You can click the tabs at the bottom of a workbook to switch between.

Answers

Answer 1
Notes or screens? I think

Related Questions

A department requires access to the database application from monday to friday, 9am to 5 pm. last thursday at 1 pm, the application crashed, and it took six hours to fix the problem. what was the availabilty of the application during the week

Answers

Answer:

90%

Explanation:

90%

ELO 4.2 A department requires access to the database application from Monday to Friday, 9AM to 5 PM. Last Thursday at 1 PM, the application crashed, and it took six hours to fix the problem. What was the availability of the application during the week?

when working with track changes, what is the difference between simple markup and all markup?

Answers

The single markup gives distraction free view to the document, while all markup gives the visible  inline changes in the document.

What is a markup in Microsoft word?

Markup in Microsoft Word or MS word is the review setting that tracks the changes and the comments in the word with every character.

The single markup is given as the distraction free view of the changes to the reader, with the recording of all the changes in the document. The all markup option will show the changes in the document with different lines and color thereby tracking changes.

Learn more about markup in word, here:

https://brainly.com/question/1419927

#SPJ1

A multinational bank has many branches. A bank has large volumes of financial data to be analyzed. Therefore, a
server will be useful in such a set up. In addition, a
topology is preferable in a bank because the number of employees will keep increasing.

Answers

Answer:

34tr4

Explanation:

34tg

____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

Answers

Answer:

Network forensics

Explanation:

hide the most valuable data at the innermost part of the network.

How do we distinguish between remote and local information sources? give an example of each source? i'll give brainliest answer for who every answer it right

Answers

A local server means that you have a server setup on your current machine. A remote server is ran on a different machine

How is effective communication defined as it applies to media?
O The end user delivers the intended message.
O The end user receives the intended message.
O The end user records the intended message.
O The end user agrees with the intended message.

Answers

Answer:

B, if the person you're sending to doesn't get the point it isn't effective. The sender will always know what they're sending but if the person who gets doesn't understand then it doesn't work. They don't need to agree to it for them to understand the message.  

Explanation:

What are the real-life applications of coding? at least 5 to 6 lines anyone

Answers

The real-life applications of coding is that they are used in:

Traffic LightsCoffee Machines, etc.

What are useful applications of codes?

Coding is known to be a tool that helps to make  a composition of instructions that a computers needs to follow.

Note that in real life, Coding helps programmers to create programs, such as websites and apps that are used in Traffic Lights, etc.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

The technique for locating the source of an error is to set up _____, which are locations where the browser will pause the program, allowing the programmer to determine the error at that position.

Answers

Answer:

I think the best fit for this would be Break points

Explanation:

Break points are useful for debugging a program. When line the break point is on executes, it pauses the program. In most IDEs it will show the call stack, all local variables, and other debug information, with break points you can step through your code to determine what is going on. Some IDEs have conditional break points where the break point only executes if the condition is true.

The technique for locating the source of an error is to set up Break points, which are locations where the browser will pause the program, allowing the programmer to determine the error at that position.


E-mail messages create a
permanent record than other forms of business communications.

Answers

Answer:

Explanation:

Business correspondence, like oral speech, refers to the verbal form of business communication. However, the message on the printer has a number of absolute advantages over oral speech. In particular, the compiler has the opportunity to put his thoughts in order and, if necessary, correct the message. More precise constructions than oral ones. In addition, the recipient has the opportunity to read the messages at any time.

For the effective conduct of business correspondence, it is necessary to know and be able to apply the norms of official correspondence, the creation, design and organization of work with letters. At the same time, it should be remembered that a business letter, like any other document created in an organization, is an achievement of its image. In order for business communication to be sufficient, it is necessary to know all the components (including, of course, business correspondence), possession covers communicative competence. The material carrier of business correspondence is a business letter.

A business letter is a document used for transmission over a distance between two correspondents, there is a place for both legal entities and individuals. The concept of "business letter" is used for the generalized name of documents of different content, drawn up in accordance with GOST, sent by mail, fax or other means. At the same time, a document is information about a material carrier that has legal force. The specifics of a business letter and its differences from documents such as a contract or an order are described in that it is less strictly regulated, but, as was said, has legal force. Therefore, letters are registered and found in organizations as outgoing and incoming documentation.

The classification of business correspondence matters in terms of significance: the appointment and discovery of documents, their seriousness and urgency, identification in solving problems, identification of the material availability and reliability of registration, etc. For the solution of business correspondence, the application of documents to the system of management documentation and categories of messages that are acceptable over communication networks is essential. The list of grounds, according to the content, the systematization of business correspondence can be applied, is very extensive. We give a classification of business correspondence according to its main basis.

A core value of _____ is the prevention of the occurrence of errors in a product or service rather than detection and correction.

Answers

A core value of Total Quality Management is the prevention of the occurrence of errors in a product or service rather than detection and correction.

What is Total Quality Management?

Total Quality Management (TQM) is a control framework primarily based totally at the notion that a company can construct long-time period fulfillment with the aid of using having all its members, from low-stage employees to its maximum rating executives, attention on enhancing high-satisfactory and, thus, handing over patron satisfaction.

Along every step of the manufacturing process (from sourcing for uncooked materials, via the producing and transport stages, to the customer support stage), mistakes are constantly detected and eliminated to make sure that the very last product that is going to the client is of the very best viable high-satisfactory.

Read more about the manufacturing :

https://brainly.com/question/26373150

#SPJ1

What is a benefit of being a member of a professional organization?

Answers

Answer: A benifit of being a member of a proffesional organzation is you can refresh your knowledge by acquiring new skills through workshops, seminars, and conferences.

Explanation:

Write a program that takes a 10-digit phone number and adds a hyphen in the correct location. Using an input field for the user to enter the information. Also, use a string for instructions on how to enter the phone in the input field.

Answers

The python program will request for a ten digit number from the user and formulate a real phone number from it.

How to write a python program to form a real phone number?

The program is written in python.

Therefore,

x = input("please write a ten digit number: ")

if len(x) == 10:

    a = f"({x[0:3]})"

    b = x[3:6]

    c = x[7:]

    print(a + " " + b + "-" + c)

Code explanation:The variable x is used to store the user's input.If the length of x is equals to 10, then we get the first three terms in bracket, the second three terms and the last 4 terms.Finally, we use delimiters to join the variables as required and print it out.  

learn more on python here: brainly.com/question/13462052

#SPJ1

You are asked to optimize a cache design for the given references. there are three direct-mapped cache designs possible, all with a total of eight words of data:

Answers

Answer:

Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with

Explanation:

Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with

What is one possible consequence of risky sharing

Answers

Answer:

B. Difficulty in your everyday relationships.

Explanation:

This is the only reasonable answer to this question.

Difficulty in your everyday relationships is one possible consequence of risky sharing, hence option B is correct.

How do relationships state risky sharing?

Risk sharing is the difficulty that you share with your partner to prevent the loss and make benefits. In companies for preventing risk, they deploy premium policies.

In a relationship, if it observes difficulties in the relationship are shared with the partner it prevents their loss and makes benefits. This is the indiscriminate private information sharing by any person which relates to privacy.

In risky sharing if anyone shares your private information, address, image, and videos it is risky for you.

Therefore, difficulty in your everyday relationships is the result of risky sharing.

Learn more about risky sharing, here:

https://brainly.com/question/30565341

#SPJ2

____ management is designed to replace or change parts of the operating system that need to be enhanced or replaced. a.Patch b.Kernel c.OS d.VFS

Answers

Patch management is designed to replace or change parts of the operating system that need to be enhanced or replaced.

What is Patch management?

This is known to be the act or process of sharing and applying updates to different kinds of software.

Note that Patch management is designed to replace or change parts of the operating system that need to be enhanced or replaced.

Learn more about Patch management from

https://brainly.com/question/16270302

#SPJ4

Choose the terms that best complete the sentence.
a
usually has faster connection and transmission speeds than a
.

Answers

A local area usually has faster connection and transmission speeds than a Wide area.

What is local area address?

The term LAN means Local Area Network as it is one that helps to link shared resources and Internet connection.

Note that A local area usually has faster connection and transmission speeds than a Wide area as it covers only a small area of place.

Learn more about  local area  from

https://brainly.com/question/25192887

#SPJ1

Help me with this question please

Answers

[tex]nested \: selection[/tex]

Explanation:

When the algorithm takes more than one decision before carrying out a task

Which email protocol allows an email client to download email messages to the local computer?.

Answers

Answer:

The protocol is called Post Office Protocol version 3(POP3)

Explanation:

Hope this helps!

Write a script that creates a user-defined database role named paymententry in the ap database. give update permission to the new role for the vendors and invoices table, update and insert permission for the invoicelineitems table, and select permission for all user tables.

Answers

Answer:

USE AP CREATE ROLE PaymentEntry

GRANT UPDATE, DELETE ON Invoices TO PaymentEntry

GRANT UPDATE, INSERT ON InvoiceLineItems TO PaymentEntry

EXEC sp_AddRoleMember db_datareader, PaymentEntry

Help me with this two questions please

Answers

Answer:

1 is def... don't know about the other one though sorry

the ________ is part of the processor that manages the movement of data through the cpu.

Answers

Answer:

The control unit is part of the processor that manages the movement of data through the cpu.

Explanation:

a colleague shared an excel file with you, and you want to display a worksheet that is hidden in it. how can you do that?

Answers

The hidden worksheet can be made visible with the right click on any worksheet and select unhide.

What is a worksheet?

A worksheet in Microsoft Excel is the collection of the rows and column that has been used to organize data. The collection of worksheets is called workbook.

The hidden worksheets are not visible in the workbook, and if an individual wants to unhide the hidden worksheet, he must right-click on any worksheet and select unhide.

Learn more about worksheet, here:

https://brainly.com/question/1024247

#SPJ1

Kai recently graduated from college with a dual degree—a Bachelor’s in Game Design and Development and a Bachelor’s in Music. The goal is to find a job that will use both degrees, and there is an interview at a video game design studio tomorrow. Kai would love to be in charge of planning, authoring, and implementing the soundscape for games, including sound effects, music, and dialogue. What role at the video game studio would be a good fit?
character rigger

audio designer

artificial intelligence programmer

cinematic artist

Answers

Audio designer

Audio designers plan , sound effects, music and pretty much anything that has to do with sound in a video game

a student is going to e-mail a file she has created and needs to reduce the file size. what tool should she use to reduce the file size?

Answers

Answer:

Compress the file to reduce the file size.

Which email protocol allows an email client to read mail stored on the mail server?.

Answers

Answer:

Internet Message Access Protocol (IMAP)

Explanation:

IMAP is used to read emails stored on a mail server, whereas POP3 allows the user to download the email onto their computer.

Hope this helps!

what are the 3 components that make up the ribbon for microsoft?

Answers

Answer:

1. Quick access toolbar (QAT)

2. tabs

3. command buttons

Explanation:

hope this helps:)

Date Underline the correct answer from the options. 1. How many basic input devices does a desktop computer have? .. a)2 b)3 c) 1 d)4 2. The computer equipmentwhich feeds the computer with data is called. a) Storage device b) Processing device c) Diskette d) Input device 3.When an output is displayed in a printed form it is termed as a) Softcopy output b) File c) Document d) Hardcopy output
4. Which computer device will convert human voice into digital voice? a) Projector b) Loudspeaker c) Microphone d) Joy. 5) All the following are hardcopy output devices except a) Photocopier b) Printer c) Projector d) Plott​

Answers

Answer:

1. 3

2. D (Input Device)

3. B (File)

4. C (Microphone

A(n) ___ provides abstract methods and no other code. a. abstract class b. interface c. polymorphic class d. base class

Answers

Answer:

Abstract class.

Explanation:

I think it’s this because, the abstract class has no body.

If you were referencing an e-book what would be the proper citation format?.

Answers

Answer:

Use the standard in-text citation format of author's surname and year of publication to cite an ebook in your work. Include the author's last name and first initial, the year of publication, the italics title of the book, as well as the retrieval information or DOI number in an APA reference list entry.

Hope this helped you! I would appreciate a Brainliest if you wouldn't mind.

can I have some help?

Answers

I believe its A as the image provided says plain message
Other Questions
(Multiple Choice) Solve In (2x + 3) = 7.Round to the nearest thousandth.A-1095.133B-549.817C-1099.633D-546.817 how know ???????????? What is the newest code language? Calculate.35 C12Note: nCr=r(n=r)!n! How does Miss Brills tendency to eavesdrop on conversations contribute to a theme in Miss Brill?It develops the theme that people may be hurt by the way others perceive them.Miss Brill is reminded that it is never too late to find love in life.Miss Brill learns a lesson about the negative outcome of sharing gossip.It develops the theme that it is important to respect the personal space of others. PLEASE ANSWER ASAP! What is the slope of the line given by the equation? (Enter your answer as a decimal if necessary)y= 2.25x+ 2.44 Which type of evidence was used to tie Ted Bundy to the murder of Lisa Levy? Look at the corners of the shape below. Which of the following points is located at one of the corners?(1,6)(2,2)(6,1)(1,7) #7 HELP ME IM STUCK ON THIS Ramona ______________________ bastante para el examen de ciencias.estudiarestudiadoha estudiadoha estudiando What is the area of the circle?(3.14 for pi) Find the missing digit for the following bank identification numbers: 71100139 32100056 PLEASE HELP WILL GIVE BRAINIEST HELPPP!!!! The elements magnesium (mg) and calcium (ca) play vital roles in maintaining human health, including processes like bone building. the majority of americans have lower levels of magnesium than health experts recommend. do some research in order to propose a possible hypothesis that could explain this phenomenon. 2. Describe the role of the following in maintaining a constant body temperature in humans:(c) The thyroid gland: European efforts to colonize South Asia in the late 1800s were successful primarily due to why is the ring around saturn How do you do this? what is the difference between mutualism and commensalism? How could interspecific competition lead to evolutionary change?