1. A teacher asked a student to capture and print out a one-slide presentation using MSWord,       showing everything on the screen.
i)       What keys or combination of keys can be used to carry out this operation ?
ii)     Describe the procedures to be followed by the student in carrying out this operation?
iii)  Describe the procedure to be followed by the student in carrying out this assignment using the keyboard.
b) A system Analyst was hired to set up a computer laboratory for Gan di Gan International      School,
    i.) Mention three hardware devices the analyst would need to set up the laboratory
   ii) List two database applications likely to be recommended by the analyst
  iii) State five Word Processing packages likely to be installed

Answers

Answer 1

The keyboard combinations that can be used to capture and print out a one-slide presentation using MSWord, showing everything on the screen is Function key + PrtScr

What is a Key Combination?

This refers to the procedure that is used to combine two or more keys on the keyboard to execute a task.

Hence, we can see that the procedure that can be used to carry out the operation is:

Enter the screen you want to capture and printPress the Function key, followed by the PrtScr. Please note this can vary slightly, depending on the keyboard.

The hardware devices that would be needed to be set up by the system analyst at a computer laboratory are:

System UnitLaptops/MonitorPower adaptersEthernet cables, etc

The database applications that can be recommended by the system analyst are:

MySQL, SQL Server

The five word processing packages that are likely to be installed are:

G00..gle DocsMsWordMSOfficeDropbox PaperCorel WordPerfect

Read more about word processing here:

https://brainly.com/question/985406

#SPJ1


Related Questions

When evaluating a website's content, whether or not the information is up to date is considered part of the ________ element.

Answers

The currency element constitutes information whether the information of the website is current or up to date.

Website

A website is a term used to describe unique publicly accessible web pages that are identified by a domain name. Information on websites is typically updated by website owners, hence, some websites may not be updated frequently when compared to others. Thus, the currency element is an element users take into consideration when evaluating a website's content, whether or not the information is up to date.

You can learn more about the currency element here https://brainly.in/question/48673521

#SPJ1

The constructor for Object supports methods that are used to retrieve and define properties for any object. True False

Answers

The constructor for Object supports methods that are used to retrieve and define properties for any object is a True statement.

What is the constructor of an object?

The Object constructor is known to be one that forms an object wrapper for any kind of given value.

When the value is null or undefined , it will form and return an empty object and as such, The constructor for Object supports methods that are used to retrieve and define properties for any object is a True statement.

Learn more about Object supports  from

https://brainly.in/question/34445581

#SPJ1

PLS ANSWER, WILL GIVE BRAINLIEST
PHOTOGRAPHY: In 200 words or more explain the difference between deep and shallow depth field and when would you use either technique when taking a photograph?

Answers

Answer:

The difference between a shallow and a deep depth of field is how much of your photo is in focus.

Explanation:

With a shallow depth of field, only a small portion of it will be sharp. This will help your viewer focus on the most important part of the image.

In a relocatable dynamic partition scheme, the ____ contains a value that must be added to each address referenced in a program so that the system will be able to access the correct memory addresses after relocation. a. compaction register b. bounds register c. load register d. relocation register

Answers

In a relocatable dynamic partition scheme, the  bounds register contains a value that must be added to each address referenced in a program.

What is bounds registers?

This is known to be two registers that has its contents that are known are used to tell an area of memory where one can have access control.

Therefore, In a relocatable dynamic partition scheme, the  bounds register contains a value that must be added to each address referenced in a program.

Learn more about bounds register from

https://brainly.com/question/15041633

#SPJ1

What was one effect of better printing methods during the Ming Dynasty? Updated trade routes A new merchant class Increased literacy rates More codes and laws

Answers

The one effect of better printing methods during the Ming Dynasty For millennia its mastery made China the only withinside the international capable of produce copies of texts in splendid numbers and so construct the biggest repository of books.

What have been 3 consequences of the printing revolution?

Printed books have become extra conveniently to be had due to the fact they have been less difficult to supply and inexpensive to make. More humans have been capable of learn how to study due to the fact they may get books to study.

As in Europe centuries later, the advent of printing in China dramatically diminished the fee of books, for that reason assisting the unfold of literacy. Inexpensive books additionally gave a lift to the improvement of drama and different kinds of famous tradition. Freed from time-ingesting hand copying, the unfold of tradition and know-how accelerated, ushering international civilization onto a brand new stage.

Read more about the Ming Dynasty:

https://brainly.com/question/8111024

#SPJ1

Answer:

c

Explanation:

Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration test. What technique has she used

Answers

Selah infects the ads on a website with a technique called the Watering hole attacks.

What is Watering hole attacks?

The  Watering hole attacks is known to be a form of attack that depends on compromising or infecting a website that has or that targeted users who are known to often frequently visit.

So, Selah infects the ads on a website with a technique called the Watering hole attacks.

Learn more about malware from

https://brainly.com/question/399317

#SPJ1

Which type of attack involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing the install operating system

Answers

The type of attack that involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing is known as Physical attack.

What is physical attack in computer security?

In a physical attack, this is known to be where an attacker is said to have physical access to any kind of physical asset in the area of the infrastructure system so that they can damage it, disable it, or others.

Note that based on the above, The type of attack that involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing is known as Physical attack.

Learn more about Physical attack from

https://brainly.com/question/11609218

#SPJ1

10101 base 2 - 110+2​

Answers

Answer:

-87

Explanation:

(10101 base 2) = 21

21 - 110 +2 = -87

Select the correct answer.
What does firewall software do?
A.
It improves network connectivity.
B.
It monitors network traffic to block malicious content.
C.
It adds some new features to the operating system.
D.
It installs viruses in the system.

Answers

Answer:

B

because it is an antivirus

Ready to attempt the final challenge? Supply the 3 passwords you received via the first 3 challenges to proceed! Password from challenge #1 (all lowercase): Password from challenge #2 (all lowercase): Password from challenge #3 (all lowercase):

Answers

Using the knowledge in computational language in python it is possible to write a code that through a list manages to organize the largest and smallest numbers in order.

Writting the code in python:

# finding largest in the list

list_max = challenge3[0]

for i in range(len(challenge3)) :

   if challenge3[i] > list_max :

       list_max = challenge3[i]        

print("largest in the list = ", list_max)

# number of times largest occurs in list

max_count = 0

for i in range(len(challenge3)) :

   if challenge3[i] == list_max :

       max_count += 1        

print("number of times largest occurs in list = ", max_count)

# finding second largest in the list

list_sec_max = challenge3[0]

for i in range(len(challenge3)) :

   if challenge3[i] > list_sec_max and challenge3[i] < list_max :

       list_sec_max = challenge3[i]        

print("second largest in the list = ", list_sec_max)

# number of times second largest occurs in list

sec_max_count = 0

for i in range(len(challenge3)) :

   if challenge3[i] == list_sec_max :

       sec_max_count += 1        

print("number of times second largest occurs in list = ", sec_max_count)

# location of first occurence of largest in the list

first_index = -1

for i in range(len(challenge3)) :

   if challenge3[i] == list_max :

       first_index = i

       break        

print("location of first occurence of largest in the list = ", first_index)

# location of first occurence of largest in the list

last_index = -1

for i in range(len(challenge3) - 1, -1, -1) :

   if challenge3[i] == list_sec_max :

       last_index = i

       break        

print("location of first occurence of largest in the list = ", last_index)

See more about python at brainly.com/question/13437928

#SPJ1

An instance of ________ describes programming errors, such as bad casting, accessing an out-of-bounds array, and numeric errors. RuntimeException Exception Error Throwable NumberFormatException

Answers

An instance of Runtime Exception describes programming errors, such as bad casting, accessing an out-of-bounds array, and numeric errors.  

What is a runtime exception?

The Runtime Exception is known to be the parent class that is often seen  in all exceptions of the Java programming language that are known to crash or break down the program or application when they happen.

Therefore, An instance of Runtime Exception describes programming errors, such as bad casting, accessing an out-of-bounds array, and numeric errors.

Learn more about Runtime Exception from

https://brainly.com/question/3620278

#SPJ1

In 25 words or fewer, explain why businesses use social media to digitally market their products.

Answers

Due to the accessibility of social media platforms, businesses have the opportunity to follow their potential customers. Social media marketers need to know more about their target market's needs, wants, and interests in order to develop a more effective marketing plan to draw in these potential customers.

What is social media?

Social media is a term used to describe online communication. Social media systems enable users to have discussions, exchange information, and create content for the internet.

Users utilize social media networks, sometimes referred to as digital marketing, as a platform to create social networks and share information in order to develop a company's brand, boost sales, and enhance website traffic.

Hence, the significance of the social media is aforementioned.

Learn more about on social media, here:

https://brainly.com/question/18958181

#SPJ1

Computer networks make the sharing of these resources possible.

Answers

The computer networks that make the sharing of these resources possible are:

Files Hardware Software

What are computer networks?

Computer networking are known to be a form of device or network that are said to be interconnected computing devices that helps in the exchange of data and share resources.

Note that The computer networks that make the sharing of these resources possible are Files, Hardware  and Software

Learn more about Computer networks from

https://brainly.com/question/1167985

#SPJ1

Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action?

Answers

A feature of cryptography which is used to prove an end user's identity and prevent an individual from fraudulently reneging on an action is nonrepudiation.

What is nonrepudiation?

Nonrepudiation can be defined as an assurance that the sender of a message is given a proof of delivery and the recipient of this message is also provided with a proof of the sender’s identity, so none of them can deny having processed this message.

This ultimately implies that, nonrepudiation is a security service which has a feature of cryptography and it can be used to prove an end user's identity and prevent an individual from fraudulently reneging on an action

Read more on nonrepudiation here: brainly.com/question/14631388

#SPJ1

Ken is conducting threat research on Transport Layer Security (TLS) and would like to consult the authoritative reference for the protocol's technical specification. What resource would best meet his needs

Answers

As, Ken is conducting threat research on Transport Layer Security (TLS), the best resource that would best meet his needs is internet RFC's.

What are Internet RFCs?

A Request for Comments (RFC) is known to be a kind of a formal document obtained from the Internet Engineering Task Force ( IETF ) and it is one that shows or tells  the outcome of committee drafting and review done by interested parties.

Note that as Ken is conducting threat research on Transport Layer Security (TLS), the best resource that would best meet his needs is internet RFC's.

See options below

A. ACADEMIC JOURNAL

B. INTERNET RFC's

C. SUBJECT MATTER EXPERT

D. TEXTBOOKS

Learn more about  internet RFC's from

https://brainly.com/question/12950573

#SPJ1

Self-driving cars are a result of developments in which field of computer
science?

Answers

Answer: I think Artificial Intelligence (AI)

Explanation:

A computer professional works in a field analyzing computer systems for
businesses and determining whether they are protected from cyber threats.
Which term best describes this field?

Answers

A term which best describes analyzing computer systems for businesses and determining whether they are protected from cyber threats is information technology.

What is information technology?

Information technology can be defined as a field in computer science that typically deals with the use of computer systems to generate, process, store, retrieve, and exchange different types of electronic data and information over a secured network.

This ultimately implies that, information technology is a terminology which best describes analyzing computer systems used by business firms and determining whether they are protected from cyber threats.

Learn more about information technology here: brainly.com/question/14426682

#SPJ1

Despite how well you might take care of your computer, problems can always arise. when troubleshooting problems you encounter, at what point should you engage a professional for assistance? why? at what point might you consider purchasing a new computer?

Answers

If troubleshooting problems is the one you encounter, the best thing to do is for one to get a professional to help one to see if the problem with the hardware  is one that is within the computer chassis.

What is troubleshooting?

Troubleshooting is known to be a form of systematic method that is often used in problem-solving that is known to help one to see and also correct issues that are linked with complex machines, electronics, computers and software systems.

Hence, If troubleshooting problems is the one you encounter, the best thing to do is for one to get a professional to help one to see if the problem with the hardware  is one that is within the computer chassis.

Learn more about troubleshooting from

https://brainly.com/question/9572941

#SPJ1

State two differences between a mouse pointer and a mouse cursor​

Answers

Answer:

explained below

Explanation:

The difference between the mouse pointer and cursor is as follows:

The mouse pointer is an arrow-like figure that appears on the screen of the computer. It is used to locate the different icons on the screen. It can move across the screen.

The cursor, however, is a blinking line that appears whenever you type something on the computer. It can be moved using the mouse and shows where your typed words will appear on the screen.

Answer:

Difference between a pointer and a cursor

Explanation:

Mouse pointer:

- Used to locate different items on the screen

- You control it with your mouse like an invisible "hotspot"

Mouse cursor:

- Used when a mouse is moved over text or something that does not give a link/is not interactive

- You cannot click on objects with a mouse cursor, but you can select text.

180. How is motion detection technology used to monitor and provide security for sensitive areas, and how can it deal with false positives

Answers

Motion detection technology are known to often triggers an alarm if they  detects movement that occurs within its radius or field of view, or when something has been around for a long time.

How do motion detectors help in a security system?

A motion sensor, or motion detector, is known to be  a kind of an electronic device that one can use to find nearby people or objects.

Note that Motion sensors is one that can be configured to take record of  date and time of motion detection, trigger lights, and others.

Hence,  Motion detection technology are known to often triggers an alarm if they  detects movement that occurs within its radius or field of view, or when something has been around for a long time.

Learn more about motion detection from

https://brainly.com/question/26320121

#SPJ1

A network of people and services with which we share ties and which provide support is.

Answers

A network of people and services with which we share ties and which provide support is social support.

What is Social support?

This is known to be a form of “support that is opened to any body as a result of social ties to other people, groups, and the bigger community.

Note that A network of people and services with which we share ties and which provide support is social support.

Learn more about social support from

https://brainly.com/question/7463943

#SPJ1

HELP! Write a program that generates 6 random numbers between 0 and 30, prints the numbers as shown, calculates the sum and the average of these numbers, and prints them

Answers

The program that generates 6 random numbers between 0 and 30 and makes mathematical computations is:

import random

import statistics

a = random.random()

b = random.random()

c = random.random()

d = random.random()

e = random.random()

f = random.random()

print("Generated Numbers:")

print(a, b, c, d, e, f)

seq = (a, b, c, d, e, f)

mean = statistics.mean(seq)

median = statistics.median(seq)

mode = statistics.mode(seq)

print("Mean =", mean)

print("Median =", median)

print("Mode =", mode)

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

If you want to stop a loop before it goes through all of its iterations, the break statement may be used. Group of answer choices True False

Answers

Answer:

Answer is true

Explanation:

which Yandere Simulator update removed the box of matches?

Answers

Answer:

Fixed the glitchy physics of Yandere-chan’s latest hairstyle. Removed exploit that allowed players to keep a character stationary indefinitely by talking to a student about their Task and never dismissing the Task Window. Adjusted the pathfinding grid so that it should be less likely for a student’s path to the male locker room to be blocked.

Explanation:

Answer:

i couldnt find the exact year but heres a list of bug fixes n stuff if this helps

Explanation:

https://yandere-simulator.fandom.com/wiki/Update_History

Chris is responding to a security incident that compromised one of his organization's web servers. He believes that the attackers defaced one or more pages on the website. What cybersecurity objective did this attack violate

Answers

The cybersecurity objective that the above attack violate is known as Integrity.

What is Cybersecurity aims?

Their objectives is majorly to protect any computers system, networks, and other kinds of software programs from any type of cyber attacks.

Note that The cybersecurity objective that the above attack violate is known as Integrity as they are not the kind of people that keep to their words.

Learn more about cybersecurity from

https://brainly.com/question/12010892

#SPJ1

list three things that can spoil a printer if they are not of the correct specification and explain what damage may be caused​

Answers

Explanation:

Debris, excess ink splatted around (from refilling probably) and the presence of small objects do contribute to paper jams and cause your printer to work inefficiently. Some printers have self-cleaning functions especially, for printer heads

Write a function named swapFrontBack that takes as input an array of integers and an integer that specifies how many entries are in the array. The function should swap the first element in the array with the last element in the array. The function should check if the array is empty to prevent errors. Test your function with arrays of different length and with varying front and back numbers.

Answers

Answer:

#include <iostream>

#include <vector>

using namespace std;

void swapFrontBack(vector<int>& nums) {

if(nums.size() < 2) {

return;

}

swap(nums[0], nums[nums.size()-1]);

}

void printit(vector<int>& arr) {

for(int i = 0; i < arr.size(); i++) {

cout << arr[i] << " ";

}

cout << endl;

}

int main() {

vector<int> num1;

swapFrontBack(num1);

printit(num1);

num1.push_back(1);

swapFrontBack(num1);

printit(num1);

num1.push_back(2);

swapFrontBack(num1);

printit(num1);

vector<int> num2(10, 1);

num2[9] = 2;

swapFrontBack(num2);

printit(num2);

return 0;

}

Explanation:

You have a Python web application with many dependencies that requires 0.1 CPU cores and 128 MB of memory to operate in production. You want to monitor and maximize machine utilization. You also to reliably deploy new versions of the application. Which set of steps should you take

Answers

The answer is  option C.

Perform the following:

1) Create a Kubernetes Engine cluster with n1-standard-1 type machines.

2) Build a Docker image from the production branch with all of the dependencies, and tag it with the

3) Create a Kubernetes Deployment with the imagePullPolicy set to "IfNotPresent" in the staging namespace, and then promote it to the production namespace after testing.

What is Python used for?

Python is known to be a form of computer programming language that is known to be used so as to create websites and software, automate tasks, and others.

Note that Python is said to be a general-purpose language and as such, for the case above, The answer is  option C.

Perform the following:

1) Create a Kubernetes Engine cluster with n1-standard-1 type machines.

2) Build a Docker image from the production branch with all of the dependencies, and tag it with the

3) Create a Kubernetes Deployment with the imagePullPolicy set to "IfNotPresent" in the staging namespace, and then promote it to the production namespace after testing.

See options below

A.

Perform the following:

1) Create a managed instance group with f1-micro type machines.

2) Use a startup script to clone the repository, check out the production branch, install the dependencies, and start the Python app.

3) Restart the instances to automatically deploy new production releases.

B.

Perform the following:

1) Create a managed instance group with n1-standard-1 type machines.

2) Build a Compute Engine image from the production branch that contains all of the dependencies and automatically starts the Python app.

3) Rebuild the Compute Engine image, and update the instance template to deploy new production releases.

C.

Perform the following:

1) Create a Kubernetes Engine cluster with n1-standard-1 type machines.

2) Build a Docker image from the production branch with all of the dependencies, and tag it with the

3) Create a Kubernetes Deployment with the imagePullPolicy set to "IfNotPresent" in the staging namespace, and then promote it to the production namespace after testing.

D.

Perform the following:

1) Create a Kubernetes Engine (GKE) cluster with n1-standard-4 type machines.

2) Build a Docker image from the master branch will all of the dependencies, and tag it with "latest".

3) Create a Kubernetes Deployment in the default namespace with the imagePullPolicy set to "Always".

Restart the pods to automatically deploy new production releases.

Learn more about Python from

https://brainly.com/question/26497128

#SPJ1

The four memory management techniques presented in this chapter share the requirement that the entire program being executed must be ____.

Answers

The four memory management techniques requires that the entire software program that's being executed must be loaded into memory.

What are the 4 memory management techniques?

In Computer science, there are four memory management techniques and these include the following:

Single contiguous allocation.Partitioned allocation.Paged memory management.Segmented memory management.

As a general rule, the aforementioned memory management techniques requires that the entire software program that's being executed must be loaded into memory.

Read more on memory here: https://brainly.com/question/13081782

#SPJ1

After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true?
A) Jabez removed Marion from the Marketing group and added her to another group.
B) Jabez removed the Remote Desktop Connection Broker service.
C) Jabez created a shared folder that is accessible to remote servers in the collection.
D) Jabez rebooted the remote access server.

Answers

The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

What are servers?

A server is known to be a form a computer program or device that helps to give a service to a given computer program and its user.

Note that in the case above, The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

Learn more about servers from

https://brainly.com/question/17062016

#SPJ1

Other Questions
What is the gravitational potential energy stored in a rock of 100 kgmass, placed on top of a hill, which is 100 m high?O 45 kJO 98 kJ O 50 kJO 100 kJ An electron can be added to halogen atom to force a halide ion with You have been selected to lead a team to resolve an age-old land dispute between two families. Family 'A' thinks Family 'B' is not entitled to a portion of the land because they are not biological children of the ancestor whose land is in dispute. But Family 'B' disagrees because they think they were adopted by the ancestor and are therefore her children also. FROM OUR DISCUSSION ON OPEN-TEXTURED AND WELL-DEFINED TERMS, VERBAL VS SUBSTANTIVE DISAGREEMENT, WRITE AN ESSAY OF 500 WORDS THAT DEALS WITH THE FOLLOWING:1. Diagnosis the nature of the family dispute, is it verbal or substantive?2. Identifies the source of disagreement?( determine the basis of their disagreement)3. Outlines your approach to bring peace between the two groups.4. Indicate the possible challenges you anticipate? Please I need your help. please help me with the following2 paragraphs for each question - Prior to the Civil War, how did the (dominant) discourse over the United States future reach a crisis point? -What were the arguments regarding the Constitutionality of slavery and notions of citizenship? How did relative definitions of liberty/freedom/equality become irreconcilable?- Describe the growing regional divide between the Northern and Southern United States. How did it manifest politically, especially in the context of expansion? How was slavery posited as defending versus subverting white liberty/equality? How did regional divisiveness culminate in two (dominant) incompatible national identities? QuestionDimitri's daughter weighed 3.8 kg at birth. Convert this to grams. What is the domain of the square root function graphed below?-6. Ax-4X>-4x20X>04+2490y24B30X 4NH3(g) + 5O2(g) 4NO(g) + 6H2O(g)In a reaction that produced 34.8 L of water vapor, what volumes of ammonia and oxygen were consumed? find the value of x in the following parallegram 2x-10 2x+50 Which point is a solution to the inequality shown in this graph? Which number line represents the solution set for the inequality 3(8 4x) < 6(x 5)?A number line from negative 5 to 5 in increments of 1. An open circle is at 3 and a bold line starts at 3 and is pointing to the left.A number line from negative 5 to 5 in increments of 1. An open circle is at 3 and a bold line starts at 3 and is pointing to the right.A number line from negative 5 to 5 in increments of 1. An open circle is at negative 3 and a bold line starts at negative 3 and is pointing to the left.A number line from negative 5 to 5 in increments of 1. An open circle is at negative 3 and a bold line starts at negative 3 and is pointing to the right. find the degree of 3m^2n^4 ( 64 ) -2/3 x ( 27 ) -2/3 3. PART A: How does the poet's word choicecontribute to the theme of the poem? How does extending vertex A further to the left of vertex B verify the relationship between sides and angles in triangles?BAs the length AB increases, the measure of Chelp help help!!!!! Yosef drove 12,900 miles last year. His truck's fuel efficiency averages 15 mpg, and the average cost of gas last year was $2.95 per gallon. Determine Yosef's average weekly fuel cost Consider a triangle ABC like the one below. Suppose that =A110, =b25, and =c4. (The figure is not drawn to scale.) Solve the triangle.Carry your intermediate computations to at least four decimal places, and round your answers to the nearest tenth.If there is more than one solution, use the button labeled "or". Find the magnitude of thisvector:174 mN188.4 mHELP FAST After the first two entries in the closing process have been recorded and posted, the debits and credits to Income Summary are $90,000 and $80,000, respectively. What is the amount of net income or net loss for the period what is the length of DE? 2 On a hot day, dogs sweat through their paw padsand pant, which helps keep them cool. Both thesweating and panting are(1) due to a loss of oxygen(2) a failure of cell communication(3) due to a lack of adaptation to the environment(4) a response to a stimulus