.....is used to save project in Visual basic .net from file menu

Answers

Answer 1

Explanation:

I don't really understand what you're trying to get at, maybe try to abbreviate a little more?


Related Questions

What is a bounding box

Answers

Answer:

bounding or enclosing box for a point set in N dimensions is the box with the smallest measure within which all the points lie.

Create a mobile app plan using PowerPoint slides to show mock-ups of screens, identifying input, process, and output for each
screen,

Answers

Answer:

PowerPoint slides to show mock ups

Which of the following is something that would NOT appear in the Reviewing pane?
a. The date on which a specific insertion was made.
b. The length of the document being reviewed.
c. The name of the person making an insertion.
d. The total number of revisions made to the document.

Answers

Answer:

A

Explanation:

What programs are always running when your computer is turned on? Enter the names of the programs in the space provided. Click the Submit button when you are finished to view the suggested response.

Answers

Answer:

open your task manager

Explanation

right click the toolbar below and click on task manager and you will see what programs are running on your pc

Answer:

Items commonly found in the system tray include antivirus settings; battery status; and volume. Sometimes e-mail programs, printers, or faxes are also present. Your computer may have other items in the system tray too.

Explanation:

I just took  a test on edguenity and that was the correct answer hope this helps

I’ll mark brainliest if correct

Select the correct answer.
Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?

A. SQL-Integrity Check

B.Unified Modeling Language

C.Selenium

D.Perforce

Answers

Answer:

I believe the answer is B

Explanation:

What type of address uses a number that uniquely identifies each computer?
O Computer address
O Home address
O E-mail address
O IP address​

Answers

Answer:

The awnser is D or IP Address

Explanation:

BRAINLIEST PLEASE

Answer:

IP Address. This is the most unique as you can track computers down with this code too. I hope you found this helpful, you are very welcome!

Define the term, external hard drive. Explain why you would use an external hard drive instead of a second internal hard drive.

Answers

Answer:

An external hard drive is a storage device located outside of a computer that is connected through a USB cable or wireless connection. An external hard drive is usually used to store media that a user needs to be portable, for backups, and when the internal drive of the computer is already at its full memory capacity.

Explanation:

External hard drives are usually portable thats why  it is commonly used!

Many applications ask, "Why did you leave your previous position?" Choose the best answer out of the examples below.

Answers

We can't see the examples therefore we can't help you try asking the question again with a picture of the examples

1. Which of the following commands allows the user to move objects around a basepoint?
Rotate
Fillet
Stretch
Extend

Answers

Answer:

Rotate

Explanation:

It seems that we are talking about AutoCAD software in this question. Normally to move an object you would use the Move command which allows you to move the object normally. However, since in the question we are talking about moving the object "around" a basepoint this would be the Rotate command. This is simply because it simply allows you to select the basepoint and move the object only in a 360 degrees rotation around the basepoint itself, where the basepoint acts as the center point.

Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux - Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets - The original utility from which OpenVas was developed - A port state which does not allow entry or access to a service - An open-source fork of Nessus - A port state that may indicate a firewall is being used to allow specified traffic into or out of the network - A port state that allows access to applications and can be vulnerable - Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly - Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts

Answers

Answer:

1. Nmap.

2. Fping.

3. Hping.

4. Nessus.

5. Closed port.

6. OpenVAS.

7. Filtered port.

8. Open port.

9. Port scanning.

10. Ping sweep.

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are;

I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.

II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.

In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.

1. Nmap: a popular port scanners that has the ability to use a graphical user interface (GUI) front end.

2. Fping: allows you to ping multiple internet protocol (IP) addresses simultaneously and is usually included in Kali Linux.

3. Hping: tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets.

4. Nessus: the original utility from which OpenVas was developed.

5. Closed port: a port state which does not allow entry or access to a service.

6. OpenVAS: an open-source fork of Nessus.

7. Filtered port: a port state that may indicate a firewall is being used to allow specified traffic into or out of the network.

8. Open port: a port state that allows access to applications and can be vulnerable.

9. Port scanning: allows you the ability to scan thousands or even tens of thousands of internet protocol (IP) addresses quickly.

10. Ping sweep: performed by port scanners to scan large networks to identify which internet protocol (IP) addresses belong to active hosts.

Which file organisation has the quickest access to data files? *

1 point

a)Direct

b)Serial

c)Sequential

d)Transaction​

Answers

A direct have the quickest access to data files

select the correct answer
What is SQL used for?
A. to write machine language code
B. to design webpages
C. to extract information from databases
D. to convert machine language into a high-level language

Answers

The SQL used to extract information from databases. (Choice: C)

Functions of SQL language

In this question we must understand about computer languages to answer correctly.

SQL stands for Structured Query Language and is a specific domain language intended for the management and retrieve of relational databases. Thus, SQL is used to extract information from databases.

Thus, SQL is used to extract information from databases. (Choice: C) [tex]\blacksquare[/tex]

To learn more on databases, we kindly invite to check this verified question: https://brainly.com/question/6447559

Answer:

The correct answer is C. To extract information from databases.

Explanation:

I got it right on Edmentum.

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a cross-over UTP plenum cable that will run through the suspended tile ceiling of the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device in the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration

Answers

Answer: • You should implement a UPS between the wall outlet and the network devices.

• You should implement redundant power supplies for the network devices.

Explanation:

Based in the information given in the question, the options that explain things wrong in the configuration is that:

• You should implement a UPS between the wall outlet and the network devices.

• You should implement redundant power supplies for the network devices.

I NEED THIS NOW!! :((

Which feature of a database allows a user to locate a specific record using keywords?

Chart
Filter
Search
Sort

Answers

which feature of a database allows a user to locate a specific record using keywords?

search

Janet is working on a highly confidential company budget spreadsheet, and she needs to prevent anyone, including administrators in the IT department, from being able to open the file and view its contents.
What should she do?

A) Use the Home tab, select Protect Sheet, and enter a password to prevent access to the sheet.
B) Click the Info tab in the Backstage view, select Protect Workbook, select Encrypt with Password, and enter a password.
C) Click the Review tab, select Protect Workbook, and enter a password for protecting the sheet.
D) Click the View tab and customize the view to protect the sheet from unauthorized users.

Answers

It has to be I took it

Ryan is applying a sort to the data in a table that you have inserted in Word. Which option is important for most tables that have column headings?
• Sort in descending order.
• Sort in ascending order.
• Select the option "My List has Header Row."
• Choose the correct sort field.

Answers

Ryan is applying a sort to the data in a table that you have inserted in Word.By Choose the correct sort field option is important for most tables that have column headings.

What is statistics?

A statistics desk is a number cell wherein you may alternate values in a number of the cells and give you one-of-a-kind solutions to a problem. An appropriate instance of a statistics desk employs the PMT feature with one-of-a-kind mortgage quantities and hobby fees to calculate the low-priced quantity on a domestic loan you can set up in descending, or you may set up in ascending.

And D, has not have anything to do with this requirement. You do not have this feature to be had with you. Select the option, "My listing has header row" isn't always to be had to us. And clearly, you want to pick out the excellent type of discipline first. And then you may set up or type accordingly.

Read more about the column headings:

https://brainly.com/question/1788884

#SPJ2

What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0]; for (int i = 1; i < numbers.length; i++) { if (numbers[i] < value) value = numbers[i]; } The value variable will contain the highest value in the numbers array. The value variable will contain the sum of all the values in the numbers array. The value variable will contain the average of all the values in the numbers array. The value variable will contain the lowest value in the numbers array.

Answers

Answer:

The value variable will contain the lowest value in the numbers array.

Explanation:

Given

The given code segment

Required

The result of the code when executed

The illustration of the code is to determine the smallest of the array.

This is shown below

First, the value variable is initialized to the first index element

int value = numbers[0];

This iterates through the elements of the array starting from the second

 for (int i = 1; i < numbers.length; i++) {

This checks if current element is less than value.

     if (numbers[i] < value)

If yes, value is set to numbers[i]; which is smaller than value

value = numbers[i];

Hence, the end result will save the smallest in value

the advantages and disadvantages of internet​

Answers

Advantages : a lot of useful information from all around the world
Disadvantage:, cyberbullying, stalking, hacking

HELP GIVING 20 POINTS IF RIGHT

Answers

Answer:

Negative space im pretty sure

Explanation:

negative space is the answer because there is nothing presented in the area.

HELP ASAP!Select all examples of desirable workplace skills, habits, and attitudes.

waits for others to solve problems
does not call in sick or miss work frequently
creates a list of solutions for the boss
arrives at work on time or early
waits for supervisor to give directions
works quickly and accurately
shows initiative
communicates effectively
sets clear goals to achieve success
gives products to friends for free

Answers

Answer:

does not call in sick or miss work frequently

creates a list of solutions for the boss

arrives at work on time or early

waits for supervisor to give directions

works quickly and accurately

shows initiative

communicates effectively

sets clear goals to achieve success

Explanation:

Have a Great Day!!!

Complete the sentence.
You might create algorithms and flowcharts during the ______ phase of software development.

Release

Planning

Design

Coding

Answers

You might create algorithms and flowcharts during the Design phase of software development.

What is the algorithms  about?

In software development, the Design phase is a crucial step in which the developers plan and determine how the software will be built. This involves breaking down the requirements and specifications into smaller, manageable components and then figuring out how these components will work together.

Therefore, to accomplish this, developers often create diagrams, such as flowcharts or algorithms, to help visualize the software's logic and structure. These diagrams can then be used to guide the development of the software, ensuring that all parts of the project are aligned and working towards the same goals.

Learn more about algorithms from

https://brainly.com/question/20543449

#SPJ1

Which of the following statements is true regarding the technical issues for developing applications for global audiences? Select 3 options.

Content delivery networks prevent traffic surges and can offset slow local internet service.

You should base your choice of which operating system to develop on usage rates in that specific market

Most users now have stable, fast connections worldwide.

A content delivery network can provide quick access to your content, no matter where your users live.

You should consider limiting the number of large images or audio files that you include, depending on the target market.

Answers

Answer:

Explanation:

From the available options presented, when developing for a global audience the following are true...

Content delivery networks prevent traffic surges and can offset slow local internet service.

A content delivery network can provide quick access to your content, no matter where your users live.

You should consider limiting the number of large images or audio files that you include, depending on the target market.

For global applications content delivery networks are a must since they allow the end-user to access the web page and its high quality content as if the web server were close by. By reducing the distance between the server and the end-user through these networks, you are effectively reducing latency, load times, performance, traffic surge effects, etc. Also when developing for a worldwide audience you should limit the number of larger images and audio files to only show the necessary ones for each target region, in order to make performance much more stable.

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? a. Use mail merge for steps 1 and 2 and a word processor for step 3. b. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. c. Use a word processor for steps 1 and 2 and a graphics software for step 3. d. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Answers

Answer:

1: Word Processor

2: Graphics Software

3: Mail Merge

Explanation:

Given

1. Create a list of invitees

2. Design an invitation card

3. Personalize the card

Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.

So task 1 requires a word processor

An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.

So task 1 requires a graphics software

Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.

Need the answer ASAP!! No links I’ll report

Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?

A.software engineering process

B.software quality metrics

C.SQA audits

D.reviews

Answers

Answer:

C

Explanation:

Opportunity and Spirit, NASA's Mars Exploration Rovers, were the first scientific instruments able to collect samples directly from the surface of Mars. One of the mission's goals was to determine the likelihood that life ever existed on Mars. How were Spirit and Opportunity best able to supply evidence that in the distant past Mars may have had an environment favorable to life?

Answers

Answer:

The rovers sent images of cross beds, centimeter-scale areas in rock layers, that could indicate whether water once flowed on Mars.

Explanation:

10 points each!!!
Which option can be inferred from the following scenario?

You come home from work on a summer afternoon and notice your home is warmer than usual. You check the thermostat. The room temperature is set at 78°F, so the house should seem cooler. You lower the temperature on the thermostat several degrees in order for the air conditioner to work.


The temperature on the thermostat should be set lower than 78°F.

The air conditioner is not functioning properly.

The air conditioner was turned off.

The thermostat is faulty and may need calibration.

Answers

Answer:

Option D

Explanation:

78 degree Fahrenheit is a below normal temperature during summer. Now if the room temperature is set a 78 degree Fahrenheit, then one must not feel that the room is warmer than usual.

Hence, there can be some issue with the thermostat. Hence, thermostat needs calibration as it is not working properly.

Option D.

Answer:

d

Explanation:

You come home from work on a summer afternoon and notice your home is warmer than usual. You check the thermostat. The room temperature is set at 78°F, so the house should seem cooler. You lower the temperature on the thermostat several degrees in order for the air conditioner to work so you should calibrate it

What is the purpose of using a tripod when filming?

Answers

Answer:

It helps with the camera  movement to get different angles and directions. Sometimes to keep it safe from falling out of grasp.

Explanation:

Answer:

it steadys the camera and can hold it in place for accurate shots.

Explanation:

Type the correct answer in the box. Spell all words correctly.

The students of a college have to create their assignment reports using a word processing program. Some of the questions in their assignment involve comparison between different items. Which function of a word processing program will be the most useful to present this information?
The function of a word processing program will be the most useful for comparison.

Answers

Answer:

The Insert Table function

Explanation:

Presenting information that involves the comparison between different (two or more) items where the given details on the items are available as text will be aided when the similarities and differences of the information are placed side by side, such as in tabular form categorically arranged with rows listing items under comparison

The function in a word processing program such as MS Word that would be most useful, therefore, is the Insert Table function

The Insert Table function is located under the Insert menu on the Menu bar, where the table, in the drop down list under the Table button

When the Table drop-down button is clicked, it reveals a table that can be adjusted to different number of columns and rows by moving the mouse.

After the table with the desired number of columns and rows is inserted, the comparison between specific characteristics of the items in the assignment report can then be placed in different columns on the same row in the created table.

Answer:

The insert table function of a word processing program will be the most useful for comparison.

Explanation:

Which audio media can be directly sent to the subscribers through an RSS feed?
A.
online streaming
B.
podcast
C.
cloud file
D.
live playback
E.
broadcast

Answers

I believe it’s c sorry if I’m incorrect though

Answer:

The correct answer should be B. podcast

Explanation:

there is a website called RSS feed that is podcasts

Why is special code needed for <?

Answers

The guy above is right!!!
Other Questions
Rezolvai n mulimea numerelor reale ecuaia:x+152x12=x10DAU COROANA! what is your favorite Disney movie and why? I need summaries please! I will mark you brainliest!! Which statement best explains the author's bias? 2. A recipe uses 5 cups of water, 3 cups of rice, and 1 cup of black beans. What is the ratio of cups of rice to cups of water? Write the ratio in 2 different forms in the box. (2 points) do Christians need to be concerned about the manner in which they present the gospel message? if i was 12 years old and my brother is a new born .how old will he be if i graduate high school Please Help Quick 25 Points! A rectangular box has a base measuring a by a meters and height of b meters.Which of the following represents the surface area of the box? At a museum cafe you can get a pre-made boxed lunch with a sandwich, fruit, and drink for only . The sandwiches are made with either turkey or ham. The fruit is either an apple or an orange. The drink is either bottled water or juice. The number of boxes they make for every possible combination is the same. If you randomly choose one of the boxed lunches without knowing the contents, what is the probability you will get a turkey sandwich and a bottle of water in your box? This figure shows an oblique triangle-based pyramid.What is the volume of the figure? hagar in the bible about Islamic black stone Solve this 6 - 4(3 - 6x) + 12x Which of the following sentences contains personification?AMy sister is a volcano when shes angry, so stay out of her way!BMy angry sister screamed loud enough to wake the neighbors.CBang! My sister slammed the door in my face and left me standing outside, alone.DAnger gripped my sisters heart in its firm fist, squeezing out all of her other feelings. why are dams have broader walls at the bottom? I WILL GIVE BRAINLYIST This battle was a major turning point in the war- Bloodiest and northern most battleof the Civil War. Lasted three daysA. VicksburgB. ShilohC. Gettysburg Triangle JKL has vertices J(0, 2), K(1, 2), and L(0, 3). What are the coordinates of the image of point J after a dilation with a scale factor of 3? HELPPP DUE IN 20 MINUTES!!!!!!!Jackie sees a tree branch about to fall on her, and she jumps out of the way. Which body systems helped her respond to danger? help please and thanks?!?!?! What type of cell can pass a DNA mutation to an organism's offspring? A. sex cell B. skin cell c. nerve cell D. red blood cell Why do we need to have balanced diets?