SPJ1

when a digital camera lets you hold the shutter button open as long as you want, it is known as:

Answers

Note that when a digital camera lets you hold the shutter button open as long as you want, it is known as: "bulb setting"

What is the use of bulb setting?

Bulb Mode is an exposure setting that is utilized when a shutter speed of more than 30 seconds is desired. This is typically employed in extremely low-light circumstances, such as photographing the night sky.

Because bulb mode allows you to utilize a slower shutter speed, it aids in the capture of crisp images in low-light situations. It also allows you to experiment with long-exposure photos. Long-exposure photography blends the capture of magnificent fixed objects with trails of moving components.

Learn more about digital cameras:
https://brainly.com/question/14644351
#SPJ1

Anil needs to show the overlap of people who live in a certain neighborhood in his city and who support a specific political candidate. What type of conceptual diagram should he use?


A: timeline


B: Venn diagram


C: process flow diagram


D: system model

Answers

Since Anil needs to show the overlap of people who live in a certain neighborhood in his city that supports a specific political candidate, the type of conceptual diagram which he should use is a: B: Venn diagram.

What is a Venn diagram?

A Venn diagram can be defined as a circular graphical (visual) tool that is typically used for representing, logically comparing and contrasting two (2) or more finite sets of data such as objects, students, events, voters, concepts, people, etc.

In this context, we can reasonably infer and logically deduce that a Venn diagram is a type of conceptual diagram which can be used by Anil in illustrating the overlap of people who are living in a certain neighborhood in his city and supports a specific political candidate in an election.

Read more on Venn diagram here: brainly.com/question/24581814

#SPJ1

Which command can be used to fine-tune the vsync and hsync of a video card for use in X Windows?
a. vidtune b. synctune c. xvidtune d. vhtune

Answers

Answer:

Xvidtune

Explanation:

ez

a chart type useful for illustrating comparisons

Answers

A chart style that works well for comparing similar numbers.

Which chart type is most effective for showing comparisons between different objects when the axis names are lengthy?

Column charts can be used to compare several items or to show how data evolves over time. In column charts, values are typically grouped along the vertical axis and categories along the horizontal axis.

Which graph works best for comparing different types of data?

One of the greatest graphs for comparing two sets of data is a dual axis line chart. The chart's dual y-axis lets you display insights into two different data points. It is simple to see the relationships between two variables of different sizes and measurement scales when using two axes.

To know more about chart type visit:-

https://brainly.com/question/11542857

#SPJ4

fill in the blank. One important consideration is that data are made available in different forms so that users with different ______ abilities can make sense of them.

Answers

One important consideration is that data are made available in different forms so that users with different cognitive abilities can make sense of them.

What are cognitive abilities?

Cognitive abilities are brain-based skills that we require to complete any task, from the most basic to the most complex. They are more concerned with the mechanisms that govern how we learn, remember, problem solve, and pay attention than with actual knowledge.

Answering the phone, for example, requires perception (hearing the ring tone), decision making (answering or not), motor skill (lifting the receiver), language skills (speaking and understanding language), and social skills (interpreting tone of voice and interacting properly with another human being).

To know more about data, visit: https://brainly.com/question/20523497

#SPJ1

In JAVA Please and comments included
Implement Depth First Search (DFS) using a stack. The depth-first search (dfs) algorithm described in Listing 28.8 uses recursion. Design a new algorithm without using recursion. First, describe it using pseudocode and copy that pseudocode into the assignment submittal. Next, implement it by defining a new class named UnweightedGraphWithNonrecursiveDFS that extends UnweightedGraph (shown in Listing 28.4) and overrides the [Depth First Search] dfs method.
NOTE: when you review AbstractGraph.java Listing 28.3 you will notice that there are two dfs methods (page 1031). You need to override the method dfs(int v), (line 164, page 1031) not the other one with the longer list of parameters.

Answers

Using the knowledge in computational language in python it is possible to write a code that design a new algorithm without using recursion.

Writting the code:

# DFS algorithm

def dfs(graph, start, visited=None):

if visited is None:

visited = set()

visited.add(start)

print(start)

for next in graph[start] - visited:

dfs(graph, next, visited)

return visited

graph = {'0': set(['1', '2']),

'1': set(['0', '3', '4']),

'2': set(['0']),

'3': set(['1']),

'4': set(['2', '3'])}

dfs(graph, '0')

What is Microsoft Graph Explorer?

Graph Explorer is a developer tool that lets you learn about Microsoft Graph APIs. Use Graph Explorer to try the APIs on the default sample tenant to explore capabilities, or sign in to your own tenant and use it as a prototyping tool to fulfill your app scenarios

See more about JAVA at brainly.com/question/18502436

#SPJ1

(Python 3.5, short and simple codes please)Two non-negative integers x and y are equal if either:Both are 0, orx-1 and y-1 are equalWrite a function named equals that recursivelydetermines whether two parameters (both containing integer values)are equal and returns True or False.

Answers

The programs that illustrate the non-negative integers x and y is given below:

def equals(x, y):

   if x == 0:

       return y == 0

   elif y == 0:

       return x == 0

   else:

       return equals(x - 1, y - 1)

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute. The software includes computer programs as well as documentation and other intangible components.

The ways to do the program will be:

Define the program's purpose. Consider the program that is currently running on the computer. Create a program model using design tools. Examine the model for logical flaws. Create the source code for the program. Build the source code. Correct any compilation errors that were discovered.

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

susan produces your organization's monthly magazine. while working on an upcoming issue, susan accidentally deleted significant portions of the layout image. she also made extensive changes to the cover artwork, but has now been asked to discard the changes and use the original artwork. susan has asked you to help her recover older versions of her files in the pictures library so she can still meet her publishing deadline. in this lab, your task is to complete the following: using the settings app, access the program needed to restore files from a current backup. from the file history dialog, restore the following files:

Answers

Access the application required to recover files from a recent backup using the Settings app.

What is back up?

Back up is defined as a duplicate of crucial information that is kept in a different place and can be restored if it is lost or corrupted. The backup's purpose is to create a copy of the data that may be retrieved in the case of a main data failure.

Right-click Start, then choose Settings. To update and secure, click. Choose Backup in the left pane. Verify that the switch for Automatically backup my files is turned on. Choose More choices. Choose Restore files from a current backup at the bottom of the Backup choices dialog by scrolling down. Increase the window's size for improved viewing.

Thus, access the application required to recover files from a recent backup using the Settings app.

To learn more about back up, refer to the link below:

https://brainly.com/question/15586883

#SPJ1

which of the following is a milestone for the phase 1: planning phase of developing an e-commerce presence?

Answers

The option that is a milestone for the phase 1: planning phase of developing an e-commerce presence is option B:  web mission statement.

What is the mission and vision of a website?

One or two strong, well-written sentences that discuss the purpose for a company's existence, the value it provides for its clients, the guiding principles that guide its work, and what makes it unique should be included in a company mission statement.

Note that a mission statement is more concerned with how the organization is going to achieve its goals while a vision statement examines what the company aspires to be. Mission statements are current. They typically have a stronger external focus, reflecting your objectives and how you plan to carry them out in order to satisfy your clients.

Therefore, based on the above, the concepts you have for your website and business make up your mission statement. Each business owner has certain standards for potential clients and website visitors.

Learn more about mission statement from

https://brainly.com/question/1843624
#SPJ1

See full question below

Which of the following is a milestone for the Phase 1: Planning phase of developing an e-commerce presence? A) Website plan B) Web mission statement C) Functional website D) Social media plan E) Mobile media plan

a(n) _____ is a recognizable reference point that can be used to monitor progress.

Answers

An identifiable reference point that may be used to track progress is a(n)  event.

What is the event?

An event is an action or occurrence that can be detected by a program and has implications for system hardware or software. Events can be created by the user, such as keystrokes and mouse clicks, or by the system, such as program loading, memory exhaustion, and errors.

Event technology allows participants to communicate to one other before, during, and after the event, making networking simpler than ever. Furthermore, event planners may easily alert guests about any prospective schedule changes using event applications.

Therefore, it is an event.

Learn more about the track progress, refer to:

https://brainly.com/question/15609444

#SPJ1

A paragraph when left aligned is called

Answers

Answer:

hanging paragraph.

Explanation:

its a hanging paragraph. why you ask?

its left aligned so of course its hanging

Which of the following is required to take advantage of the performance benefits offered by the multi-channel memory architecture? (select all that apply)
a. Installing memory modules of matching types
b. Installing memory modules of matching speeds
c. Installing memory modules in any of the free memory slots on the motherboard
d. Installing memory modules of the same capacity
e. Installing modules in appropriate memory slots (slots of matching color) on the motherboard

Answers

Installing memory modules of matching types, Installing memory modules of matching speeds, Installing memory modules of the same capacity and Installing modules in appropriate memory slots (slots of matching color) on the motherboard.

What is a memory module?
Memory-integrated circuits are installed on a printed circuit board known as a memory module or RAM stick in computing. In electronic systems, particularly PCs like personal computers, workstations, and servers, memory modules allow for simple installation and replacement. They are always found within the computer case because memory modules plug directly into the motherboard. The computer must be turned off and the casing opened in order to access the modules before you may reinstall RAM.

To learn more about a memory module, use the link given
https://brainly.com/question/29659922
#SPJ4

Other Questions
All of the following are true about viruses, exceptSelect one:a. viruses are cellular and can reproduce on their own.b. viruses have genetic material, either DNA or RNAc. viruses can evolve.d. viruses cannot metabolize carbohydrates.e. viruses are very small, requiring an electron microscope to see individual particles. T/F when we see signs that a child feels ashamed or guilty about something that he or she has done, we can reasonably conclude that the child: a woman has just given birth to a healthy term newborn. upon assessing the umbilical cord, the nurse would identify what findings as normal? select all that apply. In the next three problems, we will attempt to solve the problem: What is the standard entropy change for the combustion of 1 mole of diamond at room temperature?C (s, diamond) +O2( g)CO2 Which Eastern Roman/ /Byzantine) Emperor attempted to restore the former territories of the united Roman Empire at the beginning of the 6th century? With age, children become better at ignoring ________________ stimuli.A. EnsoryB. RelativeC. InterestingD. Irrelevant Select the correct subordinating conjunction to complete the sentence.___________ he did to study for the final exam must have been helpful; his grade improved from a B to an A. A. Which B. That C. So what D. Whatever I need help please im so confused HURRY PLS!!Kevin took $45 with him to spend on snack for himself and his friends at the movie theater. The price for each bucket of popcorn was $4. The price of each drink was half the price of a bucket of popcorn.A. Sketch the graph that represents the situation and label the intercepts. Use one axis to represent the number of buckets of popcorn and the other axis to represent the number of drinks.Explain your graph.B. Graph the absolute value function.C. (a) Graph a linear function of your choice. On the same graph, graph a linear function transformed 2 units up and 3 units down.(b) What was the equation of your linear function in slope-intercept form?(c) What was the equation of the transformed function in slope-intercept form? this french enlightenment playwright was a supporter of the american revolution. his most famous plays are the barber of seville and its sequel, the marriage of figaro, which initially was banned by king louis xvi of france. your decision on what type of annuity to purchase will have a dramatic impact on the monthly payments you will receive upon retirement. What is the 1796 presidential election issue? According to Batson (1991), when people experience empathy with another in need, _____ motivates helping. a. maximizing rewards and minimizing costs b. passing their genes to the next generation c. making a difference in the world d. helping others independent of self-interest a psychologist who believes depression is linked to decrease in teh availability of the neurotransmitter seratonin would be following which perspective To which of the following half-reactions must 2 electrons appear as products in order to balance the equation?H2 + 2OH- 2H2OH2O + PbO PbO2 + 2H+ product x has an income elasticity of demand coefficient of -2. it also has a cross-price elasticity of demand coefficient of -2 with product y. which of the following is true? a product x and product y are subsitutes. b an increase in the price for product x will cause an increase in total revenue for product x c an increase in the price of product y will decrease the demand for product x. d product y is an inferior good. e the demand for product x is relatively elastic. PLEASE HELP ASAP!!! FULL ANSWER!!! A person standing close to the edge on top of a 40-foot building throws a ball vertically upward. The quadratic function h = 16t^2 + 72t + 40 models the ball's height above the ground, h , in feet, t seconds after it was thrown. a) What is the maximum height of the ball? _____________ feet b) How many seconds does it take until the ball hits the ground? _____________ seconds What happens when money supply changes? A baseball player has 746 plate appearances in his first year, 727 plate appearancesin his second year, and 512 plate appearances in his third year. How many platehas the player had in three years?appearancesO 2,075O 1,975O 1,885O 1,985 Allicin is the compound responsible for the characteristic smell of garlic. An analysis of the compound gives the following percent composition by mass: c: 44. 4 percent; h: 6. 21 percent; s: 39. 5 percent; o: 9. 86 percent. Calculate its empirical formula. What is its molecular formula given that its molar mass is about 162 g?.