Answer:
A & DExplanation:
A) Forgetting to attach a document/misclicking is a common issue when sending documents.
B) Attaching a document is not a complex topic and does not require much time.
C) There are other ways of attaching a document; after looking, it is not hard to find the icon. You can also search for the file uploader button as well.
D) This is a big issue; to scale the document down, you have to shrink it or transform the size. It creates multiple issues.
GUYS I NEED HELP!!!! Every time pc resets it clears all of my data files and content how do you fix this. Pls help
Answer: Most of the time its caused by a virus and the virus takes the chance when your computer resets so look for a virus if that's not it maybe its power failure check if its in a window folder or just use a antivirus.
Explanation:
Suppose that you are the CEO of a firm that has a choice between two new technologies: one that promises a modest profit with very little risk, and another that may yield a very high profit but at considerable risk. What would your choice be? Who in your company might support the first technology, and who might support the second?
Suppose that you are the CEO of a firm that has a choice between two new technologies one that promises a modest profit with very little risk, is the choice.
Which asset has the bottom hazard?If you need to position a few cash away which you want to stay safe, coins properties are the bottom-hazard property, or investments, available. Cash property vary from different asset kinds, consisting of shares and bonds, due to the fact coins property have little or no chance, if any, of dropping cash.
Savings, CDs, Money Market Accounts, and Bonds. The funding kind that generally consists of the least hazard is a financial savings account. CDs, bonds, and cash marketplace debts may be grouped in because the least unstable funding kinds around.Read more about the technologies:
https://brainly.com/question/25110079
#SPJ1
7. Which of the following is an important stated benefit to having Internet access?
A. You can speak your mind at every opportunity.
B. You have the opportunity for educational growth.
C. It's possible to get popular with many followers on social media.
D. You don't have to worry about Trojan horse viruses.
Answer:
B. You have the opportunity for educational growth.
Explanation:
D is simply not true, C is not as important, A is situational.
Write a program that asks the user for a temperature in degrees Celsius.
Then display the temperature in Celsius and its Fahrenheit equivalence to two decimal places.
Answer:
#include <iostream>
#include <iomanip>
using namespace std;
int main(){
double celsius, fahrenheit
cout << "Enter the emperature in degrees Celsius: ";
cin >> celsius;
cout << endl;
fahrenheit = (celsius * 9/5) + 32;
cout << fixed << setprecision(2) << fahrenheit;
}
Explanation:
Does anyone know the answer
Answer:
C
Explanation:
A is binary for 35
B 35 base 10 is 35
C is the answer
Please give answer before explanation
It shows a track table and a genre table and asks given the above data model, what do the results from the
following query represent?
SELECT genre.name, track.name
FROM track
CROSS JOIN genre;
A) it represents tracks that exist in the track table combined with their genre name as represented the "genre_id " foreign key
B) it represents every track paired with every genre in the genre table
C) It represents every record in the genre table, regardless of whether there are tracks that belong to that genre in the track table
D) it represents every record in the track table regardless of whether they have a genre_id
Based on the results from the given query: A) it represents tracks that exist in the track table combined with their genre name as represented by the "genre_id" foreign key.
What is query?A query is a computational request for data that are stored in a database table, from existing queries, or even from a combination of both a database table and existing queries.
Based on the results from the given query, we can infer and logically deduce that it represents tracks that exist within the track table combined with their genre name as represented by the "genre_id" foreign key.
Also, the paired combination of each row of data that are stored in a database tables is done through the CROSS JOIN command.
Read more on query here: https://brainly.com/question/25266787
#SPJ1
It represents every track paired with every genre in the genre table.
Explanation:
The CROSS JOIN clause creates a combination of every row from two or more different tables. A query is a computational request for data that are stored in a database table, from existing queries, or even from a combination of both a database table and existing queries.
Based on the results from the given query, we can infer and logically deduce that it represents every track that exists within the genre table.
Paired combination of each row of data that are stored in a database tables is done through the CROSS JOIN command.
An employee receives a phone call from someone saying they are from the bank.
What kind of call is this?
An employee receives a phone call from someone saying they are from the bank. This type of call indicates Phishing.
What are banks?Banks are referred to as financial institutions that help in borrowing or lending money to investors and help in depositing money for savings and withdrawing cash whenever needed.
A type of fraud where an intruder pretends to be a reputable company or individual in letters or other forms of electronic communication is referred to as Phishing. Hackers frequently use malicious email to deliver malicious attachments or links that can carry out a variety of activities.
In these cases, employees receive a call from someone stating that they are from banks reflects the activity of Phishing. This types of call usually misguide people and ask them for password and other credentials in the name of verification and fraud.
Learn more about Phishing, here:
https://brainly.com/question/24156548
#SPJ2
What is the best example of how computers have changed the way people communicate?
A.
A smart device can track every place you go and be accessed by people who shouldn't see this information.
B.
Internet influencers share their experiences in order to gain more followers.
C.
Most people have smartphones, and they can be reached wherever they go.
D.
Social media is used to find friends or relatives after a natural disaster.
Answer:
c since it is very important that people reached where ever they are
Hope This Helps!!!
The best example of how computers have changed the way people communicate is,
D. Social media is used to find friends or relatives after a natural disaster.
Hence option D is true.
Ask about the best example of how computers have changed the way people communicate.
In the past, during natural disasters, it could be challenging to locate and connect with loved ones due to limited communication channels.
However, with the advent of social media platforms, people can quickly share information about their safety, and whereabouts, and seek help in real-time.
Social media acts as a powerful tool for reuniting families and friends during such challenging times.
Therefore, the correct option is, D.
To learn more about computers visit:
https://brainly.com/question/22495842
#SPJ3
how can array save memory and at the same time waste space
An array saves memory because here the memory is padded, so there is no space between them and if it is no contagious space then it wastes space.
What is an array?An array in terms of computer science is a linear data structure, which stores the same type of data in a compact or contagious way and in adjacent memory locations.
As it compacts the data, so it saves space, but when it is not contagious it wastes space at the same time.
Thus, because the memory is padded in an array, there is no gap between them, which would waste space even if it were contagious.
Learn more about array, here:
https://brainly.com/question/13107940
#SPJ1
What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me
Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.
Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.
PLS MARK ME AS BRAINLIEST.
Password protection restricts access to a resource, while encryption secures the actual content of that resource by transforming it into an unreadable form.
Ask about the difference between password protection and encryption.
Now, Password protection and encryption serve different purposes when it comes to securing data.
Password protection is a method of restricting access to a device, system, or specific files by requiring users to enter a password. It acts as a barrier to prevent unauthorized individuals from accessing the protected resource.
The password is typically a combination of characters that only authorized users should know.
Encryption, on the other hand, is a technique used to convert plain text or data into an unreadable format, called ciphertext, using an encryption algorithm.
The ciphertext can only be decrypted back to its original form by someone possessing the decryption key.
Encryption ensures that even if someone gains unauthorized access to the data, they will not be able to read or understand it without the decryption key
Hence, Both measures are commonly used together to enhance data security.
To learn more about password protection visit:
https://brainly.com/question/32167725
#SPJ3
Below functions flatten the nested list of integers (List[List[int]]) into a single list and remove duplicates by leaving only the first occurrences. When the total number of elements is N, choose the one that correctly compares the time complexity with respect to N of each function.
f1 = f3 < f2
f1 = f2 < f3
f3 < f1 = f2
f3 < f1 < f2
f1 = f2 = f3
The time complexities of the functions is (a) f1 = f3 < f2
How to compare the time complexities?The time complexities of the functions are dependent on the loops and conditional statements in the function.
From the given code, we have the following highlights:
Function f1: 2 loops and 1 conditional statementFunction f2: 2 loops and 1 conditional statement in the second loopFunction f3: 2 loops and 1 conditional statementConsidering the function f2
The conditional statement in the second loop implies that the conditional statement would be executed several times as long as the loop is valid.
This means that:
f2 > f1 and f2 > f3
Functions f1 and f3 have equal loops and conditional statement.
This means that
f1 = f3
So, we have:
f2 > f1 = f3
Rewrite as:
f1 = f3 < f2
Hence, the time complexities of the functions is (a) f1 = f3 < f2
Read more about time complexities at:
https://brainly.com/question/15549566
#SPJ1
We need to build a model for a category Y for a binary classification problem (with categories of: 0,1) and having one binary attribute X1 (with possible values of: 0,1 per attribute).
The Naïve Bayes algorithm was chosen for training the classification model.
After the training phase, we got the following results:
p(X1=0|Y=0)=0.35, p(X1=1|Y=0)=0.65
p(X1=0|Y=1)=0.3, p(X1=1|Y=1)=0.7
p(Y=0)=0.5, p(Y=1)=0.5
Which of the following answers is correct?
Select the best answer
Select one:
A.
If the category Y=1, we will classify the example as X1=1
B.
If the value of X1 is 0 we will classify the example as category Y=0
C.
If the value of X1 is 1 we will classify the example as category Y=0
D.
None of the answers is correct, since we're missing the probabilities: p(X1=0), p(X1=1),
Answer:
D. None of the answers is correct, since we're missing the probabilities: p(X1=0), p(X1=1),
Explanation:
To calculate the probability that an example belongs to a particular category, we need to know the prior probability of the category (p(Y=0) or p(Y=1)), the probability of the attribute value given the category (p(X1=0|Y=0) or p(X1=1|Y=1)), and the probability of the attribute value (p(X1=0) or p(X1=1)). We are missing the latter two probabilities, so we cannot calculate the probability that an example belongs to a particular category.
Which benefit does the Cloud provide to start-up companies without access to large funding?
Answer:
You don't have to invest in hardware or a data center, you pay only for the resources that you use, so your cost grows linearly in stead of a big investment. It's capital expenditures vs operational expenditures.
Describe personal computer skills using three adjectives?
Answer:
proficient with Microsoft word Excel and PowerPoint
Explanation:
compost and send over 150 images microsoftop creating and the formatting simple office budget speed sheets on Microsoft Excel Bros and its documents Microsoft word
In this lab, you create a programmer-defined class and then use it in a C++ program. The program should create two Rectangle objects and find their area and perimeter.
Instructions
Ensure the class file named Rectangle.cpp is open in your editor.
In the Rectangle class, create two private attributes named length and width. Bothlength and width should be data type double.
Write public set methods to set the values for length and width.
Write public get methods to retrieve the values for length and width.
Write a public calculateArea()method and a public calculatePerimeter() method to calculate and return the area of the rectangle and the perimeter of the rectangle.
Open the file named MyRectangleClassProgram.cpp.
In the MyRectangleClassProgram, create two Rectangle objects named rectangle1 and rectangle2 using the default constructor as you saw in MyEmployeeClassProgram.cpp.
Set the length of rectangle1 to 10.0 and the width to 5.0. Set the length of rectangle2 to 7.0 and the width to 3.0.
Print the value of rectangle1’s perimeter and area, and then print the value of rectangle2’s perimeter and area.
Execute the program by clicking the Run button at the bottom of the screen
The program based on the information given is illustrated below.
What is a program?A computer program simply means a sequence of instructions in a programming language that is created for a computer to execute.
It should be noted that computer programs are among the component of software.
The program to create two rectangle objects and get their area and perimeter is depicted:
// Rectangle.cpp
using namespace std;
class Rectangle
{
public:
// Declare public methods here
void setLength(double);
void setWidth(double);
double getLength();
double getWidth();
double calculateArea();
double calculatePerimeter();
private:
// Create length and width here
double length, width;
};
void Rectangle::setLength(double len)
{
length = len;
}
void Rectangle::setWidth(double wid)
{
// write setWidth here
width = wid;
}
double Rectangle::getLength()
{
// write getLength here
return length;
}
double Rectangle::getWidth()
{
// write getWidth here
return width;
}
double Rectangle::calculateArea()
{
// write calculateArea here
return length*width;
}
double Rectangle::calculatePerimeter()
{
// write calculatePerimeter here
return 2*(length+width);
}
// This program uses the programmer-defined Rectangle class.
#include "Rectangle.cpp"
#include <iostream>
using namespace std;
int main()
{
Rectangle rectangle1;
Rectangle rectangle2;
rectangle1.setLength(10.0);
rectangle1.setWidth(5.0);
rectangle2.setLength(7.0);
rectangle2.setWidth(3.0);
cout << "Perimeter of rectangle1 is " << rectangle1.calculatePerimeter() << endl;
cout << "Area of rectangle1 is " << rectangle1.calculateArea() << endl;
cout << "Perimeter of rectangle2 is " << rectangle2.calculatePerimeter() << endl;
cout << "Area of rectangle2 is " << rectangle2.calculateArea() << endl;
return 0;
}
/*
output:
The perimeter of rectangle1 is 30
The area of rectangle1 is 50
The Perimeter of rectangle2 is 20
The area of rectangle2 is 21
*/
Learn more about program on:
brainly.com/question/1538272
#SPJ1
the lumber region is_
Answer:
Explanation:
The lumber region is a part of the Canadian lumber industry. It is the most important part of Canada's pulp and paper exports, mostly to the United States. The most valuable region for timber production is the west coast, where the climate is conducive to the growth of giant trees with excellent lumber.
Which model allows designers to use a graphical tool to examine structures rather than describing them with text?
A model which allow designers to use a graphical tool to examine structures rather than describe them by using text is called entity relationship.
What is an entity relationship?An entity relationship can be defined as a data model with the highest level of abstraction and it is designed and develop to avail designers an ability to use a graphical tool to examine structures rather than describe them by using text.
This ultimately implies that, an entity relationship can be used to label the various relationship types based on connectivity, especially through the use of a graphical tool to examine structures rather than describe them with text.
Read more on entity relationship here: https://brainly.com/question/14530873
#SPJ1
Slide rule was an analog device invented by William oughtred in 1620 it is true or false
The circular (1632) and rectangular (1620) slide rules were invented by an Episcopalian minister and mathematician William Oughtred.
Write a program that allow a customer to input the value of goods bought, The program should then decide the discount to give a customer,
Answer:
geeksforgeeks is the answer
Discuss how you think Kuhl’s findings regarding the benefits of babies being exposed to languages in person versus over the television or audio should impact how we often rely on various forms of technology to teach children today?
Audible toys, television, digital channels, and other trustworthy technology are utilized to teach kids language. The learning of languages and the retention of knowledge, however, are not greatly aided by these.
What is Television ?
A mass communication medium known as “television is used here. Electronic media with a video and audio foundation include television. A variety of channels, including news, sports, music, and movie channels, are available on television.
It is not helpful for a newborn to learn language to watch television or listen to radio programs that are advertised as educational. By engaging and listening to caring adults—actual dialogue from real people, not TV and audios—babies and toddlers acquire new words and build language abilities.
Hence, the significance of the television is aforementioned.
Learn more about on television, here:
https://brainly.com/question/11867986
#SPJ1
What is edge computing?
Answer:
Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.
Explanation:
For the function below, list 4 ordered pairs for that function.
y = 3x + 1
Answer:
(1, 4)
(2, 7)
(0, 1)
(-1, -2)
Explanation:
to find ordered pairs, we plug in different values for x.
(remember, and "ordered pair" is (x, y)--the first number turns into the second number when put through the function)
usually, it's easiest to plug in smaller numbers, so that it is less complicated to graph
so, here's a few x values:
x = 1
y = 3x + 1
y = 3(1) + 1
y = 3 + 1
y = 4
so, when x = 1, y = 4
we write this as: (1, 4)
x = 2
y = 3x + 1
y = 3(2) + 1
y = 6 + 1
y = 7
so, when x = 2, y = 7
we write this as: (2, 7)
x = 0
y = 3x + 1
y = 3(0) + 1
y = 0 + 1
y = 1
so, when x = 0, y = 1
we write this as: (0, 1)
x = -1
y = 3x + 1
y = 3(-1) + 1
y = -3 + 1
y = -2
so, when x = -1, y = -2
we write this as: (-1, -2)
hope this helps!! have a lovely day :)
ANSWER THESE QUESTIONS PLEASE! HURRY ASAP
What three files do you need to perform a mail merge
What type of document you use mail merge to create?
Answer:
question 1
Excel spreadsheet. An Excel spreadsheet works well as a data source for mail merge.
Outlook Contact List. You can retrieve contact information directly from your Outlook Contact List on to Word.
Apple Contacts List.
question 2
Mail merge lets you create a batch of documents that are personalized for each recipient.
In which type of situation would it make sense to use edge computing?
A type of situation in which it would make sense to use edge computing is: b. where critical decisions must be made on a split-second basis.
What is edge computing?Edge computing can be defined as a distributed computing system that involves the deployment of computing and storage resources closer to the sources of data, so as to save time and enhance the decision-making process.
This ultimately implies that, a type of situation in which it would make sense to use edge computing is a scenario where critical decisions must be made on a split-second basis.
Read more on edge computing here: brainly.com/question/23858023
#SPJ1
Complete Question:
In which type of situation would it make sense to use edge computing?
a. where data is uploaded to a server at a scheduled time each week
b. where critical decisions must be made on a split-second basis
c. where users are in close proximity to the central data server
d. where there are few or no digital devices to capture
e. i don't know this yet
alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activity By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 (5 points) alle Mbawah : Attempt 1 How does a bystander become an advocate ? By harassing the bully until he or she stops the harmful activity By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 ( 5 points )what is the ans
Answer:By reporting the bully or supporting the victim that's what I would do
Explanation:
A bystander becomes an advocate by taking action in either reporting the bully or otherwise supporting the victim. Thus, the correct option for this question is B.
What is an Advocate?An advocate may be characterized as a type of person that supports another person in order to help you express your views and wishes, and help you stand up for your rights. It is the one who pleads with another's cause, who helps another by defending or comforting him.
According to the context of the story, a bystander has their own responsibilities in case of any harmful activities going out in their surroundings. They are required to take action in either reporting the bully or otherwise supporting the victim. In this case, harmful activities reduce from our surroundings. Everything required some actions and initiations.
Therefore, the correct option for this question is B.
To learn more about Advocate, refer to the link:
https://brainly.com/question/26054678
#SPJ2
You work with alot of different documents in your internship with a software development company. What kinds of actions can you take to keep your files and folders organized?
Answer:
Explanation:
Try as much as possible, to keep like files together in one folder. Even so there if you run into the hundreds or thousands, that is not going to be an easy thing do.
What ever you do, do clutter up your favorites bar, especially if your favorites spill over into where you have to push a button to get to them. Keep that bar open for what you really need on that bar. Mine has Brainly, Kitco, My Alberta Health, A graphing program, a second graphing program, Amazon, a scrabble word finder, and a couple of other things. It
If you can, try and keep your favorites to something that would be useless to anyone else. My favorites are worthless to anyone else. But I play a lot of scrabble related games.
Question 1 (True/False Worth 3 points)
(05.01 LC)
The internet is a local communication network that allows only certain computers to connect and exchange information.
O True
False
Java application that inputs a series of 10 integers and determines and prints the largest integer.
Answer:
import java.util.Scanner;
class Main {
static final int TOTAL = 10;
public static void main (String args[])
{
Scanner input = new Scanner(System.in);
int largest = 0;
for(int count=1; count<=TOTAL; count++) {
System.out.printf("Enter number %d of %d : ", count, TOTAL);
int number = input.nextInt();
if (count == 1) {
largest = number;
} else {
largest = Math.max(largest, number);
}
}
System.out.printf("The largest number is %d\n", largest);
input.close();
}
}
Explanation:
You have to pay special attention to the initialization of largest, because the initialized value should not be part of the competition of which number is the largest. That's why if (count==1) is a special case.
Which task might a hardware designer do?
OA. Design computing components for cars and medical equipment
B. Design 3D models for video games and augmented reality
OC. Design and build communications equipment
D. Design the software that computers use
C. Design and build communications equipment
This communication equipment can be phones, EarPods which are hardware
Hope it helps!
The task that a hardware designer do is to design computing components for cars and medical equipment. The correct option is A.
A hardware designer is in charge of creating computational components for a range of products, including automobiles and medical equipment.
They design specialized hardware systems to fulfil particular specifications, assuring effective and dependable performance.
Working on systems for automotive control, entertainment, and safety features is a part of designing automotive components.
Hardware designers create parts for medical equipment in the medical industry, assuring their precision, dependability, and regulatory compliance.
Designing circuit boards, microprocessors, integrated circuits, and other electronic devices is part of their job description.
Hardware designers play a critical role in enabling the integration of cutting-edge technology and enhancing functionality in specialized sectors by creating these computing components.
Thus, the correct option is A.
For more details regarding Hardware, visit:
https://brainly.com/question/32934053
#SPJ5
What is the purpose of an ARP response?
Answer:
The ARP protocol will tell you the physical address (mac address) of a node based on it's ip address. So effectively one protocol layer lower.
The purpose of an ARP response is to provide the sender with the MAC (Media Access Control) address of a specific Internet Protocol address within a local network.
Ask about the purpose of an ARP response.
Since ARP is necessary because the software address (IP address) of the host or computer connected to the network needs to be translated to a hardware address (MAC address).
Without ARP, a host would not be able to figure out the hardware address of another host.
Hence, an ARP response allows devices on a local network to discover and map IP addresses to MAC addresses, facilitating effective communication between devices at the data link layer.
Learn more about an arp response here:
https://brainly.com/question/29568812
#SPJ3