Answer:
Referencing Microsoft Word:
1. How can you save a document created using Word 2016 in a PDF format? Explain the process step by step.
Step 1: Click on File Tab
Step 2: Click on Save As Button
Step 3: Select File Location for the document
Step 4: Name the document
Step 5: Save type: Select pdf
Step 6: Save
2. Assuming you are on the home tab, explain which tabs and buttons you would need to select to open a new blank document?
Step 1: Click on File Tab
Step 2: Click on New Button
Step 3: Select or Click Blank Document
3. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add the "Quick Print" icon to the Quick Access Toolbar.
Step 1: Click on File Tab
Step 2: Select Options Button
Step 3: Select Quick Access Toolbar
Step 4: Select Quick Print
Step 5: Click on Add
4. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add a bibliography to the document.
Step 1: References Tab
Step 2: Click Bibliography
Step 3: Insert Bibliography or create as required.
5. Assuming you are on the home tab, explain which tabs and buttons you would need to select to put a picture within your document?
Step 1: Click on File Tab
Step 2: Click the Open Button
Step 3: Click on Library
Step 4: Select Picture Location
Step 5: Select Picture
Step 6: Click Add
6. Assuming you are on the home tab, explain which tabs and buttons you would need to select to change the page orientation to Landscape?
Step 1: Click Layout Tab
Step 2: Select Orientation
Step 3: Click Landscape
7. What is the purpose of the "ribbon"?
The "ribbon" contains the 8 tabs on the Quick Access Toolbox: File, Home, Insert, Page Layout, References, Mailings, Review, and View. The "ribbon" groups these specific command categories called tabs.
8. The Help button from previous versions of Office has been replaced by what words and what symbol?
It has been replaced with the lightbulb symbol with these words: “Tell me what you want to do…” And you can also type Alt + Q to get the same help assistance.
Explanation:
The ribbon is a user interface element created by Microsoft and includes the roll of tabs and buttons. The Ribbon tabs and buttons bring your favorite commands into the open by showing multiple commands grouped in specific categories.
There are eight tabs along on the ribbon: File, Home, Insert, Page Layout, References, Mailings, Review, and View. Each tab relates to different activities that you can carry out when creating a document. For example, if you want to save a new document, you click on the File tab which takes you to the Save As button where you choose the file location and save as required.
When a hardware or software interrupt occurs, the CPU calls________
Answer:
Operating system
Explanation:
An interrupt is the signal sent to the processor that interrupts the current process. It may be generated by a hardware device or a software program.With each interrupt the CPU hardware does exactly the same thing, which is what enables operating systems to take control of the current user operation.
Order the steps for using the Rules Wizard to create an email rule.
Answer:
The answer is in the attached file below.
Explanation:
What is Game Theory?
Study of strategic decision making
elements of support for effective support of a system
the imitation of the operation of real-world process or system over time
decentralized communications model
Answer:
the branch of mathematics concerned with the analysis of strategies for dealing with competitive situations where the outcome of a participant's choice of action depends critically on the actions of other participants
Explanation:
In simple terms Game theory is the study of how and why people make decisions.
Overlay analysis is ____________, taking in data from two or more layers to create a single output layer.
Explanation:
Overlay analysis is an approach, taking in data from two or more layers to create a single output layer.
For example, if we have a layer of land use and a layer of soil fertility, we can derive from the two layers the percentage of agricultural land developed over fertile soil.
Amanda a recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house. Which type of network is best for Amanda and her family?nd her family recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house. Which type of network is best for Amanda and her family?
Answer:
wifi is the best network for all, As it gets in all corners of the house.
what is the principle that producers are entitled to make more money from a business than they invest
Answer: profit motive
Explanation: i don’t have and explanation but i just did it on apex and got it right
Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
Answer:
ALU :An arithmetic logic unit (ALU) is a digital circuit used to perform calculations and logic operations
Registers:register holds the address of memory where CPU wants to read or write data.
CU:The control unit (CU) is a component of a computer's central processing unit (CPU) that directs the operation of the processor.
BIU:BIU takes care of all data and addresses transfers on the buses for the EU like sending addresses, fetching instructions from the memory, reading data from the ports and the memory as well as writing data to the ports and the memory.
Cache:Cache is used to temporarily hold instructions and data that the CPU is likely to reuse.
FPU:A floating-point unit (FPU, colloquially a math coprocessor) is a part of a computer system specially designed to carry out operations on floating-point numbers.
Explanation:
This is all I can say
When you want to use the current backup of all of the files, which option should be selected?
Answer:
To use the current backup of all the files, the option to select is Browse for Folders.
This gives you access to select the most current back up with the latest timestamp.
Cheers!
Which of the following is considered data?A. Quantity sold.B. Best customer by month.C. Best selling item by month.D. Worst selling item by month.
Answer:
A
Explanation:
A.
Which of the following is typically used in a flowchart to indicate a decision?
a. square
b. rectangle
c. diamond
d. oval
Decisions in flowcharts are indicated by diamonds.
What are flowcharts?It is a pictorial or symbolic representation of the processes involved in achieving an aim.
In flowcharts, the following apply:
Ovals represent the beginning or end of a processRectangles represent key steps in the processArrows are used to indicate the flow or direction of the processDiamonds represent decision-making. When one of the available options has to be taken.More on flowcharts can be found here: https://brainly.com/question/14598590
#SPJ2
Which of the following is no longer necessary when you use HTML5 to develop Webpages? Please Hurry This Is For An Assignment due in 15 minutes :>
Answer:
Installing a third-party plug-in to include video
Explanation:
Check
Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked? Check all that
apply.
Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked? Check all that
apply.
Indent the ideas in the bulleted list.
Change the number level of the list.
Choose the bullet to be used in the list.
Define the new bullet to be used in the list.
Pick the number format to be used in the list.
Answer:
Choose the bullet to be used in the list.
Define the new bullet to be used in the list.
Explanation:
When using Microsoft Word text editor, when the drop-down menu of the bullet icon is clicked, the following tasks can be accomplished which are to choose the bullet to be used in the list and define the new bullet to be used in the list.
A bullet is used to identify or list out important items, sometimes in ascending order, and are used to organize information to make the important points easy to pick out.
Answer:
Choose the bullet to be used in the list.
Define the new bullet to be used in the list.
Explanation:
.
What are three purposes of the Media Creation Tool application?
Answer:
The first purpose fo the Media Creation Tool Application is:
to enable the creation or building the Windows 10 installation media. The Windows 10 installation media is not Windows 10It can also be used to repair an existing installationIt is used to make a bootable USB memory stick for use in the installation of Windows 10Cheers!
The three purposes of the Media Creation Tool application are:
To stored data.To download a Windows 10 install file.To reinstall Windows 10.What is the purpose of the media creation tool?The Media Creation Tool is known to be an application that helps a person to be able to download a Windows 10 install file.
Here the person can get this file and put it into a flash drive or a DVD and then one can save it so that one can be able to still use it to reinstall the Windows 10. It is known to act as a kind of backup option in case your system has malfunctions.
Learn more about Media Creation from
https://brainly.com/question/1114645
Which of the following are offered by most
professional organizations? Check all of the boxes
that apply.
a code of conduct
access to resources, conferences, and job
boards
help with troubleshooting computer issues
skills validation
Answer:
1. A code of conduct
2. Access to resources, conferences,and, job boards
4. skills validation
Explanation:
I just answered it
A code of conduct is a collection of regulations describing an individual party's or organization's norms, standards, and duties or right procedures. The correct options are A, B, and D.
What is a code of conduct?A code of conduct is a collection of regulations describing an individual party's or organization's norms, standards, and duties or right procedures. The most prevalent policy within a company is a code of conduct. This policy outlines the company's beliefs, standards, and moral and ethical expectations for workers and third-party interactions with the firm.
From the given set of options, the options that are offered by most professional organizations are,
A code of conductAccess to resources, conferences, and job boardsSkills validationHence, the correct options are A, B, and D.
Learn more about the Code of Conduct here:
https://brainly.com/question/12990307
#SPJ2
Which of the following best describes how computing devices represent information? A. A computer will either represent information as bits or bytes but not both B. A computer represents data as a byte which is either a 0 or a 1 C. A computer represents data as bits which is either a 0 or a 1 D. A computer represents information as bits which contain 8 bytes.
Answer:
The Answer is B
Explanation:
The reason the answer is B is because "bytes" are the correct form of storing memory in 0's and 1's.
Using concepts of data representation in a computer, it is found that the correct option is:
C. A computer represents data as bits which is either a 0 or a 1.
-----------------
In computer science, it is a common saying that "everything inside a computer is either a 0 or 1".The unit of measure that only has 0s and 1s is bits.If we load a file, either text or image, all the values at each position on the file are composed by 0's and 1's, for example.Thus, option C is correct.A similar problem is given at https://brainly.com/question/17399642
2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element in . Then find the second smallest A AOE1 element of A, and exchange it with . Continue in this manner for the firs AOE2 1 elements of A. Write pseudocode for this algorithm, which is known as selection sort. What loop invariant does this algorithm maintain? Why does it need to run for only the firs elements, rather than for all elements? Give the best-case n 1 n and worst-case running times of selection sort in ‚-notation.
Answer:
Follows are the explanation of the choices:
Explanation:
Following are the Pseudocode for selection sort:
for j = 0 to k-1 do:
SS = i
For l = i + 1 to k-1 do:
If X(l) < X(SS)
SS= l
End-If
End-For
T = X(j)
X(j) = X(SS)
X(SS) = T
End-For
Following are the description of Loop invariants:
The subarray A[1..j−1] includes the lowest of the j−1 components, ordered into a non-decreasing order, only at beginning of the iteration of its outer for loop.
A[min] is the least amount in subarray A[j.. l−1] only at beginning of the each loop-inner iterations.
Following are the explanation for third question:
Throughout the final step, two elements were left to evaluate their algorithm. Its smaller in A[k-1] would be placed as well as the larger in A[k]. One last is the large and medium component of its sequence because most and the last two components an outer loop invariant has been filtered by the previous version. When we do this n times, its end is a repetitive, one element-sorting phase.
Following is the description of choosing best-case and worst-case in run- time:
The body the if has never been activated whenever the best case time is the list is resolved. This number of transactions are especially in comparison also as a procedure, that will be (n-1)(((n+2)/2)+4).
A structure iterator at every point in the worst case that array is reversed, that doubles its sequence of iterations in the inner loop, that is:(n−1)(n+6) Since both of them take timeΘ(n2).
Java Programming home > 1.14: zylab training: Interleaved input/output Н zyBooks catalog Try submitting it for grading (click "Submit mode", then "Submit for grading"). Notice that the test cases fail. The first test case's highlighting indicates that output 3 and newline were not expected. In the second test case, the-5 and newline were not expected 2 Remove the code that echoes the user's input back to the output, and submit again. Now the test cases should all pass 0/2 ACTIVITY 1.14.1: zylab training: Interleaved input/output DoubleNum.java Load default template 1 import java.util.Scanner; 3 public class DoubleNum public static void main(String args) { Scorner sehr = new Scanner(System.in); int x; 7 System.out.println("Enter x: "); 9 - scnr .nextInto: 10 11 System.out.println(); // Student mistakenly is echoing the input to output to match example 12 System.out.println("x doubled is".02 Develop mode Submit mode Run your program as often as you'd like, before submitting for grading. Below, type any needed Input values in the first box, then click Run program and observe the programs cutout in the second be Enter program input (optional) of your code requires input values, provide them here Ad Cat
Answer:
The following are the code to this question:
code:
System.out.println(x); //use print method to print value.
Explanation:
In the given question, it simplifies or deletes code in the 11th line. This line has a large major statement.
In the case, the tests fail because only 1 line of output is required by the tester, but two lines are obtained instead.
It's to demonstrate that the input/output or testing requirements function throughout the model.
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
Answer:
The correct solution is "Sponge ".
Explanation:
The method of transforming data into unreadable text is synonymous with cryptography, as well as vice-versa.The sponge configuration throughout cryptography seems to be a method of thought, based on a specific-length possible combination as well as a formatting law, which constructs a mechanism connecting variable-length information through variable-length release.A computer has 38 address lines. How many locations in Mega bytes can it address?
Answer:
The computer can address 34359,738368 megabytes
Explanation:
Given
Address Lines (n) = 38
Required
Determine the number of location it can address
Number of addressable locations (N) in bits is calculated as thus
[tex]N = 2^n.[/tex]
Substitute 38 for n
[tex]N = 2^{38}[/tex]
[tex]N = 274877906944\ bits[/tex]
Next; is to convert from bits to megabytes
Start by converting to bytes
1 bit = 0.125 bytes;
So;
[tex]N = 274877906944 * 0.125\ bytes[/tex]
[tex]N = 34359738368\ bytes[/tex]
Convert from byte to megabyte
[tex]1\ byte = 10^{-6}\ megabyte[/tex]
So;
[tex]N = 34359738368\ * 10^{-6}\ MB[/tex]
[tex]N = 34359,738368\ MB[/tex]
Hence, the computer can address 34359,738368 megabytes
Mention five specific techniques you can use to improve your written documents.
Answer:
The answer is below
Explanation:
There are various techniques an individual can use to improve his or her written documents, some of which considered to be specific are:
1. Understand the targeted readers.
2. Do not be ambiguous or avoid ambiguity
3. Always use active voice pattern whenever possible
4. Perform second reading, and edit where necessary
5. Avoid repetition of words too often.
Expain the application areas of ICT in education sector and E-commerce
Explanation:
Nowadays almost all the school and college use computers in classrooms and labs to teach students.A teacher can teach effectively using computer-based presentations.Students can study different subjects and complete their assignment by using different software in computer.The Computer Based Training(CBT) and Web Based Training(WBT) are aid to teach the student in the classroom.
E-commerce is a financial business transaction conducted electronically between business partners over the internet.Business transactions can occur very quickly and globally.The people can buy,sell and exchange the products or services using internet.Todays many computer can also access the Internet through wireless technologies.
Multiple Choice
Choose the answer that best answers the question.
Read the following sentence. The underlined phrase is an idiom that uses figurative language. What could this phrase mean?
When you work on your project, you shouldn't bite off more than you can chew by working on too much at one time.
O A Don't talk with food in your mouth.
O B. Don't do more than you can handle.
c. Don't eat too much food,
D. Don't eat someone else's food.
Answer:
dont do more then you handle
Which section from the article BEST explains why humans could benefit from studying a particular type of extremophile?
Answer:
The study of extremophiles provides an understanding of the physicochemical parameters defining life on Earth and may provide insight into how life on Earth originated. The postulations that extreme environmental conditions existed on primitive Earth and that life arose in hot environments have led to the theory.NASA is studying an extremophile, Deinococcus radiodurans, which is extremely resistant to radiation. This microbe can withstand doses of radiation 500 percent higher than would be lethal to humans.
Hope this helped you!
Explanation:
This is C++
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
(2) Extend to also calculate and output the amount of paint in gallons needed to paint the wall. Assume a gallon of paint covers 350 square feet. Store this value using a const double variable. (2 pts)
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.514286 gallons
(3) Extend to also calculate and output the number of 1 gallon cans needed to paint the wall. Hint: Use a math function to round up to the nearest gallon. (2 pts)
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.514286 gallons
Cans needed: 1 can(s)
Answer:
#include <cmath>
#include<iostream>
using namespace std;
int main()
{
double height, width;
cout<<"Enter wall height (feet): ";
cin>>height;
cout<<"Enter wall width (feet): ";
cin>>width;
//1
double area;
area = width * height;
cout<<"Wall area: "<<area<<" square feet"<<"\n";
//2
const double gallon = area/350.0;
cout<<"Paint needed: "<<gallon<<" gallons"<<"\n";
//3
cout << "Cans needed :" << round(gallon) << " can(s)";
return 0;
}
Explanation:
This line declares the height and width as double
double height, width;
This line prompts user for height
cout<<"Enter wall height (feet): ";
This line gets user input for height
cin>>height;
This line prompts user for width
cout<<"Enter wall width (feet): ";
This line gets user input for width
cin>>width;
//1 Question 1 begins here
This line declares area as double
double area;
The line calculates area
area = width * height;
The line prints the calculated area
cout<<"Wall area: "<<area<<" square feet"<<"\n";
//2 Question 2 begins here
This line declares and calculates gallon as a constant double variable
const double gallon = area/350.0;
This line prints the calculated gallon
cout<<"Paint needed: "<<gallon<<" gallons"<<"\n";
//3 Question 3 begins here
This line rounds gallon to nearest whole number and prints the result
cout << "Cans needed :" << round(gallon) << " can(s)";
You are configuring two PCs for your network, PC-A is given an IP address of 192.168.1.18 and PC-B is given an IP address of 192.168.1.33. Both PCs receivces a subnet mask of 255.255.255.240A) what is network address of PC-A?B) what is network address of PC-B?C) will these PCs be able to communicate directly wiyh each other?D) what is the highest address that can be given to PC-B that allows it to be on the same network as PC-A ?
Answer:
Explanation:
a) 192.168.1.16
b) 192.168.1.32
c) No
d) 192.168.1.30
Answer:
It’s somethint
Explanation:
what is the purpose of social networking sites
Explanation:
social networking sites allow users to share ideas, digital photos and videos, posts, and to inform others about online or real world activities and events with people in their network.
Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output those four values on a single line separated by a space.Enter integer:99Enter double:3.77Enter character:zEnter string:Howdy99 3.77 z Howdyimport java.util.Scanner;public class BasicInput {public static void main(String[] args) {Scanner scnr = new Scanner(System.in);int userInt;double userDouble;// FIXME Define char and string variables similarlySystem.out.println("Enter integer:");userInt = scnr.nextInt();// FIXME (1): Finish reading other items into variables, then output the four values on a single line separated by a space
Answer:
import java.util.Scanner;
public class BasicInput {
public static void main(String[] args) {
//Create an object of the Scanner class
Scanner scnr = new Scanner(System.in);
//Define int and double variables
int userInt;
double userDouble;
//Define char and string variables similarly
char userChar;
String userString;
//Prompt the user to enter an integer
System.out.println("Enter integer:");
//Store the input in the integer variable
userInt = scnr.nextInt();
//Prompt the user to enter a double
System.out.println("Enter double:");
//Store the input in the double variable
userDouble = scnr.nextDouble();
//Prompt the user to enter a char
System.out.println("Enter char:");
//Store the input in the char variable
userChar = scnr.next().charAt(0);
//Prompt the user to enter a string
System.out.println("Enter String:");
//Store the input in the string variable
userString = scnr.next();
//Output the four values on a single line
//separated by a space
System.out.println(userInt + " " + userDouble + " " + userChar + " " + userString);
}
}
Sample Output:
Enter integer:
>>12
Enter double:
>>23
Enter char:
>>s
Enter String:
>>asdasd
12 23.0 s asdasd
Explanation:
The code above has been written in Java. It contains comments explaining every part of the code. Please go through the comments.
The user documents are stored in _______ format.
The user documents are stored in _______ format.
A. qvd.
B. qvw
C. None of the options
D. qvs.
Answer:
B. qvw
Explanation:
Given the options available, it can be inferred that the application the question is referring to is called QlikView which is a software application that is used for analytics explanation. This software applications saves documents created in a file extension specifically known as "QVW."
Hence, the right answer is that: in QlikView, the user documents are stored in QVW format.
Thus the above answer is right.
Learn more about the QVW format here:
https://brainly.com/question/10205740
When should the architect begin the analysis?
Answer:
Right after the end user and the customer finalize the negotiations.
Explanation:
The architect's analysis is extremely important to ensure that a system acts correctly and efficiently. This analysis is carried out together with the implementation of codes and security systems, which will be responsible for the defense of the system. This analysis should begin immediately after the end user and the customer have completed negotiations that define all the requirements and information necessary to start the project.
What is a characteristic of maintaining logs in a system? A. Logging prevents security violations, but only deals with passive monitoring. B. Logging provides access control by authenticating user credentials. C. Logging helps an administrator to detect security breaches and vulnerable points in a network
Answer:
The correct answer is C
Explanation:
When analysed, logs can help to forestall security breaches to a network it can also help to identify and resolve any vulnerabilities within the system.
Due to the number of logs generated daily, it is almost impracticable to constantly monitor all logs generated by the system.
Cheers!