Although IT is crucial to many other daily tasks, other examples of IT systems include the internet, mobile phone networks, broadcast radio and TV systems.
What information technologies use in your everyday life?Information technology has made it possible for people to connect with one another more quickly, simply, and affordably than ever before. Texting and making video calls are so easy these days. There are numerous apps available online that provide these services.
Therefore, radio and phone equipment for video conferencing. Individual computers, For handling goal-setting and performance reviews, use performance management software.
Learn more about information technologies here:
https://brainly.com/question/14426682
#SPJ1
Select the correct answer from each drop-down menu.
Nancy suffers from Repetitive Strain Injury (RSI), a condition that results from repetitive hand movement on a computer. What can help Nancy to reduce the strain from RSI?
To reduce the strain from RSI, Nancy can use___
and ___ regularly.
Answer:
To reduce the strain from RSI, Nancy can use an ergonomically designed keyboard and exercise regularly.
Explanation:
Just makes the most sense dude.
2. When a business practices offensive behavior, you have many options. The option with the loudest voice is
starting a blog
telling your family about their business practice
beginning a lawsuit
choosing to do business anywhere else but with the business whose practices were offensive
This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste
Answer:
Drag or paste (im not 100% sure tho)
Explanation:
PLEASE HELP, Answer Correctly..Will give a bunch of brainlist points
Answer:
se ve muy dificil amiga
Explanation:
Everytime a friend thies. to select something in
Windows, she gets a menue popping up Explain
to her what she is doing whing and why
she
cannot
select the objeto
Answer:
Please write properly your sentence is incomplete
Bernard is creating an inventory of his comic book collection. He has documented the title, publisher name, production year, and
series number for each comic in his collection. He creates a spreadsheet of this information. Typically, each one of these
categories, such as production year, would be contained in:
A: a formula bar.
B: a cell.
C: a row.
D: a column.
Answer:
D: a column.
Explanation:
Since in the question it is mentioned that Bernard wants to develop an inventory. Now he created a spreadsheet of the given information
The categories like production year, publisher name, etc would be contained in a column as it represent the heading under these the year, name of the publisher are written
Therefore the option d is correct
Answer:
D: a columnExplanation:
Typically, each one of these
categories, such as production year, would be contained in a column.
Write a pseudo code to complete the factorial of 5 recursively and print the value on the screen. I’ll mark brianliest
Answer:
number = int(input('Enter number: '))
factorial = 1
for i in range(1, number + 1):
factorial = factorial * i
print(factorial)
You will need to input 5 when you run the code. Or you can add change the "number" to "number = 5"
What is the "thinking work" of the computer? How does it help the computer?
Answer:
El pensamiento computacional es una forma de pensar que utiliza habilidades propias de las ciencias de la computación, como la descomposición y resolución de problemas, lógica, el reconocimiento de patrones y la abstracción
Explanation:
Un computador sirve para guardar los teléfonos de tus amigos, las tareas del colegio, los trabajos de tu papá y mamá y hasta las cartas que le envías a tu novia.
~50 points~
how do you merge shapes in powerpoint
Answer:
Select the shapes to merge. Press and hold Shift to select multiple shapes. The Shape Format tab appears. ...
On the Shape Format tab, click Merge Shapes, and then pick the option you want. The order in which you select the shapes to merge may affect the options shown to you.Explanation:
31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure
Answer:
31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;
a) Something the individual knows;
The Personal Identification Number (PIN)
The password to an account
Answer to a (complete) set of questions
b) Something the individual possesses
An ATM card
A SIM card
Other examples includes;
Physical keys to a lock
Smart cards
Electronic Key-Card used for physical entrance into an apartment
c) Something the individual is (Static biometrics)
The fingerprint
Face recognition
Retina recognition
d) Something the individual does (dynamic biometrics);
Recognition of typing rhythm
Characteristics of the users handwriting
Voice pattern recognition
32) a) Specific account attack
A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password
Countermeasure;
Limiting the number of password guesses
The use of strong passwords having over 8 characters that includes special characters
Use of multi-factor authentication
b) Workstation Hijacking
The attacker takes advantage of an logged-in unattended workstation
Countermeasure;
The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device
c) Password Guessing
Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password
Countermeasure;
The use of a two or more of authentication method also known as a multi-factor authentication MFA
Explanation:
1. Let’s assume you have a folder named “stuff” and you wish to make “stuff” readable and writable for the owner, readable by groups and others, how would you do this?
2. Interpret these permissions: dr-xrw--w-
Owner:
Group:
Other:
Answer:
it is owner
Explanation:
What is F.H.B. an abbreviation for?
Answer:
FHB Fusarium Head Blight
FHB First Hawaiian Bank
FHB First Home Buyer (Australia)
FHB Flexor Hallucis Brevis
FHB Facques Hess Bourbouloux (French administrative company)
FHB Fine Home Building (magazine)
FHB Fetal Heart Beat
FHB Family Hold Back
FHB Fish Hungry boy (Harbinger, NC)
FHB Fédération Hattrick Belgique (French: Belgian Hat Trick Federation; Belgian soccer organization)
FHB Fair Haired Boy
Explanation:
what is the name of the brige
Answer:
hey mate which bridge????
Use the drop-down menus to complete these sentences.
The running of a set of programming instructions multiple times is called
.
If a sequence of code is repeated multiple times, it is referred to as
.
One set of coding instructions processing many different sets of data and eliminating multiple lines of code is an example of
Answer:
The running of a set of programming instructions multiple times is called iteration.
If a sequence of code is repeated multiple times, it is referred to as a loop.
One set of coding instructions processing many different sets of data and eliminating multiple lines of code is an example of Iteration value.
Explanation:
Answers are correct. I got them right.
The running of a set of programming instructions multiple times is called iteration, If a sequence of code is repeated multiple times, it is referred to as loop, One set of coding instructions processing many different sets of data and eliminating multiple lines of code is an example of value of iteration.
What is Iteration?Iteration refers to repeating a certain number of steps continuously until a particular condition is met successfully.
The iterations can be an infinite number of times or an infinite number of times. It all depends on the program in which we are performing the iterations.
Iteration is the repetition of a process in a computer program, usually done with the help of loops.
When the first set of instructions is executed again, it is called an iteration. When a sequence of instructions is executed in a repeated manner, it is called a loop.
Therefore, The running of a set of programming instructions multiple times is called iteration, If a sequence of code is repeated multiple times, it is referred to as loop, One set of coding instructions processing many different sets of data and eliminating multiple lines of code is an example of value of iteration
Learn more about Iteration, here:
https://brainly.com/question/14969794
#SPJ3
What are PowerPoint, word, and paint?
Answer:
Powerpoint is a paid app used to make presentations, word is another paid app mainly used to make letters, paint is an app where you can draw things, you dont need to pay a subscription for this.
Explanation:
According to the video, which tasks do Police Patrol Officers perform? Select all that apply.
providing legal advice
helping lost children
cleaning up hazardous materials
O supervising workers in prisons
enforcing traffic laws
o completing paperwork
Answer:
The answer is B, E, and F
Explanation:
Based on the video, the tasks do Police Patrol Officers perform are:
Helping lost children. Enforcing traffic laws. Completing paperwork..What is the work of police in patrol?Due to advances in technology and the society, work, etc., the reason of patrol is known to be the same as always. They serve to:
The protection of property and lives.The prevention and also detecting crime.Carrying out other services.Learn more about Police from
https://brainly.com/question/26085524
Using a trick or fraud to steal personal information is called (5 points)
A. hacking
B. identity theft
C. netiquette
D. scamming
Answer:
its D
Explanation:
ive done this before i remeber i got d
HURRY GUYS I GOT 3 QUESTIONS LEFT
IM TIMED!!!!!
Which element should be used only when the content simply references the element
a. nav
b. figure
c. hgroup
d. article
The element that should be used only when the content simply references the element is figure. The correct option is B.
What is element of referencing?The four components of the author, date, source, and title are all included in reference list entries.
There are four referencing conventions that are frequently used. They go by the names of the Modern Languages Association (MLA), American Psychological Association (APA), Harvard, and Modern Humanities Research Association (MHRA) systems.
In computer programming, a reference is a value that allows a program to access a particular piece of data indirectly, such as the value of a variable or a record, in the computer's memory or in another storage location.
As a result, accessing the data is referred to as dereferencing the reference, and the data is referred to as the reference's referent.
Thus, the correct option is B.
For more details regarding elements of referencing, visit:
https://brainly.com/question/28270502
#SPJ2
9.4 edhesive code practice
Answer:
What do you mean by 9.4 edhesive code practice
Explanation:
i just don’t understand
A school principal trying to find out if parents will help buy new playground equipment shows digital leadership by
Answer:
I would say either working for money to help or ask your parent to help but you should do chores in return
Explanation:
its nice to help
Identify two way in which ICT has impacted the education sector. *
Answer:
ICT has made learning easy and has also increased the reach of education
Explanation:
Two major impact of ICT on education sector are as follows -
a) ICT has made learning easy. They can now visualize the concept which were earlier taught through books. Now a days teacher uses ICT component such as computers, projectors and printers to teach with pictures and videos
b) It has increased the reach of education. Anyone with a computer/laptop anywhere can study through online classes.
What file format would be required a coworker need to edit a layer in a photoshop file 
-png
-psd
-pdf
-jpeg
This OS integrated the processing power of Windows NT with the easy-to-use GUI of Windows 98.
Windows Millennium Edition
Windows 2000
Windows for Workgroups
Windows 3.11
What does a hanging indent look like?
The right and left edges of the paragraph are evenly lined up.
The first line of a paragraph is perfectly lined up with the lines below it.
The first line of a paragraph starts farther to the left than the lines below it.
The first line of a paragraph is indented more to the right than the lines below it.
Answer:
Option C, The first line of a paragraph starts farther to the left than the lines below it.
Explanation:
In a hanging indent (which is opposite of the normal paragraph), the first line of the paragraph is lined up with the left margin while the lines below the first line will indent one-half inch from the left margin.
Hence, option C is correct
Write qbasic program to input length in centimeter and calculate its length in meter
Answer:
INPUT ”Enter length in centimetres” ; C
C = M / 10 //divide by 10
PRINT “ Length in metres is ”; M
END
Explanation:
Professional communication must be objective,
, and unemotional.
technical
informal
rational
Answer:
rational
Explanation:
which type of protocol allows for a secure data transmission using encryption methods?
Answer:
The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection
100POINTS!!!!
Which tool would you use to organize the list from fewest calories to most calories?
Which tool would you use to organize the list from most protein to least protein?
Which tool would you use to show only fruits with 4 or more grams of dietary fiber?
Which tool would you use to navigate to C5, the cell containing the grams of sugar for an orange?
Answer:
Explanation:
Which tool would you use to organize the list from fewest calories to most calories?
✔ sort by calories from smallest to largest
Which tool would you use to organize the list from most protein to least protein?
✔ sort by protein from largest to smallest
Which tool would you use to show only fruits with 4 or more grams of dietary fiber?
✔ filter
Which tool would you use to navigate to C5, the cell containing the grams of sugar for an orange?
✔ Go To
The answer is in the picture
Heres a survey
What's your fav food
What do you do for a living
What do you do for fun
Are you a boy or girl
What's your fav color
And last what kind of pet do you have if you dont have a pet then whats ypu fav game to play
food.
I'm a child of God snatching lost souls out of Hell
bake
I go to church
some is to much information to give thx and have a blessed day
Answer:
My favourite food is pizza.
I have food, I drink water and stay neat to live.
I play indoor games, read books and plays social media for fun.
I am a girl.
My favourite colour is black and white.
I have a dog name Freddie and a cat called Jacky. My favourite game is football and badminton
Difference between Hollerith and Burroughs machine
Explanation:
The tabulating machine was an electromechanical machine designed to assist in summarizing information stored on punched cards. Invented by Herman Hollerith, the machine was developed to help process data for the 1890 U.S. Census. Later models were widely used for business applications such as accounting and inventory control. It spawned a class of machines, known as unit record equipment, and the data processing industry.
Herman Hollerith (February 29, 1860 – November 17, 1929) was an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting. His invention of the punched card tabulating machine, patented in 1884, marks the beginning of the era of mechanized binary code and semiautomatic data processing systems, and his concept dominated that landscape for nearly a century.
Hollerith founded a company that was amalgamated in 1911 with several other companies to form the Computing-Tabulating-Recording Company. In 1924, the company was renamed "International Business Machines" (IBM) and became one of the largest and most successful companies of the 20th century. Hollerith is regarded as one of the seminal figures in the development of data processing.