In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between different ideas is called
A. SmartArt
B. WordArt
C. Clip Art
D. Number Art

Answers

Answer 1

Answer:

A. SmartArt

Explanation:

SmartArt is a graphical tool used to visually communicate information.


Related Questions

explain the following terms

copyleft:

creative Commons:

GNU/GPL:​

Answers

Answer:

Explanation:

copyleft:

Copyleft is the practice of granting the right to freely distribute and modify intellectual property with the requirement that the same rights be preserved in derivative works created from that property.

creative Commons:Creative Commons (CC) is an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public. These licences help the creator to give permission for others to use the work in advance under certain conditions. Every time a work is created, such as when a journal article is written or a photograph taken, that work is automatically protected by copyright. Copyright protection prevents others from using the work in certain ways, such as copying the work or putting the work online. CC licences allow the creator of the work to select how they want others to use the work. When a creator releases their work under a CC licence, members of the public know what they can and can’t do with the work. This means that they only need to seek the creator’s permission when they want to use the work in a way not permitted by the licence. The great thing is that all CC licences allow works to be used for educational purposes. As a result, teachers and students can freely copy, share and sometimes modify and remix a CC work without having to seek the permission of the creator3. GNU/GPL:​

GPL is the acronym for GNU's General Public License, and it's one of the most popular open source licenses. Richard Stallman created the GPL to protect the GNU software from being made proprietary. It is a specific implementation of his “copyleft” concept.

Software under the GPL may be run for all purposes, including commercial purposes and even as a tool for creating proprietary software, such as when using GPL-licensed compilers. Users or companies who distribute GPL-licensed works (e.g. software), may charge a fee for copies or give them free of charge.

A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

Answers

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

Answer please in order

Answers

Answer:

analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.

Explanation:

Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.

Generally, it travels faster through solids than it does through either liquids or gases.

Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.

What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools

Answers

Answer:

A resource that offers dozens of canned reports built around marketing best practices

Explanation:

Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.

The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from

Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices

Envisioning our family members represented in a mobile, with photos of each member suspended by a thread and connected to bars containing images of other members, may help us better understand the idea that:

Answers

Answer:

Families are systems

Explanation:

first of all a system can be defined as a set of interconnected networks. Family is regarded as a system because it is made up of people who are interrelated and share certain behaviors. This question paints a mental image of a family tree. each of the members are linked related and linked. This goes to show that families are systems based on the definition of a system.

write a program to generate following series in qbasics 100,81,64,....1​

Answers

Answer:

[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]

it's square root number you multiple times by 2

Which access control type would you use to grant permissions based on the sensitivity of the information contained in the objects

Answers

Answer:

Mandatory Access Control (MAC) is a means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.

A professional educational institution maintains a dedicated web server and database cluster that hosts an exam results portal for modules undertaken by its students. The resource is idle for most of the learning cycle and becomes excessively busy when exam results are released. How can this architecture be improved to be cost-efficient

Answers

Answer:

Answer to the following question is as follows;

Explanation:

A dedicated website and database cluster are maintained by a professional academic institution to host an academic results website for modules completed by its students. During the majority of the learning cycle, the resources are inactive, but when test results are issued, they become extremely busy.Configure virtualized architecture utilising AWS Lambda functions to make this architecture more cost-effective.

B2B partners often connect to each other on the Internet through special __________ designed to facilitate information exchanges and transactions. search engines web masters web portals web routes gatekeepers

Answers

Answer:

web portals

Explanation:

B2B (business-to-business) is a marketing strategy that deals with meeting the needs of other businesses, by selling products or services to the organizations for resale to other consumers, used in production of goods or for the operation of an organisation.

B2B (business-to-business) model focuses on facilitating sales transactions between businesses.

Under the B2B, the producer sells its products directly to other businesses such as wholesalers or retailers and not the end consumers.

B2B partners often connect to each other on the Internet through special web portals that are designed to facilitate exchange of information and simplified business transactions.

Additionally, a popular application of the seller-side marketplace model, which is a major business-to-business (B2B) e-commerce model, is e-procurement of goods through the use of web portals over the internet and as such eliminating the option of physical buying or procurement.

__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

Answers

Answer:

HIDPSs

Explanation:

The Host based Intrusion Detection and Prevention System abbreviated as HIDPS is a software system designed to monitor and protect the system against danger. The HIDPS system is able to carry out it's protective function as it monitors log files of system and other key system files. This enables it to monitor activities on the local host computer. Therefore, once an intruder performs any action such as creation, modifying or deletion of a file, the HIDPS system notices it in the audit logs which are being monitored and recorded.

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?

Answers

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

which one will be the correct answer​
pls tell

Answers

Answer:

option c clean boot. it is correct.

Option c, clean boots is the correct answer

When the ping command is used, output is similar across operating systems. Which two values are displayed as part of the output

Answers

Answer: round-trip time

message byte size.

Explanation:

Ping refers to the primary IP command that is used in the troubleshooting of connectivity, and reachability. The ping command is also used in testing the computer's IP address.

When the ping command is used, output is similar across operating systems and the two values that are displayed as part of the output include the round-trip time and the message byte size.

You should avoid having other people in portraits with children. True False

Answers

Answer:

You should avoid having other people in portraits with children.

✓ False

Explanation:

A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in this array.

Answers

Explanation:

oi.........................

A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?

Answers

Answer: b is good

Explanation:

Human Resources can be classified into four groups namely________, ________, _______ and _____________.

A. skilled, advanced, professional and services.
B. semi-skilled, simple, services and sustain.
C. professional, advanced, unskilled and simple.
D. professional, unskilled, semi-skilled and skilled.
as i said before they have no topic for fcm but can you help plzz

Answers

Answer:

Option D

Explanation:

Human resources can be classified into four groups namely professional, unskilled, semi-skilled and skilled.

write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit

Answers

Answer:

total = 0

for i = 1 to 7

input temp

temp = temp * 1.8 + 32

total + = temp

average = total/7

print average

Explanation:

[Initialize total to 0]

total = 0

[Iterate from 1 to 7]

for i = 1 to 7

[Get input for temperature]

input temp

[Convert to degree Fahrenheit]

temp = temp * 1.8 + 32

[Calculate total]

total + = temp

[Calculate average]

average = total/7

[Print average]

print average

18. Which of the following provides the SLOWEST Internet access?
O Ti line
Network
Digital Subscriber line (DSL)
Dial-up

Answers

Answer:

Dial up

Explanation:

Dial-up is by far the slowest of all Internet connections available. Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.

An item that contains both data and the procedures that read and manipulate it is called a(n) ________.

Answers

Answer:

Object

Explanation:

An item that contains both data and the procedures that read and manipulate it is called an object.

Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:

Answers

Answer: cannot emit light and has speed limitations

Explanation:

Silicon is usually used in computer chips and solar cells but Gallium arsenide is regarded as a better alternative even though it's costly than silicon.

Gallium arsenide has technical advantages over silicon as its electrons

move through it faster than they move through silicon. Also, cannot emit light and has speed limitations.

Gallium arsenide is used in manufacturing devices like infrared light-emitting diodes, solar cells, optical windows, etc.

Which area of a magazine cover is often important for those shops and stalls that cannot display the entire cover page on a stand?
A.
one-third
B.
left-third
C.
two-third
D.
one-fourth

Answers

I think the answer is one fourth.

Because usually only that part is visible in a stand. It usually contains the name of the magazine and a little bit of illustration gives an idea about what it is about.

Choose all of the items that are important factors to consider for effective web design.

purpose

top-level domain name

content

visually appealing

audience

html

easy to use

Answers

Here's a list of the important factors to consider for effective web design:

PurposeTop-level domain nameContentVisually appealingAudienceHTMLEasy to use

What is Web Design?

Clever web design takes into account a range of factors, such as the objective of the website, the domain name, the quality of the content and the aesthetic elements, the intended audience, the HTML framework, and the ease of use. '

Having a clear comprehension of the goal of the website is crucial in determining the appropriate design strategy; in addition, a fitting domain name can positively impact branding efforts.

Compelling content captivates visitors. The visual aspect is a crucial factor in catching attention and improving the user's experience. Having an understanding of the intended viewers allows for customized creation and material presentation. The fundamental basis for organizing web pages is provided by HTML.

Read more about web design here:

https://brainly.com/question/25941596

#SPJ1

The purpose of a function that does not return a value is Group of answer choices to insert a temporary implementation of a function that can be refined later only used when the function needs to produce output to package a repeated task as a function even though the task does not yield a value to provide a function that can only be included in an assignment statement

Answers

Answer:

to package a repeated task as a function even though the task does not yield a value.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

Some of the notable characteristics of a function includes;

I. The name and arguments of the function must be specified by a function.

II. The implementation of a function is usually designed to be hidden from the caller.

IIII. A function define specific tasks that reusable at many points in a program.

A function that does not return a value after it executes is generally referred to as a void function. Thus, a void function uses the keyword "void" and has no explicit return statement in its body, with respect to a data type.

The purpose of a void function is to control returns back to the caller or package a repeated task as a function but, it doesn't yield a value.

what is computer engineering

Answers

Answer:

Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.

Explanation:

Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.

Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.

In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology

kamusta Bagong user Ako dito ​

Answers

Answer:

kamusta Bagong user Ako dito = hello New user I'm here

They have requested a 1- to 2-page memo that describes the hospital's protections against a ransomware attack.

Answers

What is the memo that they have asked of you

True or False? Using your traffic analytics report, you can see the source of traffic to your website

Answers

Answer:

True

Explanation:

6. By default,how the table headings are placed. (2 Points)
bold and italic
bold and centered
bold and underlined
bold and aligned​

Answers

They are all bold and what ever else

__________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of event relates to a breakdown in controls as identified by the security policies.

Answers

The answer is “a security event”
Other Questions
the quotient of (x^4 - 3x^2 + 4x - 3) and a polynomial is (x^2 + x - 3) what is the polynormial Can you help with number 9,10,12 12 g of powdered magnesium oxide reacts with nitric acid toform magnesium nitrate and water.Calculate the mass of magnesium nitrate formed.[Relative atomic mass of Mg = 24, N = 14,0 = 16] * CASE 2: In 1967 the plaintiffs, Ashmore, Benson, Pease & Co, manufactured tube tanks. The defendants, AV Dawson, a haulage company, agreed to carry the plaintiffs equipment by lorry. With the knowledge of the plaintiffs transport manager, the defendants loaded their vehicle in excess of the weight permitted by the Road Traffic Act 1960, s.64 (2). The vehicle toppled over during the journey, and the plaintiffs sued in negligence for 2,225 in damage caused to the equipment by the defendants driving. At first instance the trial judge found in favour of the plaintiffs and awarded damages. The defendants appealed.a) Analyze in details the type of contract that took place between the two parties? (5 marks)b) Evaluate whether any recovery of damage can take place if a party enters into a lawful contract but the contract is carried out unlawfully. (5 marks) Help me fill in the blanks using the subjunctive?1. Quiero que t _(escuchar) bien a tu profesora.2. Es importante que nosotros _(estudiar) mucho.3. Ella necesita que yo _(conocer) a su madre.4. Temo que ellos no _(or) las noticias.5. Recomendamos que Ana _(ir) al hospital.6. Ojal que t _(ser) responsable.7. Es necesario que nosotros _(escribir) un trabajo.8. Siento que ellas _(tener) dolor de estmago.9. Es bueno que ustedes _(buscar) al perro perdido.10. El profesor quiere que yo _(empezar) ahora. Who does grendel say his father is ABCD is a parallelogram.BD is a diagonal.NotBW65ADWork out the size of angle W Write a letter to the chief of the planning commission dragging her/his attention in proper implemention of the stategies adopted to fulfill the obejectives set by current economic plan of nepal. Arrange the following rational numbers in descending order. 5/8 ,-11/15 , 17/(-24) ,7/12 cho f(t)=(t-4)u(t-2)phep bien doi laplace laF(s)=e^-2s/s^2-2e^-2s/s62 When a certain number is divided by 48,72 or 100 the remainder in each case is 3.... Find the number On a map, two mountains are 5 7/8 inches apart. If 1/2 of an inch on the map represents 80 miles, then how many miles apart Need help plotting this on number line Which strand of mRNA would be made during transcription using the DNA strand shown below? CTG ATAA. GAC UAUB. GAC TATC. GUC TUTD. CTG ATA What is the process of planning, designing, and implementing change requests?_____ is the process of planning, designing, and implementing change requests. What else is produced during the replacement reaction of silver nitrate and potassium sulfate?2AgNO3 + K2SO4 Ag2SO4 + ________KNO32KNO3K22AgNO3 Why does temperature increase when heat is lost? How many chlorine (CI) atoms are in Methylene? ai l ngi tm ra chu M Factorise: 25x^2 - 1/49