In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between different ideas is called
A. SmartArt
B. WordArt
C. Clip Art
D. Number Art

Answers

Answer 1

Answer:

A. SmartArt

Explanation:

SmartArt is a graphical tool used to visually communicate information.


Related Questions

Why does a computer need programs? ​

Answers

To run successfully. That was the answer on my quiz. Sorry if it doesn’t help
The computer is just a platform, the key is what to use it for. This is program

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the process method may throw one of several exceptions. Write some code that invokes the process method provided by the object associated with processor and arrange matters so that your code causes any exception thrown by process to be ignored. Hint: use the catch (Exception ex) and do nothing under the catch clause.

Answers

Answer:

Following are the code to the given question:

try//defining a try block

{

processor.process();//defining an object processor that calls process method

}

catch(Exception e)//defining a catch block

{

}

Explanation:

In this question, the 'Try' and 'catch' block is used in which both the keywords are used to represent exceptions managed during runtime due to information or code errors. This try box was its code block which includes errors. A message queue catches the block errors and examines these.

In the try block, a method "process" is used which is create the object processor that calls the method.

If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.

Answers

Answer:

Normal

Explanation:

If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.

What is presentation?

Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.

Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.

It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.

Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.

To learn more about the presentation, refer to the below link:

https://brainly.com/question/17087249

#SPJ2

Answer please in order

Answers

Answer:

analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.

Explanation:

Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.

Generally, it travels faster through solids than it does through either liquids or gases.

Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.

Which is the most viewed vdo in YT ever?​

Answers

“Baby Shark Dance” by Pinkfong Kids' Songs & Stories (8.44bn views)
“Despacito” by Luis Fonsi, featuring Daddy Yankee (7.32bn views) ...
“Shape of You” by Ed Sheeran (5.29bn views) ...
“Johny Johny Yes Papa” by LooLoo Kids (5.24bn views) ...

write a program to generate following series in qbasics 100,81,64,....1​

Answers

Answer:

[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]

it's square root number you multiple times by 2

Cuando se introduce una fórmula en una celda primero que hay que introducir es

Answers

Answer:

El signo =.

Explanation:

La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.

Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.

Question 1:
The Wayfinder is an ancient piece of technology created as a means of navigating challenging stretches of space. The device connects to every piece of technology in the galaxy in order to detect planets and spaceships and then shown their location to the user. As it happens, locations of planets follow a specific distribution. A planet can exist at coordinates x,y only if
2x² + |2xy| + y² =10000
The user can use the Wayfinder to find nearby planets by input the range for x and y. Draw a flowchart and write a C++ program that models the Wayfinder. Ask the user to input a range for x and y, then print all possible planet coordinates. The program should also print the number of planets detected.
Hint: you can use pow(x,n) to get the value of xn and abs(x) to get the absolute value of x.

helpppppppppp!!!!!!!!!!

Sample output:

Answers

Answer:

Following are the code to the given question:

#include<iostream>//header file

#include<math.h>//header file

using namespace std;

int main()//main method

{

   long long x, x1, y, y1;//defining long variable

   int count=0,i,j;//defining integer variable

   cout<<"Enter a range for x coordinates: "<<endl;//print message        

   cin>>x>>x1;//input x and x1 value                          

   cout<<"Enter a range for y coordinates: "<<endl;//print message

   cin>>y>>y1; //input y and y1 value  

   for(i = x; i <= -x1; i++)//use nested loop that tests each coordinates                                        

   {

       for(j = y; j <= y1; j++)//use nested loop that tests each coordinates

       {

           if(((2*pow(i,2)) + abs(2*i*j) + pow(j,2)) == 10000)//use if that checks condition as per the given question

           {

               cout<<"There is a planet at "<<i<<", "<<j<<endl;//  print coordinates

               count++;//incrementing count variable value                                                    

           }

       }

   }

   cout<<"Total number of planets detected are: "<<count<<endl;//print count value

   return 0;

}

Explanation:

In this code, inside the main method long "x, x1, y, and y1" and integer "count, i, and j" type variable is declared that uses a long variable to input value from the user-end.

In the next step, two nested loops have defined that test each coordinate and define if block that checks condition as per the given question and use i, j, and count variable to print value with the message.

People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.

Answers

Message Trace

Essentially it's a method used by administrators to monitor and trace emails

You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?

Answers

Answer:

Vulnerability scanner

You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.

What is a vulnerability scanner?

Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.

A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.

If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.

To learn more about vulnerability scanners click here:

https://brainly.com/question/10097616

#SPJ12

An item that contains both data and the procedures that read and manipulate it is called a(n) ________.

Answers

Answer:

Object

Explanation:

An item that contains both data and the procedures that read and manipulate it is called an object.

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

yeah sure no problem that says

The part (or statement) of a recursive function that decides whether the recursive loop is terminated is called: (Select all that apply)

Answers

Answer:

The base case

Explanation:

Required

The part that determines the termination of a recursion

This part of a recursion is referred to as the base case.

Take for instance, the following:

factorial(int n) {

   if (n < = 1) {         return 1; }

   else {             return n*factorial(n-1);    }  }

The base case of the above is     if (n < = 1) {         return 1; }

Because the recursion will continue to be executed until the condition is true i.e. n less than or equals 1

Communication media that use an antenna for transmitting data through air or water are called _____.

Answers

Answer:

Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.

Explanation:

douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html

copy and paste that it might help!

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen

Answers

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.

Answers

Answer:

tictactoe[1][1]

Explanation:

To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::

Given a 2 - dimensional 3×3 array of integers :

Creating a dummy array assigned to the variable tictactoe :

[1 2 3]

[4 5 6]

[7 8 9]

We have a 3×3 array, that is 3 rows and 3 columns.

The middle element in the middle row is located in the second row ;second colum

Row and column Indexes starts from 0

Middle element in the middle row is the value 5 and it corresponds to :

tictactoe[1][1]

We call the variable name and the we use one square box each to house the row and column position.

which is known as accurate processing of computer gigo E mail MHz bug​

Answers

GIGO is the considered as the accurate processing in computers.

In the field of computer science, the word GIGO stands for " garbage in, garbage out".

It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.

It is the inability of the program to any bad data providing incorrect results.

Thus GIGO is the most accurate processing in a computer programs.

Learn more :

https://brainly.in/question/23091232

You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?

Answers

Answer:

Explanation:

In this scenario, the best option is to first create a DMZ. This stands for Demiliatirized Zone and basically allows anything connected to it to access networks that have not been completely verified (which in this case would be the internet). Once the DMZ is created you are going to want to add the web server to the DMZ. This will allow the web server to access the internet and be publicly available to its users. At the same time you are going to want to add the company network behind the DMZ so that it is not allowed to publicly access the internet without the data going through the firewall first. Therefore, protecting the company network users.

when files on storage are scattered throughout different disks or different parts of a disk, what is it called

Answers

Answer:

File Fragmentation or Fragmented Files

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

Answers

Answer:

"Private" is the right solution.

Explanation:

Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files

Answers

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

The Curtis Publishing Company's early marketing research efforts mainly had to do with _____. people who drove automobiles people who bought books people who read books people who bought automobiles

Answers

Answer:

people who bought automobiles

Explanation:

Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.

Cyrus H. K. Curtis was a publisher that founded and established the Curtis Publishing Company as a news magazine in 1891.

The Curtis Publishing Company's early marketing research efforts mainly had to do with people who bought automobiles in the United States of America.

Write a basic notation for

[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]





Answers

Answer:

[tex]a = (b + c)/(2 * c)[/tex]

[tex]z = x/(y + c)[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Explanation:

Required

The expression in basic

To do this, we use () to group items, / as divide and * to combine factors

So, we have:

[tex](a)\ a = \frac{(b + d)}{2c}[/tex]

In basic, it is:

[tex]a = (b + c)/(2 * c)[/tex]

[tex](b)\ z = \frac{x}{y + c}[/tex]

In basic, it is:

[tex]z = x/(y + c)[/tex]

[tex](c)\ c = \frac{9c + 32}{5}[/tex]

[tex]c = (9 * c + 32)/5[/tex]

can I play the game the last of us with this spec:​

Answers

No . Take my advice
no the cpu is not powerful enough to support a game

write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit

Answers

Answer:

total = 0

for i = 1 to 7

input temp

temp = temp * 1.8 + 32

total + = temp

average = total/7

print average

Explanation:

[Initialize total to 0]

total = 0

[Iterate from 1 to 7]

for i = 1 to 7

[Get input for temperature]

input temp

[Convert to degree Fahrenheit]

temp = temp * 1.8 + 32

[Calculate total]

total + = temp

[Calculate average]

average = total/7

[Print average]

print average

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

What is the usage of "yield" in python?

Answers

Answer:

Yield is a keyword in Python that is used to return from a function without destroying the states of its local variable and when the function is called, the execution starts from the last yield statement. Any function that contains a yield keyword is termed a generator. Hence, yield is what makes a generator.

Explanation:

Other Questions
Using the digits 0, 1, 2, ...8, 9, determine how many 4-digit numbers can be constructed according to the following criteria.The number must be odd and greater than 6,000; digits may be repeated.The number of 4-digit numbers that can be constructed is Place the steps for providing first aid for bleeding in the correct order.Raise the wounded area abovePlace a sterile bandage.Clean the woundApply pressurethe heart You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this What is the value of (3/10)^3? 3/100027/10009/1027/10 Write a story that includes the words, ... nothing could have prepared him for what he saw .... Why dont plant cells have microvilli? A corporation or other business entity must be in good standing (to have capacity to enter into a contract. what national identities have made our country known to known to the world? Make a list of any 4 and explain any two of them. Using the net below, find the surface areaof the pyramid.sto5 in5 in.Surface Area=[?] in?Enter What is the solution to the equation below?2x/x-1=2 A. 4 B. 2 C. 5 D.3 when a company following a differentiation strategy ensures that the higher price it charges for its higher quality is not priced too far about the price of competition, the company is using the process of que elementos hacen que el texto de las tres tazas de vergara no sea romantico Cyclical unemployment arises when:______. a. the agriculture sector completes the cycle of planting, cultivating, and harvesting the nation's food supply. b. labor unions strike for higher wages. c. the business cycle enters an expansionary phase. d. business activity in the macroeconomy declines. What do you think a child most understand to study cultural diversity? Present simple You usually up at Go'clock, mum You should avoid having other people in portraits with children. True False Determine which of the following statements is true about energy in ecosystems A. Consumers pass on 20% of the energy they get from a lower trophic level. OB. Primary consumers lose 60% of the energy they absorb from producers as urine and feces. C. 10% of the energy Primary consumers absorb is lost as heat. Ons Primary producers lose 20% of the energy they absorb as urine and feces. Which graph represents this system?y=3x+y= 4 On March 7, a buyer and a seller execute a contract for the purchase of the seller's property. Closing is set for June 10. On April 15, the property is struck by lightning and destroyed by the resulting fire. If the Uniform Vendor and Purchaser Risk Act has been adopted by the state in which the property is located, which party bears liability for the loss? a phrase is shown. seven times the sum of a number ,n, and four . which expression represents the phrase ?