Answer:
Shape Styles
Hope this helps :)
Mark me brainiest
Explanation:
Which design perspective best describes memory and storage requirements?
Data modeling
IT infrastructure
Prototype
The system model
The advancements in which of the following technologies has most changed the American job market in recent years?
A.
computer and Internet
B.
manufacturing
C.
transportation
D.
health care
Which task would you use CSS when making a webpage?
O Creating a paragraph
O Creating an unordered list
O Creating an ordered list
O Changing the font size
Changing the font size.
HTML you use to 'mark up' plain text. It tells the text what its purpose should be : an unordered / ordered list, a paragraph etc.
CSS is for formatting that marked up content. With CSS, you can control the colour, font, the size of text, the spacing between elements, how elements are positioned and laid out, what background colours are to be used, different displays for different devices and screen sizes and more.
Think of HTML as the abstract text and images behind a web page and CSS as the page that actually gets displayed.
How many passes will it take to find the five in this list?
1, 5, 10, 15, 20, 22, 30
3
1
4
2
Answer:
1 im prety sure
Explanation:
Answer:
2
Explanation:
is the correct answer
good luck
Logical are functions used when looking for an entry or value in the spreadsheet. what is it?
The Logical function would allow you to use the spreadsheets to identify whether a scenario is True/False. It can choose among two options depending on the outcomes of that test, and the further discussion can be defined as follows:
These selections could be used to show information, do complex calculations, or run additional tests.It offers decision-making tools for spreadsheet information. It allows to let you examine the contents of a cell or do a computation, and afterward compare the output to a specified number or value.Learn more:
brainly.com/question/8953037
This road sign means
O road work ahead
vehicle breakdown
O service stations
O construction zone has ended
Answer:
A
Explanation:
Uh, yeah, I sure hope it does (to everyone who watched vine)
For which discipline is it most important to study computer technical support and networking?
Answer:
Studying computer technical support would contribute most to the disciplines of computer engineering and information technology.
have an amazing day! =)))
Which type of storage disk and disk drive can you use in the given situation?
Amy wants to borrow an interesting movie from Bruce so that she can watch it in her leisure time. Amy can hand over a (BLANK) to Bruce to copy 900 MB file. Bruce needs to have a (BLANK) drive to record data on the used DVD.
BLANK 1
CD
hard disk
DVD
BLANK 2
DVD-RR
DVD-recordable
DVD-RW
I : DVD
II:DVD-R
A DVD-RW would work too.
The types of storage disk drives that can use in the given situation are as follows:
Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD. What do you mean by Storage disk?Storage disk may be defined as a type of hardware device that can be used to store and save digital data and applications which may be in the form of images, video, audio, etc. For example, CDs, DVDs, hard disks, pen drives, etc.
Hard disks generally store a large quantity of data like 120GB to 30.72 TB. But here the data required to be stored is only 900 Mb, so DVD is the most accurate choice for this storage. It stores 500Mb of data to 8.5 Gb. A single-layer HD-DVD stores up to 15GB of storage capacity.
Therefore, Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD.
To learn more about Storage Disk, refer to the link:
https://brainly.com/question/14762201
#SPJ2
List any ten keyboard symbols.
Answer:
Esc- Esc (escape) key.
F1 - F12 What are the F1 through F12 keys?
F13 - F24 Information about the F13 through F24 keyboard keys.
Tab Tab key.
Caps lock- Caps lock key.
Shift- Shift key.
Ctrl - Control key.
Fn- Function key.
Alt- Alternate key (PC only; Mac users have an Option key).
Spacebar- Spacebar key.
Hope this helps, have a great day/night, and stay safe!
ten(10) examples of wearables or wearable technologies?
Answer:read
Explanation:
airpods
headphones
earbuds
AirPods pro
watch
fitbit (type of watch that counts your miles) &you can say workout watch&
VR set
technology bracelet
smart glasses
Smart ring
Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
company name in the center of the page. Being unsatisfied with the effect, she has decided to move the text box containing the name
to the top of the page. In 3-5 sentences, describe the procedure Makayla will use to move the banner.
The procedure depends on the software and methods she uses.
In photoshop or InDesign she might need to fdrag and drop the title to the new location.
In Word/Publisher she has to cut and paste the title to the new location or to drag the box to the top.
Which statement best describes the pros and cons of lack of regulation for cloud-based technology? Lack of regulation enables people to collaborate without the extra cost of paying a service provider; however, there is an increased opportunity for cybercrime. Lack of regulation speeds up the process of invention, but requires individuals to back up their own data. Lack of regulation encourages open innovation, but is not always secure. Lack of regulation encourages greater collaboration, but can lead to increased cost from price increases.
Answer:
3.) Lack of regulation encourages open innovation, but is not always secure.
Explanation:
Got it right in Introduction to Careers in Arts, A/V Technology and Communications
WILL GIVE BRAINLIEST!!!!!!
New space suits are being designed for future trips to the moon.
True
False
Answer:
True
Explanation:
Today, NASA unveiled its designs for future spacesuits that astronauts will wear during trips to the lunar surface.
Tell me everything that happened in the fortnight galactics event. WHO EVER HAS THE BEST EXPLANATION WILL GET BONUS POINTS AND WILL BE MARK BRAINLYNESS
Answer:
people still play fortnight?!?!
Explanation:
psn: Smallboy_life
One advantage of putting information into a database is that you can filter the data.
O True
O False
Answer:
True.
Explanation:
One of the purposes of databases is to allow data lookup through queries, which is basically filtering data, using efficient algorithms too.
Answer:
True
Explanation:
What do microphone means
Answer:
A tiny phone
Explanation:
It means a tiny phone
1 Which of the following could work as bits for a binary system?
А The flip sides of a coin
B The fingers on one hand
C The days of the week
D The colors of the rainbow
PLEASEEEEEEEEEEE HELPPPPPPPPPP MEEEEEEEEEEE
This software application can be used to organize, analyze, and illustrate data. Which one is it?
a.Excel
b.Outlook
c.PowerPoint
d.Word
Eric would like to have a callout text box that makes it look as if the character in an image is speaking. Which object should he insert into the Word document?
standard text box
WordArt
callout
shape
picture
Answer:
C: Callout shape
Explanation:
The object that should he insert into the Word document is the callout function. The correct option is b.
What is Microsoft Word?A component of Microsoft Office is Microsoft Word. The office is a collection of Microsoft products that can be used on Windows or macOS and contains Word, PowerPoint, Excel, Outlook, and numerous other tools for both private and professional usage. They aren't the same thing; Microsoft Word is merely one of such app.
A callout function is one of the functions that specifies a callout and is implemented by a callout driver.
The following collection of callout functions makes up a callout: a notification processing notifying function. A function called classifying handles classifications.
Therefore, the correct option is b. callout.
To learn more about Microsoft Word, refer to the below link:
https://brainly.com/question/2579888
#SPJ5
Images, symbols, and diagrams are types of
art objects
Graphs
graphics
presentation objects
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is :
Graphics
Because Graphics are the visual representation of information without text. Images, symbols, and diagrams are types of graphics. These graphics can be used in presentations to present information visually.
While other options are not correct because:
Art objects are some images or painting that is the artistic creation of aesthetic value. While graphs are the visual presentation of data and there are different presentation objects in PowerPoint such as images, symbols, text, and diagrams, etc. But it is noted that images, symbols, and diagram are not types of presentation objects but it is a type of graphics elements/objects.
What does the following loop do?
val = 0
total = 0
while (val < 10):
val = val + 1
total = total + val
print(total)
Prints the numbers backwards from 10 to 1.
Prints the sum of the numbers from 1 to 10.
Finds the average of the numbers between 1 and 10.
Prints the numbers from 1 to 10.
Answer:
Prints the sum of the numbers from 1 to 10.
Explanation:
YOU NEED BETTER INDENTATION
Total is the sum.
Each loop it's added
:)
You want to use the dist() method. Which line will allow you to enter the following code in IDLE?
>>>dist([2.5).(5.9))
5.0
from dist import math
from math import dist
from random import dist
from dist import random
Answer:
from math import dist
Explanation:
The dist() method is a part of the math module. So, to include it you have to use the following line of code:
from math import dist
hope this helped :D
The line which will allows you to enter the following code in IDLE is from math import dist.
What is dist() method?The dist() function can be used to calculate a distance matrix, which shows the distances between the rows of a matrix.
The dist() method is a part of the mathematics module. Then, for
>>>dist([2.5).(5.9))
5.0 ,
we have to use code in IDLE as;
from math import dist
Thus, the line which will allows you to enter the following code in IDLE is from math import dist.
Learn more about dist() method.
https://brainly.com/question/25373810
#SPJ2
Describe the scope of the variables in this code.
class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName
def __str__(self):
return self.species + " named " + self.petName
def changeName(self, newName):
self.petName = newName
class petCarrier:
size = 'medium'
color = 'red'
The scope of petName ______.
The scope of color is ______.
Accessible to the entire program
limited to the petCarrier class
limited to the pet class
(both of the blanks need one of those answers)
The scope of petName is local to the class pet.
The scope of color is accessible by all parts of the program.
How to interpret programming variables?The variable petName is local to the class; This isdue to the fact that the variable was created in a function whose name begins with two underscores.
The variable color; This is created in the petCarrier class and is accessible to the entire function. This was not created in a function whose name begins with an underscore.
Read more about programming variables at; https://brainly.com/question/9238988
#SPJ2
Answer:
The scope of petName limited to the pet class
The scope of color is accessible to the entire program
Explanation:
edge
In full verbatim, a person wants to say that they admitted him to a hospital last month. He makes a mistake about the date and quickly corrects himself. How should a correct sentence look like?
Compare and contrast the advantages and disadvantages of the Windows, Apple and Linux operating systems.
what is a feature only used in powerpoint
I think powerpoint is the only presentation maker in which you can use 3D objects
Answer:
Slide transitions
Explanation: cause i got right
i'm sure 100%
Tenim tres resistors en sèrie, calcula la tensió que hi haurà a cadascuna d'elles sabent que una d'elles és de 680 Ω i les altres són de 220 Ω. El generador té una tensió de 12V.
Resposta:
Per a càrrega de 680Ω: 7,27 volts
Per a les dues càrregues de 220Ω: 2,36 volts cadascuna
Explicació:
Segons la llei d’ohms
E = IRt
E és la força electromotriu = 12V
I és el corrent total que circula al circuit
Rt és la resistència equivalent total
Com que els 680Ω, 220Ω i 220Ω estan en sèrie;
Rt = 680 + 220 + 220
Rt = 1120Ω
Obteniu el corrent total del circuit:
Recordem que: E = IRt
I = E / Rt
I = 12/1120
I = 0,0107A
Tingueu en compte que el mateix corrent flueix a través de resistències connectades en sèrie, però tensions diferents.
Obteniu les tensions individuals;
Per a càrrega de 680Ω;
V = IR
V = 0,0107 * 680
V = 7,27 Volts
Per a la càrrega de 220Ω
V = IR
V = 220 (0,0107)
V = 2,36 volts
Per tant, les tensions de les dues càrregues de 220Ω seran de 2,36 volts cadascuna
Question 8 of 10
What can be defined as an information technology environment?
A. The tools and processes that surround us to gather and interpret
data
O B. The rules and regulations that government and businesses must
follow to be secure from hackers
C. The energy used to create and maintain technology
D. The buildings and materials that house computer services
SUBMIT
Answer:
C. The energy used to create and maintain technology
#Carry on learning po
A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more than thirty used car dealers who all share a huge car lot. Name two features that that would be useful to potential customers.
Answer:
the gps and a map
Explanation:
Answer:
I think. it could be GPS and maps to but I may be wrong so yeah
Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk. Even though the risk was migrated, Robert observes some remaining risk linked with access control. What type of risk has been observed by Robert
Answer:
Disruption of computer service
Explanation:
Access control is a method or technique used by network administrators to organize and limit access to resources in a network. In a computer network, there several threats and risk experienced by users and technician, that threatens the confidentially of information and other resources.
The configured badge reader system needs data and draws bandwidth. When this bandwidth is in use, it reduces the network efficiency and computer services causing low productivity in the organization.