Answer:
1.It is used for draw the table, making results and assignments etc.
2.It is used for lining
Explanation:
Hope it helps
#CARRYONLEARNINGhow to check amazon gift card balance without redeeming
Answer:
Follow these steps to check your Amazon gift card balance without redeeming.
1. Locate the gift card's claim code. The claim code is on the back of the card (if it's a physical gift card) or on your email or paper receipt (if it's an electronic gift card). The claim code will be 14 to 15 digits long. If it's a physical gift card, you may need to scratch off the protective coating to find the claim code.
2. Sign in to your Amazon account. You can sign in through the website or the mobile app.
3. Search for the word 'help'. Click the search bar, type 'help', and press Enter or Return to search.
4. Click 'Help and customer service'. This option is located at the top of the screen.
5. Talk to a customer support agent.
Mobile app:
Scroll down and click 'Need More Help?'.Click 'Contact Us'.Click 'Something else'.Click 'I need more help'.Computer:
Click 'Something else'.Click 'I need more help'.
6. Type 'find the balance of a gift card without redeeming' into the message box. Send the message.
7. Request the balance of your Amazon gift card. Provide the claim code and request the balance. The support agent will check the gift card balance associated with the claim code and provide it to you without redeeming the card.
A student is writing a research paper on astronomy. His teacher has asked that she include a visual aid to explain the scientific concepts in her paper. She has chosen to write about the moon, and she wants to use a visual aid to show what the surface of the moon looks like.
Which visual aid would best support her topic?
Janet is playing a game in which she interacts with an environment to solve a puzzle and to meet new characters. She really enjoys this game because there are no time constraints or pressure to perform with speed. What genre of game is Janet most likely playing?
A. simulation
B. action
C. adventure
D. sports
Answer:
C. adventure
Explanation:
Can someone plss help me with this!!
Answer:
Text
Explanation:
There is no text in between the <h1> and </h1> tags.
I hope thats correct.
12. Your project specifications call for a business rule that the database design can't
enforce. What tool should you use to enforce this business rule?
A. Trigger
B. Weak entity
C. Exception
D. Lookup entity
A lot of business rules needs to be triggered so as to run.
In making of business rule, one can select triggers to run some specific events or run using some particular specified frequency.
The trigger options differs based on the type of rule you are interested in. One can also use multiple triggers when using a single rule.
Learn more about rules from.
https://brainly.com/question/5707732
Please Answer ASAP!!
You must attempt to read past the end of the text file before any end-of-file indicators are set
True
False
Answer:
I think it's true
Explanation:
Sorry if it's wrong :(
A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer�
Question 14 options:
Malicious
Algorithm
Static
Web Browser
Answer:
Algorithm
Explanation:
I WILL GIVE BRAINLIEST TO WHOEVER HELPS ME
I keep pressing the "fn" key or "function" key and the disable / enable touchpad button
fn + f9 = enable/disable touchpad
but all it's doing is disabling it, everytime I press to enable it just keeps saying "touchpad has been disabled"
Assuming you're using Windows 10/11, navigate to settings --> Bluetooth and settings --> Touchpad (Or just search Touchpad on your search bar) --> Toggle the touchpad on.
Hope this helps! :)
A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:
Compatibility
Prototype
Packet
Static
Answer:
Compatibility
Explanation:
that's the definition of compatibility.
PLZ HELP! 50 POINTS!!!! Which device is used to change a signal into a code?
Group of answer choices
an encoder
an antenna
a wave
Answer:
It should be an encoder.
Explanation:
hope this helps and sorry if its wrong
What does setTempo() allow you to do in EarSketch?
Question 7 of 10
What are the three main parts to a slide presentation's structure?
A. Thesis statement, supporting evidence, and concluding quotes
B. Main idea, body, and summary
C. Introduction, body, and conclusion
D. Body, conclusion, and references
Answer:
A
Explanation:
HELP PLEASE!!
which of the following is document content that displays at the top of every page?
Explanation:
that is a trick question if you need help ask your teacher
Answer:
Title
Explanation:
Which of the constraints listed below would be considered a physical constraint
-Materials
-Demand for product
-Timeline
-Cost
3- It is an Information page that is displayed through one of the Internet browsers, it can be saved along htm, html page.
a. Dynamic website
f. Static website
b. Ecommerce site
c. Social media sites
Answer:
f. Static website
Explanation:
HTML stands for hypertext markup language. It is the standard markup language for web pages that define the structure of the content. These elements are the building blocks of any website.
HTML (Hypertext Markup Language) is the code that is used to structure a web page and its content. For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data tables.
Static web pages are often HTML documents stored as files in the file system and made available by the web server over HTTP (nevertheless URLs ending with ". ... Static web pages are suitable for content that never or rarely needs to be updated, though modern web template systems are changing this.
Which steps allow a user to change the column layout in the Handout Master?
Answer:
D. Click the View tab, select Handout Master, and choose the number of columns in the Slides Per Page drop-down list.
Explanation: correctEdg
a program is under development to keep track of a clubs members
Answer:
Keep a chart with you
Explanation:
You could right something along the lines of:
To keep track of the members in the club, I'll(we'll) have them write their names down on a chart so we don't forget. I(we) could also just do a thing where I(we) plan everything out beforehand and I(we) have been keeping track of the members.
You could right something along the lines of:
Since the program is under development, I(we) could tell everyone in the club to put their names on a spreadsheet and I(we) could start developing the program further that way.
help me pleaseeeeeeee
Answer:
I think you have to ask to your parents
i need freinds.:(plz
Answer:
Explanation:
sure wassup
Answer:
i'll be your friend!
Explanation:
write 10 place where computer use and it uses
Answer:
dynamite ohohoh
Explanation:
nânnananananananann eh
Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.
The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.
Secure Copy (SCP) is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network. PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.
Learn more about the PuTTY package from
https://brainly.com/question/13171394
....................................................................................................
Answer:
......................
..............
......
....
...
..
.
This type of RAID implementation uses its own Central Processing Unit (CPU) for calculations on an intelligent controller card by:
RAID implementation uses its CPU for calculations on an intelligent controller card by a hardware implementation.
Basically, a hardware implementation refers to a job is done using a physical device or electronic circuit rather than been done automatically by the computer program.
Hence, through a hardware implementation, the RAID implementation is able to use its CPU for calculations on an intelligent controller card
Read more about hardware implementation
brainly.com/question/25803633
is there actually a difference between left and right twix
Which of the following statements best explains how multitasking works in the human mind?
Answer: He's right
Explanation: I got the answer too
How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?
Answer:
you can take guide from
hope this will help you....!
differentiate between program virus and boot sector virus
Answer:
The virus replaces the default program with its own corrupted version. A boot sector virus is able to infect a computer only if the virus is used to boot up the computer. The computer will not be infected if the virus is introduced after the boot-up process or when the computer is running the OS
Explanation:
please mark me brainlisted answer please
Explanation:
i don't know this but i just need the points
What does // this mean in your code?
Floor division
For example:-
11//5=2Some more :-[tex]\boxed{\begin{array}{c|c}\sf * &\sf Multiplication \\ \sf ** &\sf Exponention \\ \sf \% &\sf Remainder \\ \end{array}}[/tex]
Which of the following adds digital elements to a live view, often by using the camera on a smartphone? O Augmented reality O Forecasting O Problem-solving O Virtual reality
Answer:
augmented reality
Explanation:
think "pokemon go" when youre relaxing with your buddy and you feed it berries
In 1981, Ian Murphy broke into the AT&T online computer system and changed their clocks, allowing people to make calls during the day at a discounted rate. Based on the list of defining factors for computer crimes, what best describes Murphy's crime?
A.
intentionally disrupting, degrading, or destroying information or services on a computer
B.
disclosing any data or information obtained through illegal online activity
C.
knowingly receiving or holding onto any data or information obtained through illegal online activity
D.
intentionally or recklessly tampering with, taking, transferring, concealing, altering, or damaging physical computer equipment