You can get context-sensitive help information from the Code Editor by_________.A) selecting Contents from the Help menu
B) selecting Index from the Help menu
C) selecting Search from the Help menu
D) positioning the insertion point in a keyword and pressing F1

Answers

Answer 1

Answer:

D) positioning the insertion point in a keyword and pressing F1

Explanation:

In order to get context-sensitive help information from the Code Editor, a user should do the following:

1. call in your code to open the help topic with functions description

2. select the function name and press F1. This will open the topic with the function description

3. a user can view this help in the Microsoft Help Viewer or Web browser, this is based on the Visual Studio IDE Help settings.

Hence, the correct answer is: option D positioning the insertion point in a keyword and pressing F1


Related Questions

Which of the following is the process of writing the step-by-step instructions that can be understood by a computer?

Answers

Answer:

The process should be called an algorithm!

Create a query that will list all technician names, employee numbers, and year hired in order by year hired (Newest to Oldest).

Answers

Answer:

SELECT TECHNAME, EMPNUM, YEAR FROM EMPLOYEE ORDER BY YEAR DESC

Explanation:

The table definition is not given;

However, I'll make the following assumptions

Table Name:

Employee

Columns:

Technician name will be represented with Techname

Employee number will be represented with Empnum

Year Hired will be represented with Year

Having said that; the sql code is as follows:

SELECT TECHNAME, EMPNUM, YEAR FROM EMPLOYEE ORDER BY YEAR DESC

The newest year hired will be the largest of the years;

Take for instance:

An employee hired in 2020 is new compared to an employee hired in 2019

This implies that the year has to be sorted in descending order to maintain the from newest to oldest.

Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see are the top three and why?

Answers

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

You are a network consultant who has been asked to attend an initial meeting with the executive management team of ElectroMyCycle, LLC. ElectroMyCycle manufactures motorcycles. Its new electric motorcycle was just picked up by a large retail chain. ElectroMyCycle is upgrading its manufacturing capacity and hiring new employees. Recently, ElectroMyCycle employees have started saying, "The Internet is slow." They are also experiencing problems sending email, accessing web-based applications, and printing. In the past, when the company was small, it didn’t have these problems. The operations manager outsourced computer services to a local business called Network Rogues, which installed new workstations and servers as needed, provided desktop support, and managed the switches, router, and firewall. ElectroMyCycle is now considering bringing computer services in-house and is wondering how its network should evolve as it increases production of its electric motorcycle. 1. What research will you do before your initial meeting with the executive management team?
1. Find out the industry and status of the industry the client is in.
2. Client’s market share in the industry
3. Financial growth history of the client
4. Client’s suppliers and customers
5. Products and services offered
6. Any recent important news on client’s business strategies or focus
7. What general problems does ElectroMyCycle seem to be experiencing?

Answers

Answer:

ElectroMyCycle, LLC.

The research I will do before my initial meeting with the executive management team will be to find out the following:

4. Client’s suppliers and customers

5. Products and services offered

Explanation:

My research will concentrate on the types of products and services  that ElectroMyCycle is offering its customers and raw materials that it purchases from the suppliers, because the network assets are being installed to enhance business transactions between ElectroMyCycle and its customers and suppliers.  And as the company is expanding with more suppliers and customers, more products and services, the network configuration will be built around these stakeholders.

MLMenu, a natural language interface for the TI Explorer, is similar to __________
a) Ethernet
b) NaturalLink
c) PROLOG
d) The Personal Consultant

Answers

Answer:

The correct option is B: Natural Link

Explanation:

Natural language is also an advanced system like MLMenu. In order to be able to retrieve and derive from present knowledge, it heavily depends on comprehending and producing natural language (and hence it has been named as such!). This technology is advancing and getting better day by day.

Assign secretID with firstName, a space, and lastName. Ex: If firstName is Barry and lastName is Allen, then output is:

Answers

Answer:

I'll answer this question using Python

firstName = input("First Name: ")

lastName = input("Last Name: ")

secretID = firstName+" "+lastName

print(secretID)

Explanation:

This line prompts user for first name

firstName = input("First Name: ")

This line prompts user for last name

lastName = input("Last Name: ")

This line calculates secretID

secretID = firstName+" "+lastName

This line prints secretID

print(secretID)

Answer:

My name is Barry Allen, and I am the fastest man alive. When I was a child I saw my mother killed by something impossible. My father went to prison for the murder. Then an accident made me the impossible. To the outside world, I’m an ordinary forensic scientist, but secretly, I use my speed to fight crime and find others like me. And one day, I’ll find who killed my mother and get justice for my father. I am the Flash.

Explanation:

My name is Barry Allen, and I am the fastest man alive. When I was a child I saw my mother killed by something impossible. My father went to prison for the murder. Then an accident made me the impossible. To the outside world, I’m an ordinary forensic scientist, but secretly, I use my speed to fight crime and find others like me. And one day, I’ll find who killed my mother and get justice for my father. I am the Flash.

Normally used for small digital displays

Answers

Answer:

LCD screens would be used for students using smaller devices in the classroom, like iPads or handheld touchscreens

the task is to ask the user for three numbers and find the average which pseudocode gives you the comment outline for task​

Answers

Answer:

#ask the user for three numbers,

#add the numbers,

#divide by 3,

#print the average

Explanation:

In order to get the average you must add all the numbers together then divide by how many numbers there are

What is one advantage of a magnetic hard drive as compared to a solid state drive?
O It won't be harmed if you drop your computer.
O It spins faster.
O It is open source.
O It is less expensive.

Answers

I’m not 100% sure about this but it it’s D or B

You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solution?a. Use hashes.b. Encrypt it before sending.c. Protect it with a digital signature.d. Use RAID.

Answers

Answer:

B. Encrypt

Explanation:

The data, in this case PI will be encrypted from end to end. which means that only the person with the encryption keys is able to read what is in the message. Also the encryption will keep data in motion encrypted during transport.

You have an array of integers: int myints[10]; and the address of the first integer is be4350. What is the address of myints[1]? myints[2]?

Answers

Answer:

&myints[1] == 0xbe4354

&myints[2] == 0xbe4358

Explanation:

Assuming that sizeof(int) == 4, add 4 bytes for every array element.

Jake is preparing his resume. He is applying for the position of iOS application developer at a large software company. He wants to include his expertise in C++ and Java. Which sub-heading should he use? A. User-centric Design Skills B. Cross-Platform Development Skills C. Modern Programming Language Skills D. Agile Development Skills

Answers

Answer:

C. Modern Programming Language Skills

Explanation:

how do media and networks interact

Answers

Answer:

Media are connected to networks that make information easier to access and pass on.

Multiple Single SNMP managers are communicating with a single SNMP agent in:_____.

Answers

Answer:

many-to-many

Explanation:

Many-to-Many Communication is a term that describes a form of online or over the internet communication whereby numerous users are sending and receiving information, in such a way that the recipient does not have the idea of who the receiver is, and neither does the receiver know who the sender is, even though the information facets frequently connects through various websites.

Hence, Multiple Single SNMP managers are communicating with a single SNMP agent in "many-to-many communication."

Explain a business scenario where management information systems plays a part.

Answers

Answer:

In this article, we'll cover what is happening with MIS in both business and ... is when you're notified or your credit card is frozen, depending on the situation.

Explanation:




analyze the given code

For I = 1 to n

For j = 1 to n

C =[i.j] = 0

For k=1 to n

C[i.j] = c [i.j] + a[i.k] * b[k.j]

End

End

end

Answers

Answer:

Following are the description to the given code:

Explanation:

In the given code, three for loop are used that uses the variable "I, J, and K", which starts from 1 and ends when it equal to the value of the "n".

Inside the "I and J" loop, another variable "C" is defined, which uses "i,j" and assign a value, that is equal to 0. In the "k" loop, it uses the "c[i.j]" to multiply the value of "a[i.k] and b[k.j]".

In other words, we can say, it calculates the multiplication of the matrix and stores its calculated value.

Testing mode identify internal components of a computer.

Answers

Answer:

CPU

Heatsink

Motherboard

PSU

HDD

RAM

GPU (If CPU does not have integrated graphics)

Chassis Fans

Some of the internal components of a computer are CPU, RAM, ROM, etc.

What are the internal components of a computer?

Internal components of a computer refer to the parts inside the computer case that enable it to function properly.

We have,

Some of the internal components of a computer are:

- CPU (Central Processing Unit): This is the brain of the computer, responsible for executing instructions and processing data.

- Motherboard: The motherboard is the main circuit board of the computer that connects all the components together.

- RAM (Random Access Memory): This is the computer's temporary storage space, where data and programs are loaded for fast access by the CPU.

- Hard Disk Drive (HDD) or Solid State Drive (SSD): These are the main storage devices in the computer, where all the data and programs are permanently stored.

- Power Supply Unit (PSU): This is responsible for providing power to all the components of the computer.

- Graphics Processing Unit (GPU): This is responsible for rendering graphics and images, and is particularly important for gaming and video editing.

- Sound Card: This component handles the computer's audio processing and output.

- Optical Drive: This is used to read and write data from optical discs such as CDs and DVDs.

- Cooling System: This includes fans and heat sinks that help keep the components of the computer cool and prevent overheating.

- Expansion Cards: These are additional components that can be added to the motherboard to add functionality, such as network cards, sound cards, or video capture cards.

Learn more about internal components here:

https://brainly.com/question/17475476

#SPJ5

Addition and subtraction are considered to be ____ operations performed by a computer.

Answers

Answer:

Mathematical operations

How do others see technology?

Answers

It honestly depends. A lot of people could have different technology views. Imagine this: you meet 2 people. One person loves technology and the other person fears it.

how do u beat sonic unleashed

Answers

Answer: I guess you gotta do the fast, and then you gotta beat the things up when Sonic becomes even more of a furry ¯\_(ツ)_/¯

Explanation:

Watch playthroughs of the game.

If you see or hear of information in the media or on the internet that you suspect is classified, what should you do?

Answers

Answer:

Do not comment on the information or discuss with unauthorized recipients.

Explanation:

As a rule, it is pertinent to have the knowledge that when working with information that are sensitive, one has to be very careful to know and understand what information to share , what not to share and who the recipient should be.

Unauthorized disclosure is when classified information are transfered to unauthorized persons or recipients. Classified information are information not meant for public knowledge which if disclosed, could undermine national security. To be a recipient of classified information, there must be an execution of approved non disclosure agreement, certification of favorable eligibility must be obtained and also possession of the need to know for the classified information.

8. What is the correct syntax of declaring arrays of pointers of integers of size 10

in C++?

a) int arr = new int[10];

b) int **arr = new int*[10];

c) int *arr = new int[10];

d) int *arr = new int [10];

Answers

Answer:

(b) int **arr = new int*[10];

Explanation:

An array of pointers is simply an array containing pointer variables. These pointer variables may be Strings, integers, doubles e.t.c

To declare such arrays of pointers, for example, of integers, in C++, we write;

int **arr = new int*[10];

The left hand side of the above code snippet i.e int ** arr, suggests that arr is a pointer that points to a pointer to integer variables.

The right hand side i.e new int* [10], creates a new array of 10 integer pointer variables.

Now, put together, int **arr = new int*[10] will create/declare an array of pointers of integers having a size of 10.

Adnan merges the shapes he added to mimic the bridge structure. The modification is shown below. On the left side are a small square above a long rectangle. An arrow points right to where the small square is positioned partly over the top of the rectangle, to look like a bridge pillar. Which tab did Adnan use to merge the shapes? Which Merge Shapes option did Adnan use? Which property of the shapes did Adnan modify?

Answers

Answer:

The insert tab in the menu was used to select the shapes and all the shapes were selected with the shift key plus left-click on the mouse and on the right-click, a menu pops up and the items were grouped.

Explanation:

Microsoft office word is used in creating and editing text documents. It has several functionalities that can be used to convert documents, create tables, draw shapes, format the arrangement of text in the pages, etc.

To use some of the functions like drawing shapes, go to the insert tab and select "add shapes". There, you can find varieties of shapes and formats and it can be grouped or merged by right-clicking on the selected shapes and clicking on the group option.

Answer:

Which tab did Adnan use to merge the shapes? is drawing tools

Which Merge Shapes option did Adnan use? is combine

Which property of the shapes did Adnan modify? is shape outline

Explanation:

i just did the assignment on engenuity2020

Answer gets the brainliest!!! Choose the venues where audiovisual materials can be found today. (Select all that apply.) schools the internet stores businesses doctors’ offices homes

Answers

Answer:

doctors offices

internet stores buisnesses

Explanation:

Audio Visual Materials (AVMs) are those things can be understood by observing visual aspect of anything's. According to The Librarian Glossary (1987) “AVMs as non-book materials like tapes, slides, films which are renewed and recent to rather then read as books.”

The internal LAN is generally considered a trusted zone.
a. True
b. False

Answers

Answer:

Option A:

True

Explanation:

The internal LAN is generally considered a trusted zone because it is only accessible by a limited number of users each with a specific administrative privilege. Reduces the occurrence of threats to the system as most of the users are profiled, documented, and well known.

It is a lot more difficult to hack into an internal LAN because of its closed nature, with only a limited number of devices connected. Tracing the source of a security breach is also a lot easier compared to a Wide Area Network.

Which Compatibility Modes setting is available for Photoshop?

Answers

Answer:

k

Explanation:

Which command displays the contents of the NVRAM?

Answers

Answer:

Explanation:

NVRAM (nonvolatile random-access memory) is a small amount of memory that your Mac uses to store certain settings and access them quickly. And to show the content of the NVRAM

Show startup-config will display NVRAM content

Frame from one LAN can be transmitted to another LAN via the device is:_____.
A) Router.
B) Bridge.
C) Repeater.
D) Modem.
E) None of the above."

Answers

Answer:

B) Bridge.

Explanation:

LAN refers to a local area network in which the network of computer are interconnected in less than an area which is limited i.e. school, university, residence, office building, etc

It is used to share a common line of communication within a less geographic area.

In order to transmit one LAN to the another LAN, the device we called as a bridge

Therefore the correct option is B. bridge

TLO 06 Active Directory Domain and Trusts tool is used to move servers between site in an AD Infrastructure.a. Trueb. False

Answers

Answer:

b. False

Explanation:

Active Directory Domain and Trusts tool is used for the following operations:

1. To increase the domain functional level

2. To increase forest functional level

3. To add UPN suffixes

4. To manage domain trust

5. To manage forest trust.

Hence, the correct answer is: it is FALSE that Active Directory Domain and Trusts tool is used to move servers between site in an AD Infrastructure

An app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. What type of cloud service is he looking for?A. laas(Infrastructure as a Service)B. DaaS (Directory as a Service)C. SaaS (Software as a Service)D. PaaS (Platform as a Service)

Answers

Answer:

Explanation:

We build Database Driven Web Applications tailored to your business. Consulting, UX, Dev. Database Web App Support/Maintenance Experts. Trusted for 15 years. Free Consultation.

Other Questions
The rectangle below has an area of x^2+11x+28x 2 +11x+28x, squared, plus, 11, x, plus, 28 square meters and a length of x+7x+7x, plus, 7 meters. What expression represents the width of the rectangle? 5(3x)-7y2=?,when x=3 and y =2 5) An international company is producing $50 widgets at a cost of $50,000 and is sellingthem for $60,000. If it produces a 51st unit, its total sales will be $62,000 and its total cost willbe $51,500. Should the company produce the 51st unit?6) Hibw will the following events affect the production possibility frontier of an economy?Event A: A large fraction of the work force becomes unemployed.Event B: The productivity of all work force doubles.Event C: The government requires dairy farmers to destroy part of their herds. Which of the following is equivalent equation what method is suitable to determine whether barium is more reactive than calcium What is child labor? What are the causes ofi?? Lindsay is playing a video game.She begins with an initial score of800 points but loses 350 pointthroughout the game. Sherepresents her score using theexpression shown.800 - 350 which of th following is an example of a common topic 1.) anyone can be brave 2.) Freedom takes sacrifice 3.0the box was broken 4.) Bravery HELPP!! Underhill Incorporated manufactures and sells two products: Product Y1 and Product Y0. Data concerning the expected production of each product and the expected total direct labor-hours (DLHs) required to produce that output appears below: Direct Direct Expected Labor Labor Production Per Unit Hours Product Y1 300 6.0 1,800 Product Y0 500 9.0 4,500 Total direct labor-hours 6,300The direct labor rate is $27.50 per DLH. The direct materials cost per unit is $106.10 for Product Y1 and $168.40 for Product Y0. The company is considering adopting an activity-based costing system with the following activity cost pools, activity measures, and expected activity: Estimated Activity Overhead ---- EXPECTED ACTIVITY -----Activity Cost Pool Measures Cost Product Y1 Product Y0 TotalLabor-related DLHs $151,263 1,800 4,500 6,300Production orders Orders $43,253 300 400 700Order size MHs $863,478 4,900 5,000 9,900Total $1,057,9941. What is the overhead applied to each unit of Product Y1 under activity-based costing?2. If the company allocates all of its overhead based on direct labor-hours using its traditional costing method, what is the overhead cost that would be applied to each unit of Product Y1? 5 Simplify (12)(129). Write your answer using an exponent.Explain how you found your answer. How many solutions will there be for a quadratic equation of the form ax2 + bx+c = 0 if the discriminant, b2 - 4ac, is negative?1.)There will be two complex solutions.2.)There will be one real solution.3.)There will be two real solutions.3.)There will be no solutions. a community consists of a single coyote species living along a lake. which of the following describes this ecosystem? A ) the temperate forest in which a lake is located B ) the rocks, substrate, water, and surrounding air C ) all the ducks, meadow voles, monarch butterflies, and other organisms living in and around the lake D ) all the organisms in and around the lake, and the non-living components of the lake According to the law of demand, as prices decrease, the quantity demanded decreases. increases. stays the same. disappears. Marissa is a clinician-in-training who is administering intelligence tests. Her supervisor reminds her that it is crucial that she follow the exact instructions in the administration and scoring of the test each time she administers it. To what important concept is the supervisor referring? Look at the map.Why might Northern Italy have been a good place for the Renaissance to begin?its central location in Europeits location in Asiaits proximity to the Mediterranean Seaits small size compared to other countries Alice needs to rent a car while on vacation. The rental company charges $17.95, plus 15 cents for each mile driven. If Alice only has $40 to spend on the car rental, what is the maximum number of miles she can drive? What does the us constitution provide? Identify characteristics of object-oriented programming design. Choose all that appy The battery in camilles old phone cant last for 4.2 hours .she bought a new phone thats gas battery that can last 60% longer . How long can the battery on camilles new phone last? Natalie works in a department store selling clothing. She makes a guaranteed salary of $300 per week, but is paid a commission on top of her base salary equal to 30% of her total sales for the week. How much would Natalie make in a week in which she made $225 in sales? How much would Natalie make in a week if she made x dollars in sales?