A student is going to e-mail a file she has created and needs to reduce the file size. What tool should she use to reduce the file size?

save and send

macros

compress media

save as

Answers

Answer 1

Answer:

Compress media

Explanation:

This zips the file into a smaller size which can now be sent. It can be decompressed to view.


Related Questions

analog computer are general purpose computer true or false ​

Answers

Answer:

false

Explanation:

Analog computers were widely used in scientific and industrial applications even after the advent of digital computers

What could cause an external drive, like a usb flash drive, to not be recognized when plugged into a computer?.

Answers

The reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.

What is a USB flash drive?

A USB flash drive is a drive is a small device that connect devices with computer or insert data to the computer.

A USB have capacity to hold data within, and the data can be transported to anywhere.

Thus, the reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.

Learn more about USB flash drive

https://brainly.com/question/14144068

#SPJ1

Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
ex: if the input is:
2 3 4 8 11 -1
(a negative indicates the end), the output is:
4
the maximum number of inputs for any test case should not exceed 9. if exceeded, output "too many inputs".
hint: first read the data into a vector. then, based on the number of items, find the middle item.
#include
#include // must include vector library to use vectors
using namespace std;
int main() {
/* type your code here. */
return 0;
}

Answers

integer userInput

integer i

integer mid

integer array(20) number

userInput = 1

for i = 0; userInput >= 0; i = i + 1

  if number[i] > -1

     userInput = Get next input

     number[i] = userInput

i = i - 1

mid = i / 2

if i > 9

  Put "Too many inputs" to output

elseif i % 2 == 0

  Put number[mid - 1] to output

else

  Put number[mid] to output

If “A” represents in binary 10011001, what will be the value of word “CAB”?

Answers

Answer:

01000011 01000001 01000010

Explanation:

You can convert to and from binary and the base-10 system typically used by humans. You can also convert to and from binary and hexadecimal where you need four digits of binary to represent one digit of hex. Converting to and from binary and octal is another possibility. It takes three binary digits to represent an octal digit. Binary 000 is octal digit 0.

Complete the sentences.
The ACCUPLACER exam is a diagnostic test that evaluates the students’ progress in a specific academic field. It is divided into sections that assess reading, writing, and mathematics skills. The
section tests students’ ability to solve problems related to algebra, trigonometry, and geometry. The
section tests how well the students can write. The
section tests the students’ knowledge about sentence structure.

Answers

Answer:

fiances

Explanations it just  is

Which of these would you least expect to find at an fbla-pbl meeting?

planning a community service project

role-playing to develop leadership skills

students working on iste certification

working with local business leaders

Answers

role-playing to develop leadership skills

One sign of a virus infection is that available memory is less than what should be available. Group of answer choices True False

Answers

Answer:

[tex]True.[/tex]

Help me with this question asap please :)

Answers

Answer:

I think it's sequence as there is a pattern of connection in the words

What initialization vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use

Answers

24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).

What is Wireless Equivalency Protocol (WEP)?

Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).

According to the IEEE Wireless Fidelity (Wi-Fi) standard, 24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).

Read more on Wireless Equivalency Protocol here: https://brainly.com/question/13697151

#SPJ1

When you collaborate or meet with a person or group online, it is called
1. cloud computing
2. social networking
3. text messaging
4.web conferencing

Answers

When you collaborate or meet with a person or group online, it is called  social networking.

What is social networking?

The term  social networking is known to be the act of meeting people online, interacting with them and even making friendship with them.

Therefore, When you collaborate or meet with a person or group online, it is called  social networking.

Learn more about  social networking from

https://brainly.com/question/1027666

#SPJ1

Help ASAP this Answer is simple…

why is fair use important

Answers

Answer:

to ensure that the rights of the copyright holders are fair or balanced properly

Explanation:

hope this helps

10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer. you may prompt for the two integers as you wish; the prompt will not be included in the grading. ex: if the input is:

Answers

he program gives an output in increment of 5, if the first inputted integer is less than the second. The program written in python 3 goes thus

100 POINTS ANSWER CORRECTLY AND ANSWER QUICKLY I DONT HAVE MUCH TIME
You are creating a function that will test whether a number is greater than 10 using these lines of code:
if a < 10:
print(a "is greater than 10")
Can you identify one syntax error and one logic error in these lines? Why do you think a programmer might have made the logic error?

Answers

Yes there's syntax error .

After if there's colon so the next line or code block should start after some spaces(min 4)

The correct code is

[tex]\tt def(a)[/tex]

[tex]\tt if\:a<10:[/tex]

[tex]\quad\tt print(a,"is\:greater\:than\:10")[/tex]

As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices?a. Layer 4 switchesb. ToR switchesc. EoR switchesd. Layer 3 switchesAs a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices?a. Load balancingb. NIC teamingc. Clusteringd. Port aggregationYou run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?a. Measured service.b. Resource pooling.c. Rapid elasticity.d. Broad network access.

Answers

The option that you will use to implement this change in your Windows devices is  Layer 3 switches.

What are the layer 3 switches?

A Layer 3 switch is is known to be one where a switch can carry out routing functions and also do its  switching.

Note that The option that you will use to implement this change in your Windows devices is  Layer 3 switches.

Learn more about  Layer 3 switches from

https://brainly.com/question/14594641

#SPJ1

what are trends in GPS ? ​

Answers

Answer:

New Trends in GPS & Telematics in 2021 and Beyond - Rewire Security. Real-time location tracking systems for cars, vans, motorcycles, lorries, wired or plug & play options—battery-powered GPS tracking systems with magnets attached to flat metal surfaces such as containers.

Explanation:

An employee at a large global firm is sending a document with sensitive information to a co-worker in another country. how should the contents of the document be protected?

Answers

The employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data with end-to-end encryption.

How document be protected?

There are many ways a computer file can be protected. The ways to protect the document are,

Using the cloud based secure file sharing sites.The protected view can be used to secure the contents of the document sending to another country.When the file is end-to-end encrypted between the employee and co worker, then no one can be seen the file in between.

Thus, the employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data end-to-end encryption.

Learn more about the data protection here;

https://brainly.com/question/4219149

#SPJ2

Which best describes how information is sent on the internet?

Answers

Answer:

a. The information is first sent via a Broadband for efficient transmission, and if not successful, only then it is resent via a Baseband that exists as a backup network as packets b. The message is first broken down into small packets before being sent, then they are

Explanation:

Android os is developed by​

Answers

Answer:

It is developed by G oogle

Explanation:

Android os is developed by G oogle. It launched in 2008.

Stories used to be told only by:

OA. digitally recording them.

OB. saying them aloud.

OC. writing them down.

OD. drawing them on paper.

Answers

Answer:

OB. saying them aloud.

Explanation:

In the olden days, materials like recording devices, pens or paper weren't invented, so people had to know stories by heart.

what word makes this inappropriate????

Answers

Hm. Maybe it’s a glitch? Maybe it thought of something dirty? :/

When should a user consider restoring the operating system.

Answers

A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.

What is an operating system?

This is known to be a software that aids a computer's basic functions, such as working on tasks and others.

Note that A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.

Learn more about  operating system from

https://brainly.com/question/22811693

#SPJ1

You are responsible for managing an internal FTP server. A user reports that files available on the server yesterday are no longer available. Where can you look to determine what happened to the missing files

Answers

To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.

What is a FTP server?

FTP is a File transfer protocol. It is a transfer of files from the client and the server on a computer network.

It is a basic thing in transferring or sharing files between two computer networks.

Thus, To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.

Learn more about FTP server

https://brainly.com/question/27610307

#SPJ1

When using outer and inner methods for recursion, typically, the outer method should check for a valid _____ and then call the inner method.

Answers

The statement that completes the blank is input value

How to complete the statement?

From the question, we have the following concepts:

MethodsRecursion

There are two methods in recursions, and they are:

Inner methodOuter method

The role of the inner method is to check for valid input value

When the input value is valid, this value is sent to the outer method

Hence, the complete statement is "The outer method should check for a valid input value and then call the inner method."

Read more about recursion at:

https://brainly.com/question/14208577

#SPJ4

Which automatic startup option should you choose when windows' startup fails immediately after installing a new driver but before you have logged on again

Answers

Answer:

last known good configuration

Explanation:

If you're having difficulties starting Windows, the Last Known Good Configuration, or LKGC for short, is a technique to get it started. It loads the drivers and registry data from the last time you began and shut down your computer successfully.

Carrie needs to keep a budget for her department. Each employee in her department sends her travel expenses. In cell, C2, C3, C4, and C5, she enters the total of each employee’s expenses. In cell B1, she enters the original amount of money the department was allotted for spending. What formula should she use to calculate the amount of money the department currently has?

=B1 -(C2+C3+C4+C5)
=B1-C2+ B1-C3+B1-C4+B1-C5
= (C2+C3+C4+C5)-B1
=(B1+C2+C3+C4+C5)

Answers

Answer:

(C2+C3+C4+C5)-B1

Explanation:

Answer:

=(C2+C3+C4+C5)/4

Explanation:

add all numbers together then div. by the total amount of numbers is how you get the average.

A series of events that gets the computer ready for work is known as what?
soft boot
hard boot
boot loader
boot sequence

Answers

Answer:

Boot Sequence

Explanation:

CODEHS: WHY is it important to know the difference between div and span?

Answers

Span and div are both generic HTML elements that group together related parts of a web page. However, they serve different functions. A div element is used for block-level organization and styling of page elements, whereas a span element is used for inline organization and styling.

Christian has malware that is preventing him from installing anti-malware on his laptop. What can Christian try if he does not have another computer available to run the anti-malware program

Answers

If he does not have another computer available to run the anti-malware program then.Try to put it in Windows RE. Create a digital gadget and defloration the anti-malware program.

What is Antivirus?

Antivirus is vital even in case you are on a Mac or Windows device, which each includes a few stages of virus safety constructed in. For general safety with endpoint safety and response, and blocks in opposition to malware and probably undesirable programs, it is fine to put in a third-celebration antivirus software program.

Antivirus is a type of software program used to prevent, scan, discover, and delete viruses from a computer. Once installed, the maximum antivirus software program runs mechanically withinside the heritage to offer real-time safety in opposition to virus attacks. Try to put it in Windows RE. Create a digital gadget and defloration the anti-malware program.

Read, more about the program:

https://brainly.com/question/1538272

#SPJ1

Compare and contrast sources and types of credit, including costs and benefits of installment
credit, collateralized loans versus unsecured credit, credit cards, mortgages, auto loans, and
student loans.

Answers

Answer:

loan your mom

Explanation:

Enumerate at least 5 furnitures you would add to your house which would be practical and energy-saving.

Answers

Answer:1. Advanced house framing

Advanced house framing, also known as optimum value engineering, is a specific framing technique wherein a house is constructed using less lumber and waste. Advanced house framing saves energy by using less wood and more insulation. According to the U.S. Department of Energy, using advanced framing can lower material costs by $500 to $1,000 for a 1,200- to 2,400-square-foot house. It can also cut labor costs by 3-5% and annual heating and cooling costs by up to 5%.

2. Cool roofs

Cool roofs are designed to reflect sunlight and lower roofing temperatures. Cool roofs are made from a type of reflective material within roofing materials such as tiles, shingles, paint or other substances. This energy-saving technique is ideal for houses in warm climates where air conditioning costs are high all year around.

3. The right exterior doors

Choosing the right exterior door for a home should be a carefully thought-out decision. When you choose a door, you should first consider the doors' energy-performance ratings. This score lets you know how well each door does in preserving the energy in your home by trapping heat or cool air inside. Using this score to help you find the ideal door will also help you narrow down your selection and find an exterior door that best matches your taste, needs and wants.

4. Skylights

Skylights are often a feature that enters homeowners' mind when they think of improving their homes' energy efficiency. Skylights have many benefits, which makes them ideal for any home. Skylights improve houses' heating, lighting and ventilation. It is important to note that if you are considering placing skylights in your home, the U.S. Department of Energy recommends they be no larger than 5% of the floor area in rooms with several windows, and 15% of the floor area in rooms with minimal windows.

5. Window treatments

Boring curtains do more than drive your spouse crazy; they can actually help reduce energy costs in your home. By being specific in your choice of window treatments, you can reduce heat loss or keep cool air inside your home. Many factors determine window treatments' energy efficiency. For example, the type of material and color of the treatment are significant, along with how it opens and closes.

Explanation:

Other Questions
The perimeter of a rectangle is 90 feet. The width is 15 feet. What is the perimeter? 27) Harry made 4 hits in 9 times at-bat. If she keeps the same success level, how many hits should she make in 18 times at bat? Why do authors use irony in fiction and literary nonfiction texts? In the Roman Empire most children received their education from their ___________. A push-cart vendor is selling sodas at the beach. partway into the day, he raises his price per bottle by one quarter. after this price increase, the total dollar amount collected for the day after selling n bottles at the new price is given by the following equation: t = 12 + 1.75n according to this equation, how many bottles did the vendor sell today before raising the price? o a 8 ob. 12 c. 18 d. 21 what is the measure of x Which statement best completes the diagram?Rebellions make Yemenunstable beginning in 2011.A. Iraq invades Yemen in order to take control over its oil fields.B. Saudi Arabia conducts a devastating bombing campaign inYemen.C. The United States attacks Yemen in order to remove its dictator.D. Yemen agrees to become a part of the United Arab Emirates. Choose the correct form of the possessive adjective to complete the sentence, keeping in mind that the subject and the possessor are the same. 1. Nosotros tenemos una clase de espaol juntos. ____ clase es a las 7:30 dela maana los martes y jueves.A. SuB. TusC. NuestraD. Mis Scott rolled a number cube several times and counted how many times he rolled a 3. What is the theoretical probability of Scott rolling a 3 if his number cube is fair? Six people want to share five boxes of raisins. How many boxes of raisins will each person get? 2.Select the correct answer.Which question is most appropriate to ask during the reading of a text?O A. What strategies can I use to help me better understand this section?OB. Why am I reading this text?OC. What is the most important idea for me to remember from this text?ODWhat is the author's purpose in writing this text? Compare and Contrast the worlds of the Athenians & the Fairies in A Midsummer Night's Dream Sandy made several investments. She bought 1000 shares of a companys stock for $8.60/share, she bought a bond with a face value of $2500 and a coupon rate of 7%, and she invested $5000 into a fund that is expected to grow by 3.5% per year.The bond Sandy purchased will mature in 10 years. How much interest will she receive semiannually?How long will it take the fund she invested in to be worth $10,000? Whats the answer? Im confused Read these words from the First Amendment to the Constitution.Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.This amendment guarantees citizens the right tobear arms against the government.establish a national religion.influence their representatives' decisions.vote in elections. Calculate the [H+], given the pH is 2.5 a0.31 M b0.25 M c0.50 M d0.003 M ill give brainly but hurry 7). John had 9 pieces of gum at thebeginning of the day. He now has 8pieces of gum. How much gum didhe eat during the day? Write the equation and the solution. How much power does each brance hold A creation resulting from study and experimentation is: a. pattern. b. replication. c. precedent. d. innovation.