Answer:
A bookmark
Explanation:
A bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as “favourites.” Boolean operators Most search engines (e.g. Go.ogle) allow you to limit your search or make it more specific by using words such as “and”, “or” and “not”.
An IT security threat is anything that might cause serious harm to a computer system.
Question 16 options:
True
False
Answer:
True
Explanation:
this is true because a threat can endanger the computer and its system
Please Answer ASAP!!
You must attempt to read past the end of the text file before any end-of-file indicators are set
True
False
Answer:
I think it's true
Explanation:
Sorry if it's wrong :(
what is control structure write it's types .
Answer
Defination-:
A control statement is a statement and a statement whose execution its control.
Types-:
Selection StatementIteration StatementUnconditional branching StatementWRITE A PROGRAM TO CALCULATE SIMPLE INTEREST
Instructions to do the program:-
The output format of the program should be as shown below:
P = 2000
R = 8
N = 4
Simple Interest = 640
pls help
The simple interset program is a sequential program, and does not require loops and conditions
The simple interset program in Python, where comments are used to explain each line is as follows:
#This gets input for the principal amount
P = int(input("P = "))
#This gets input for the rate
R = int(input("R = "))
#This gets input for the number of years
N = int(input("N = "))
#This calculates the simple interest
I = P * R * T * 0.01
#This prints the simple interest
print("Simple Interest =",I)
Read more about simple interest at:
https://brainly.com/question/2294792
Michaela has been tracking the temperatures of the dirt, pond water, and air near her home for a science investigation. She is ready to analyze the data to prepare for her science report. Based on each application’s strengths and weaknesses, which one would be the best to choose for this task?
Answer:
The science of investigation
Explanation:
hope it help
2. It serves as the foundation of all crochet work. a. Chain stitch C. double treble b. Treble stitch d. slip stitch
Answer:
a. chain stitch
because the foundation of so many crochet patterns involved a chain of × stitches followed by working sc/dc into the chain
If you are in the Slide Master view, what are the steps to add headers and footers?
Answer:
THat is the correct order.
Explanation:
Sort the layout options for two types of masters in PowerPoint.
Answer:
The program photo is showing the correct answers and the correct place for the two that you missed.
Explanation:
Answer: ANSWER IS SHOWN CORRECTLY
Explanation:
I REALLY HOPE IT HELPS YOU!!!!!!!!!!!!!
THANK YOU & BE SAFE TOO!!!!!!!!!!!!!!!
Kari needs to change the brightness and contrast on an image she has inserted into a Word document. Which group should she use to do this? Adjust Picture Styles Arrange
Answer:
adjust
Explanation:
it can be found in the top left corner
You arrive at school on Friday for a field trip ! What a lucky day!You need to figure out what room you are in before leaving. You notice there are rosters on each door . What do you do to find your correct room?
If the roster were sorted alphabetically by last name , would that change how you found your correct room ?
Answer:
Look for the first letter of your last name
Explanation:
computer science
describe 3 differences between the checksum and check digit:
Answer:
A check digit, also known as a checksum character, is the number located on the far right side of a bar code. The purpose of a check digit is to verify that the information on the barcode has been entered correctly.
A check digit, even comprehended as a checksum character, stands for the number found on the far right side of a bar code. The intention of a check digit exists to confirm that the information on the barcode contains been documented accurately.
What are the differences between the checksum and check digit?A checksum in public can be any size, although generally, they exist some suitable number of bits for computation, such as 32. The more extensive the checksum, the wider the range of errors it can capture. For instance, the checksum utilized for credit card numbers will notice changed digits that exist after each other, but not reversed digits that exist split by a single digit.
All cryptographic hashes (like MD5, SHA, etc.) can be utilized as checksums, but not all checksums exist cryptographic. CRC-type checksums aren’t cryptographic, but they’re extremely quick to calculate, and so they exist generally utilized for things like hard drive checksums where you don’t require the cryptographic functionality, but you accomplish want to notice an extensive range of probable errors.
To learn more about checksum and check digit
https://brainly.com/question/14789699
#SPJ2
which computer language uses short words known as mnemonics for writing programs?
Janet is playing a game in which she interacts with an environment to solve a puzzle and to meet new characters. She really enjoys this game because there are no time constraints or pressure to perform with speed. What genre of game is Janet most likely playing?
A. simulation
B. action
C. adventure
D. sports
Answer:
C. adventure
Explanation:
Q44. Cell A20 displays an orange background when its value is 5. Changing the value to 6 changes the background color to green. What type of formatting is applied to cell A20
The type of formatting that is applied to cell A20 is called conditional formatting.
Conditional formatting in Excel Sheet enables an easier method of highlighting noteworthy cells or ranges of cells, displaying data by employing data bars, color scales, and icon sets that match particular variations in data.
A conditional format modifies the look of cells based on the conditions you set. The cell range will be formatted provided that the conditions are true; if otherwise, it will be false and the cell range will not form.
Learn more about conditional formatting here:
https://brainly.com/question/25051360
The navigation items for a Lightning app are available on mobile: A. In a special mobile configuration in the navigation menu and in Favorites B. In the profile menu, when in the app C. In the navigation menu and the first four items of the navigation bar, when users are in the app D. In the App Launcher Check the Quiz to Earn 100 Points
Navigation items are used for moving from one part of the part to a destination using actions and also for passing information. The right option is C. In the navigation menu and the first four items of the navigation bar, when users are in the app
There are different methods/ways to implement the Navigation component in a mobile application, we have the following type of Navigation Implementation
Bottom NavigationDrawer Navigation(Slides from Left to right)Top NavigationLearn more about Navigation here:
https://brainly.com/question/8908486
Which of the following is Tynker an example of?
Group of answer choices
database
flowchart
Integrated Development Environment
binary code
Answer:\
Integrated Development Environment
hope it help
Answer:
C
Explanation:
i did the test
Oil refining is an example of:
Construction Production
Extractive Production
Domestic Production
Traditional Production
Answer:
i think the answer is B but i could be wrong...
Answer:
Extractive production
Explanation:
See
Oil refining denotes to after oil extraction situationFirst oil is extracted then gets refinedSo it's extractive productionwhere deep convolutional neural network is used in real life
Answer:
Business applications of Convolutional Neural Networks. Image Classification - Search Engines, Recommender Systems, Social Media. Face Recognition Applications of RNN is Social Media, Identification procedures, Surveillance. Legal, Banking, Insurance, Document digitization - Optical Character Recognition.
How many things can a computer compare at one time?
Answer: billion of items at one time
Explanation: The computer is very capable of comparing items bulk at one time
Linear gameplay is sometimes also known as “campaign mode” or what mode?
A. skirmish mode
B. battle mode
C. story mode
D. cyclical mode
Answer:
Story Mode
Explanation:
The game has a clearly-defined beginning, middle, and end, also known as campaign or story mode.
Answer:
C
Explanation:
Choose one scene or object to photograph. Take and submit at least three photographs of this scene at three different times of day. Be sure to note the times of day that you choose. Write a brief response about how the light changed in the photograph.
Take and submit photographs of someone using frontlighting, backlighting, and sidelighting. You can use the sun or other lighting.
Practice taking photographs on a cloudy or rainy day. Turn in three of your favorites from that practice.
Take some portrait photographs using a reflector. (Remember that white paper, poster board, sheets, or a wall can all act a reflector.) Practice moving the subject in different positions relative to the reflector. Turn in three of your favorite photographs.
Practice taking photographs in different lighting conditions (indoors and outdoors, different times of day, different weather, and so on) to help you better understand the impact of light on your photographs. Turn in three of your favorite photographs from your practice sessions.
Answer:
i dont get what you mean
Explanation:
HELP PLEASE!!
which of the following is document content that displays at the top of every page?
Explanation:
that is a trick question if you need help ask your teacher
Answer:
Title
Explanation:
10. What Microsoft program is frequently used to develop pictorial representations
of a database's logical relationships?
A. Visio
B. Access
C. Excel
D. Word
Answer:
A. Visio
It's a "powerful tool for diagramming needs". In other words, pictures.
what type is the combination of an integer and a string
Answer:
Concatenation.
Explanation:
What is the default folder for text file
documents or download
It depends where you install it to
Answer:
numbers are stored as characters
Explanation:
currently saved in if another folder
in addition to good design sense, what else do web designers need to be proficient in?
In addition to good design sense, web designers need to be proficient in front-end coding languages.
A web designer refers to an individual who is saddled with the responsibility of writing executable codes (instructions) for the design and development of a website, especially by using a hypertext markup language (HTML).
Generally, it is expected that all web designers a good design sense in website development. Additionally, web designers need to be proficient in front-end coding languages, so as to ensure the graphical display and user-interface (UI/UX) are attractive and properly rendered.
Some examples of front-end coding languages include:
CSSHTMLJavascriptReactJQuerryVueRead more on web design here: https://brainly.com/question/8391970
You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent the code from spreading further.
Required:
Based on the email message, what are the next BEST actions to complete?
Answer:
The next BEST actions to complete could either be to call 911 or just drive somewhere further from your computer and where you live because the threat might come to your place, or it might already be in your place.
Explanation:
Arrange the code so that the numbers are swapped.
Which steps allow a user to change the column layout in the Handout Master?
Answer:
D. Click the View tab, select Handout Master, and choose the number of columns in the Slides Per Page drop-down list.
Explanation: correctEdg
Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.
The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.
Secure Copy (SCP) is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network. PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.
Learn more about the PuTTY package from
https://brainly.com/question/13171394