HELP ME!! DUE SOOON AND I DONT UNDERSTAND PLSSSS

HELP ME!! DUE SOOON AND I DONT UNDERSTAND PLSSSS

Answers

Answer 1
i think that it’s isss 4

Related Questions

Can someone please help me? (,:

Answers

14) Answer: Feathered images

15) Answer: Scale

Hope this helps have a nice day :)

Which of the following is not a method for opening Word software?

Answers

Answer:

right clicking on the desktop and clicking "view"

Answer:

veiw

Explanation:

Microsoft Windows, commonly referred to as Windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry

BRAINLIEST, PLS HELP ME!


List 3 things you could use for equipment to take a family portrait

Answers

Tripod.
Triangles.
Touchpoints/Connections.

To take a family portrait, you could use the following equipment -

CameraTripodRemote Shutter Release

How to  use the above equipment

1. Camera - A DSLR (Digital Single-Lens Reflex) camera or a mirrorless camera with manual controls will provide high-quality images and flexibility in adjusting settings.

2. Tripod  - A sturdy tripod will help keep the camera stable and ensure sharp images, especially in low light conditions or when using longer exposure times.

3. Remote Shutter Release -  A remote shutter release or a self-timer function on the camera can help avoid camera shake when capturing the family portrait, allowing everyone to be in the frame without rushing to press the shutter button.

Learn more about family portrait at:

https://brainly.com/question/411062

#SPJ6

what is a sensitive compartmented information program

Answers

Answer:

cpu

Explanation:

When an item in a menu is gray, it means that _____.


the item has been selected
the item has been selected

the item is unavailable
the item is unavailable

the item only works with another application
the item only works with another application

the item has been deleted

Answers

Answer:

the item is unavailable

Explanation:

this is an extrapolation as you would need more context to be sure but usually grey menus mean it is unavailable

HELP THIS IS SO DIFFICULT

Answers

It would be 11111, and decimal 31
Answer:

Binary: 11111

Decimal: 31

Explanation: Hope I was able to help!

what kind of tag will give additional info about your webpage

choices:

a. <meta>
b. <title>
c. <head>​

Answers

Answer:

A.The <meta> tag

Explanation:

HTML lets you specify metadata - additional important information about a document in a variety of ways.

Please mark brainliest!

the gap in ease of access to the internet and technology is known as the ________ divide.

Answers

It's the Digital divide.

the full meaning of UNIVAC and ENIAC​

Answers

Explanation:

ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)

hope it's help you cutty

UNIVAC

UNIVAC, which stood for Universal Automatic Computer, was developed by J. Presper Eckert and John Mauchly, makers of ENIAC, the first general-purpose electronic digital computer.

ENIAC

ENIAC filled an entire room.ENIAC stands for Electronic Numerical Integrator and Computer. John Mauchly and J. Presper Eckert built the machine at the University of Pennsylvania at the behest of the U.S. military.

Hope it helps

Thank You !!!

Explain how multiple inheritance might cause issues using examples.

Answers

Answer:

For many years, opponents of multiple inheritance have argued that it adds complexity and ambiguity to situations like the "diamond dilemma," in which it's unclear which parent class a certain feature is inherited from if more than one parent class implements the same feature.

Explanation:

Jim is working on a network design for a small office running a Windows file and printer server with Internet
capability for five desktop computers and a wireless router for the chief executive. He is suggesting they create a
Virtual Private Network (VPN), which will provide an encrypted "tunnel" through the public Internet for secure
access,
Why does this scenario provide an inappropriate firewall solution?

TIMED TEST HURRY

Answers

heres a link! ;)

http://www.econsulat.ro/

The online underground is used _____. Select 3 options.

Answers

You forgot to put the options

which is an ipsec protocol that authenticates that packets received were sent from the source?

Answers

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

how do I open this thing? it is stuck​

Answers

Answer:

the little button

Explanation:

A company is completing research and development for software which it is planning to produce in approximately 2 years time. Which of the following assumptions should the company make about the transistor density of the hardware which will be used to run this software?Group of answer choices

Answers

Answer:

The transistor density of the hardware which will exist in 2 years time will likely be double the current processing speeds.

Explanation:

The other 3 options are incorrect

Answer:

The transistor density of the hardware which will exist in 2 years time will likely be double the current processing speeds.

Explanation:

I just got that feeling.

where and how could you use a switch made out of aluminum foil or copper

Answers

Answer:

You can use the foil as a conductor for the power and you can use the copper as an insulator to break the electric current

Explanation:

WILL MARK BRAIN LIST!

Answers

Answer:

First one is A

Second one is B

Explanation:

what's the keyboard shortcut for help​

Answers

Answer:F1

Explanation:

Object-Oriented Analysis can be characterized by which of the following Selected Answer, Do the right thing Selected Answer, Emphasizes finding and describing the objects (or concepts) in the problem domain Selected Answer, An investigation of the problem (rather than how a solution is defined) Selected Answer, Defining software objects and how they collaborate to fulfill the requirements Answer, Designs are implemented in a programming language Selected Answer, Emphasizes a conceptual solution that fulfills the requirements Answer, Do the thing right

Answers

Answer:

Selected Answer, Emphasizes finding and describing the objects (or concepts) in the problem domain Selected Answer,

Explanation:

the first person to get this right I will give brainlliest Suppose that you find the annual interest rate for a car loan is 12.6%. Since you want to know how much your monthly payments will be, you need to divide 12.6% by 12. You place 12.6% in cell B3. What would this formula look like?

here is examples

Answers

Answer:

=B2*B3/1200

Explanation:

Assuming the loan amount is in cell B2,

The annual interest would be B2*B3/100.

Dividing that by 12 to get the month amount, you get =B2*B3/1200

i.e., the 1200 takes care of the percent (divide by 100) and the 12 months (divide by 12) all in one go.

how will you decide which browser security settings to allow and which ones to block?

Answers

One can decide which browser security settings to allow by reviewing them and using one's judgement.

Browsers like Chrome, Safari, Firefox all have innate personal browser security settings which can be altered according to users preferences.

Configuring of browsers setting is prominent for safeguarding sensitize information such as passwords, account details from getting accessed by a malicious third party.

In conclusion, one can decide these by reviewing each browser security setting and employ personal judgement to make decision.

Read more on this here

brainly.com/question/13354554

KSJEDHGYGVWJHMJ,RHGFYDOYWUGWHBJK

Answers

Answer:

hmmm this seems sophisticated.

Explanation:

Why is data the most important asset an organization possesses?

Answers

Answer:

It helps organizations/businesses to stay relevant in the area/internet/etc.

Explanation:

Data is an asset and is one of the most important assets an association has because it is unique in its detail and context and can be used strategically to ensure we remain relevant and viable.

when the binary code is retrieved from ram and moved to the cpu, this stage is known as

Answers

This stage is known as fetching.

Any operation you do in a computer, it runs a lot of codes inside it, and these codes are in binary.For the operation, the computer accesses the RAM memory to gather information about this process, and moves it to the CPU, in a process named as fetching.Thus, the stage asked in this problem is known as fetching.

A similar problem is given at https://brainly.com/question/21536104

What are the stages in the production of clay​

Answers

Explanation:

There are 6 essential stages of clay:

1. ) Slip. Use: Slip is most commonly used to join pieces of wet or leather hard clay together.

2.) Wet clay. Use: Wet clay can be used to make an infinite array of pieces using many different techniques.

3.) Leather-hard clay. ...

4.) Dry clay. ...

5.) Bisque. ...

6.) Glaze ware.

How often should quality control testing be implemented in the course of a project? It should be implemented only when there are clear problems. It should be implemented at regular intervals throughout the project. It does not matter how often it is implemented, as long as the standards are high. It should only be implemented at the beginning and the end of the project.

Answers

Answer:

I would personally wait until the project is roughly finished. Unless there is a project-breaking bug. Then I would try to fix it. If not, wait until the end of development.

Two people, Alice and Bob are using the key sharing algorithm. They have chosen a clock size of 17 and a base of 5. Alice's private number is 4, while Bob's is 6. The first step in creating the shared key is for each party to generate a PPN based on their private number, the base and the clock size. Alice has already sent her PPN to Bob. She receives Bob's PPN, which is 2. Alice uses Bob's PPN (2), her private number (4), and the clock size (17) to calculate the shared key. What is it

Answers

Answer:

fsfsf

Explanation:

when is the new season of legacies coming out on netflix

Answers

Answer:

Not sure (I couldn't find info) but It is coming out on CW

Explanation:

It is coming out on CW on October 14 2021 so the Netflix release will be much later than that.

All of the following are considered INPUT devices EXCEPT?
microphone
keyboard
cd
mouse

Answers

Answer: CD

Explanation:

Examples of input devices include keyboards, mouse, scanners, cameras, joysticks, and microphones. Hope it helps!!

Answer:

A and B

Explanation:

how to book a flight online

Answers

Answer:

https://www.wikihow.com/Book-a-Flight

Explanation:

Here is a simple article I found online on how to do it.

Answer:

First find what airplane you want to attend. Check pricing, seats, legit website, etc.

Next you pick where you want to go and they will show you what is required like id, name, last name, number, etc.

After you apply i think they send you the ticket or you go pick it up.

Hope it helps you

Explanation:

Other Questions
Please help answer and explain. If a ball is kicked horizontally off of a building at 8.0 m/s, what is the horizontal velocity (vx) after 3seconds? As an archipelago, Japan has anirregular coastline, which createsnatural ports and harbors safe forships to dock in, so... HELPPPPPPP IM CRYING!!! THIS IS TO MUCH PRESSURE PLEASE HELP!!! WILL GIVE BRAINILESTDetermine the point and slope from the equation: y + 6 = -(x - 5) a) point: (6, -5) slope: 1b) point: (-6, 5) slope: -1c) point: (5, -6) slope: -1d) point: (5, -6) slope: 1 Solve the simultaneous equations 2x + y = 5 and 2y = x 10. Find the x- and y-intercepts of : 4y-6x = 24 A gym employee earns the same amount each month. After working for three months, he earned $4,500. Complete the table to determine how much money he will make over a five-month period. 5.Is the relationship proportional? Explain your thinking. what is nuclear energy and write down it's two applications of this type of energy? please someone help me giving brainliest :) an orthodontic spring, connected between the upper and lower jaws, is adjusted to provide no force with the mouth open. when the patient closes her mouth, however, the spring compresses by 6.0 mm. Jed has 4 times as many baseball cards as Ramon? Together, they have 60 baseball cards. How many baseball cards does Jed have? Lindemann suggested to the world, in 1966, that there was a fifth primary taste called what what is the full form of GIGO? Figure MNOP is reflected about the x-axis to obtain figure MNOP:What is the scale factor of dilation? (1 point)Group of answer choices1 over 21 over 31 over 41 over 5 check all that apply. if csc0 =13/12 then:a:tan0= 12/5b:sec0= 12/13c: sin0=12/13d: cos0=12/13 What were countries like Germany, Russia, and Italy hoping to gain by giving power tototalitarian leaders How did English colonist view the indigenous people of North America in the 1600s century Why did England establish the sugar act?A) to make sure the colonies were unsuccessfulB) to collect money to help run the coloniesC) to keep control of the colonist 24. What term describes a transformation that doesnot change a figure's size or shape?A. SimilarityB. Rigid motionC. CollinearityD. Symmetry