Can someone please help me? (,:
Which of the following is not a method for opening Word software?
Answer:
right clicking on the desktop and clicking "view"
Answer:
veiw
Explanation:
Microsoft Windows, commonly referred to as Windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry
BRAINLIEST, PLS HELP ME!
List 3 things you could use for equipment to take a family portrait
To take a family portrait, you could use the following equipment -
CameraTripodRemote Shutter ReleaseHow to use the above equipment1. Camera - A DSLR (Digital Single-Lens Reflex) camera or a mirrorless camera with manual controls will provide high-quality images and flexibility in adjusting settings.
2. Tripod - A sturdy tripod will help keep the camera stable and ensure sharp images, especially in low light conditions or when using longer exposure times.
3. Remote Shutter Release - A remote shutter release or a self-timer function on the camera can help avoid camera shake when capturing the family portrait, allowing everyone to be in the frame without rushing to press the shutter button.
Learn more about family portrait at:
https://brainly.com/question/411062
#SPJ6
what is a sensitive compartmented information program
Answer:
cpu
Explanation:
When an item in a menu is gray, it means that _____.
the item has been selected
the item has been selected
the item is unavailable
the item is unavailable
the item only works with another application
the item only works with another application
the item has been deleted
Answer:
the item is unavailable
Explanation:
this is an extrapolation as you would need more context to be sure but usually grey menus mean it is unavailable
HELP THIS IS SO DIFFICULT
what kind of tag will give additional info about your webpage
choices:
a. <meta>
b. <title>
c. <head>
Answer:
A.The <meta> tag
Explanation:
HTML lets you specify metadata - additional important information about a document in a variety of ways.
Please mark brainliest!
the gap in ease of access to the internet and technology is known as the ________ divide.
It's the Digital divide.
the full meaning of UNIVAC and ENIAC
Explanation:
ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)
hope it's help you cutty
Hope it helps
Thank You !!!Explain how multiple inheritance might cause issues using examples.
Answer:
For many years, opponents of multiple inheritance have argued that it adds complexity and ambiguity to situations like the "diamond dilemma," in which it's unclear which parent class a certain feature is inherited from if more than one parent class implements the same feature.
Explanation:
Jim is working on a network design for a small office running a Windows file and printer server with Internet
capability for five desktop computers and a wireless router for the chief executive. He is suggesting they create a
Virtual Private Network (VPN), which will provide an encrypted "tunnel" through the public Internet for secure
access,
Why does this scenario provide an inappropriate firewall solution?
TIMED TEST HURRY
heres a link! ;)
http://www.econsulat.ro/
The online underground is used _____. Select 3 options.
which is an ipsec protocol that authenticates that packets received were sent from the source?
Answer:Encapsulating Security Payload (ESP)
Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.
how do I open this thing? it is stuck
Answer:
the little button
Explanation:
A company is completing research and development for software which it is planning to produce in approximately 2 years time. Which of the following assumptions should the company make about the transistor density of the hardware which will be used to run this software?Group of answer choices
Answer:
The transistor density of the hardware which will exist in 2 years time will likely be double the current processing speeds.
Explanation:
The other 3 options are incorrect
Answer:
The transistor density of the hardware which will exist in 2 years time will likely be double the current processing speeds.
Explanation:
I just got that feeling.
where and how could you use a switch made out of aluminum foil or copper
Answer:
You can use the foil as a conductor for the power and you can use the copper as an insulator to break the electric current
Explanation:
WILL MARK BRAIN LIST!
Answer:
First one is A
Second one is B
Explanation:
what's the keyboard shortcut for help
Answer:F1
Explanation:
Object-Oriented Analysis can be characterized by which of the following Selected Answer, Do the right thing Selected Answer, Emphasizes finding and describing the objects (or concepts) in the problem domain Selected Answer, An investigation of the problem (rather than how a solution is defined) Selected Answer, Defining software objects and how they collaborate to fulfill the requirements Answer, Designs are implemented in a programming language Selected Answer, Emphasizes a conceptual solution that fulfills the requirements Answer, Do the thing right
Answer:
Selected Answer, Emphasizes finding and describing the objects (or concepts) in the problem domain Selected Answer,
Explanation:
the first person to get this right I will give brainlliest Suppose that you find the annual interest rate for a car loan is 12.6%. Since you want to know how much your monthly payments will be, you need to divide 12.6% by 12. You place 12.6% in cell B3. What would this formula look like?
here is examples
Answer:
=B2*B3/1200
Explanation:
Assuming the loan amount is in cell B2,
The annual interest would be B2*B3/100.
Dividing that by 12 to get the month amount, you get =B2*B3/1200
i.e., the 1200 takes care of the percent (divide by 100) and the 12 months (divide by 12) all in one go.
how will you decide which browser security settings to allow and which ones to block?
One can decide which browser security settings to allow by reviewing them and using one's judgement.
Browsers like Chrome, Safari, Firefox all have innate personal browser security settings which can be altered according to users preferences.
Configuring of browsers setting is prominent for safeguarding sensitize information such as passwords, account details from getting accessed by a malicious third party.In conclusion, one can decide these by reviewing each browser security setting and employ personal judgement to make decision.
Read more on this here
brainly.com/question/13354554
KSJEDHGYGVWJHMJ,RHGFYDOYWUGWHBJK
Answer:
hmmm this seems sophisticated.
Explanation:
Why is data the most important asset an organization possesses?
Answer:
It helps organizations/businesses to stay relevant in the area/internet/etc.
Explanation:
Data is an asset and is one of the most important assets an association has because it is unique in its detail and context and can be used strategically to ensure we remain relevant and viable.
when the binary code is retrieved from ram and moved to the cpu, this stage is known as
This stage is known as fetching.
Any operation you do in a computer, it runs a lot of codes inside it, and these codes are in binary.For the operation, the computer accesses the RAM memory to gather information about this process, and moves it to the CPU, in a process named as fetching.Thus, the stage asked in this problem is known as fetching.A similar problem is given at https://brainly.com/question/21536104
What are the stages in the production of clay
Explanation:
There are 6 essential stages of clay:
1. ) Slip. Use: Slip is most commonly used to join pieces of wet or leather hard clay together.
2.) Wet clay. Use: Wet clay can be used to make an infinite array of pieces using many different techniques.
3.) Leather-hard clay. ...
4.) Dry clay. ...
5.) Bisque. ...
6.) Glaze ware.
How often should quality control testing be implemented in the course of a project? It should be implemented only when there are clear problems. It should be implemented at regular intervals throughout the project. It does not matter how often it is implemented, as long as the standards are high. It should only be implemented at the beginning and the end of the project.
Answer:
I would personally wait until the project is roughly finished. Unless there is a project-breaking bug. Then I would try to fix it. If not, wait until the end of development.
Two people, Alice and Bob are using the key sharing algorithm. They have chosen a clock size of 17 and a base of 5. Alice's private number is 4, while Bob's is 6. The first step in creating the shared key is for each party to generate a PPN based on their private number, the base and the clock size. Alice has already sent her PPN to Bob. She receives Bob's PPN, which is 2. Alice uses Bob's PPN (2), her private number (4), and the clock size (17) to calculate the shared key. What is it
Answer:
fsfsf
Explanation:
when is the new season of legacies coming out on netflix
Answer:
Not sure (I couldn't find info) but It is coming out on CW
Explanation:
It is coming out on CW on October 14 2021 so the Netflix release will be much later than that.
All of the following are considered INPUT devices EXCEPT?
microphone
keyboard
cd
mouse
Answer: CD
Explanation:
Examples of input devices include keyboards, mouse, scanners, cameras, joysticks, and microphones. Hope it helps!!
Answer:
A and B
Explanation:
how to book a flight online
Answer:
https://www.wikihow.com/Book-a-Flight
Explanation:
Here is a simple article I found online on how to do it.
Answer:
First find what airplane you want to attend. Check pricing, seats, legit website, etc.
Next you pick where you want to go and they will show you what is required like id, name, last name, number, etc.
After you apply i think they send you the ticket or you go pick it up.
Hope it helps you
Explanation: