Answer:
When a lot of letters with the same body text need to be personalized.
Explanation:
Answer: Mail merge would be the most effective when a lot of letters with the same body text need to be personalized.
Explanation: Ape x
HELP!!!
To help ensure that an HTML document renders well in many different web browsers, it is important to include which of the following at the top of the file.
A) an tag
B) a doctype declaration
C) a tag
D) a tag
Answer: B
Explanation:
I did not get why there 3 of the same question
Answer:
I think it is:
B. a doctype declarationExplanation:
Compare and contrast the advantages and disadvantages of the Windows, Apple and Linux operating systems.
Which the following is true of functions?
A. Programs written with functions more quickly
B. Function can help remove repeated code from a program
C. Replacing repeated code with a function will reduce the number of commands the computer needs to run.
D. Functions are called once but can be declared many times
Sam recorded himself practicing a speech. He watched the recording and observed the behaviors. Which behaviors should Sam try to change? Check all that apply.
varying his rate in different parts of the speech
saying "like" several times a minute
demonstrating enthusiasm for the topic
pausing frequently in the middle of sentences
having a rising intonation at the end of many statements
Answer:
b d e
Explanation:
Answer:
b d e
Explanation:
To ensure your online résumé is selected by employers using online searches, you must include _____ in your résumé.
html
key words
long descriptions
hyperlinks
Need answer asap!!
You must use key words.
A big part of SEO is choosing the correct keywords
Answer:
he correct answer is letter "B": keywords.
Explanation:
Human Resources (HR) staff usually handle an overwhelming number of resumes during openings. To make sure during online searches a curriculum vitae will be selected, keywords must be included. It is most likely that the HR staff will just filter words with the characteristics of the person they are looking for instead of looking at every resume they receive.
plz mark as brainliest
La sección de lectores de un diario de la ciudad impone como única restricción para la publicación de las cartas, que el texto debe ser de 1500 caracteres. ¿Cuál será el tamaño en KB de un archivo txt que contenga ese texto?
Answer:
El tamaño de un archivo .txt que contenga esa cantidad de texto será de 1.46 KB.
Explanation:
Se entiende que todo caracter informático posee un tamaño de 1 byte, con lo cual en total el texto no puede superar los 1,500 bytes de tamaño.
Ahora bien, un kilobyte es una unidad de medida informática superior, que se compone de 1,024. Por lo tanto, dado que 1,500 - 1,024 es igual a 474, el tamaño del archivo será de 1 KB y 474 bytes. Así, para calcular el tamaño total del archivo en KB, se debe realizar el siguiente cálculo:
1,024 = 1
474 = X
((474 x 1) / 1,024) = X
0.46 = X
Así, el tamaño de un archivo .txt que contenga esa cantidad de texto será de 1.46 KB.
Eric would like to have a callout text box that makes it look as if the character in an image is speaking. Which object should he insert into the Word document?
standard text box
WordArt
callout
shape
picture
Answer:
C: Callout shape
Explanation:
The object that should he insert into the Word document is the callout function. The correct option is b.
What is Microsoft Word?A component of Microsoft Office is Microsoft Word. The office is a collection of Microsoft products that can be used on Windows or macOS and contains Word, PowerPoint, Excel, Outlook, and numerous other tools for both private and professional usage. They aren't the same thing; Microsoft Word is merely one of such app.
A callout function is one of the functions that specifies a callout and is implemented by a callout driver.
The following collection of callout functions makes up a callout: a notification processing notifying function. A function called classifying handles classifications.
Therefore, the correct option is b. callout.
To learn more about Microsoft Word, refer to the below link:
https://brainly.com/question/2579888
#SPJ5
Can someone help me and make a code for this in PYTHON, please? I would be very grateful!
It is estimated that China on July 1, 2019. had 1,420,062,022 inhabitants. The population of China increases by 0.35% every year. Assuming that the annual population growth in China will not change, show the expected population of China in the next ten years.
Please... Thanks in advance!
Code:
next_ten_years = 1420062022*1.0035**10
print(next_ten_years)
Output:
1470554353.1178253
Explanation:
Since the population of inhabitants increases by [tex]0.35\%[/tex] each year, the total population must be [tex]100.35\%[/tex] of the previous year's population (since it includes the previous size of the population and the [tex]0.35\%[/tex] increase of the population)
The math:
Expected population in next 10 years = [tex]1420062022 \times 1.0035^{10}[/tex] ([tex]100.35\%[/tex] is [tex]1.0035[/tex])
Code:
Looking at the code above, the '**' raises the power of a number to the number you put after the operator, so 1.0035**10 is [tex]1.0035^{10}[/tex]. The '*' operator multiplies the two numbers that are placed before and after the operator, so 1420062022*1.0035 is [tex]1420062022\times 1.0035[/tex].
The expected population in the next ten years is 1,470,554,353 (if we round to the nearest inhabitants since there can't be a decimal amount of inhabitants).
Hope this helps :)
Which loop prints the numbers 1, 2...100?
c = 1
while (c <= 100):
c = c + 1
print (c)
c = 1
while (c < 100):
c = c + 1
print (c)
c = 1
while (c <= 100):
print (c)
c = c + 1
c = 1
while (c < 101):
c = c + 1
print (c)
Answer:
while (c <= 100):
print (c)
c = c + 1
Explanation:
We can cancel out the while loops with ' < ' because then it won't print when C is 100.
while (c <= 100):
print (c)
c = c + 1
Is probably right because unlike the other while loop with ' <= ' it has a print statement before the C = C + 1 which means look at this:
C = 1
print(c)
C = C + 1
So when it's run 1 is printed
But when doing the other while loop:
c = 1
while (c <= 100):
print (c)
c = c + 1
C = 1
c = c + 1
print(c)
It prints 2 because it added 1 to C first before actually printing it.
The loop that prints the numbers 1, 2...100 is
c = 1
while (c <= 100):
print (c)
c = c + 1
We are to find the loop that prints the numbers 1 , 2 …100.
Therefore, the loop that print 1 to 100 can be represented as follows:
c = 1
while (c <= 100):
print (c)
c = c + 1
c is a variable initialize with zero.
The while loop is used to check if c is less than or equals to 100.
If c is less than or equal to 100 we print the value of c .
Then we add 1 to c and go back to the loop again.
learn more on loop here: https://brainly.com/question/19705987?referrer=searchResults
Which technique will you use to make listening to audio a pleasant experience?
Audio _____ is the smooth shift of one audio file into another.
Don't quote me on this, but I *think* the answer is "Audio transition/transitioning is the smooth shift of one audio file into another." I hope I was able to help and I apologize if I was wrong. ♡♡
Answer:
Sample response: Good thriller has beginning, middle, and end. Reader has to care about the characters. A character should be mysterious so readers are interested. Crime is a good way to talk about human condition. Good thrillers change people’s point of view in some way.
Explanation:
Which types of watermarks are discussed in the paragraph below?
The watermark can be of different types depending on the application. A
However, a
watermark will not resist tampering.
watermark will resist manipulations of the media.
Answer:
Blank #1: B. Robust
Blank #2: C. Fragile
Explanation:
I took the test and this was the correct answer! Please like and mark my answer the brainliest if this helped you! :)
A robust watermark will not resist tampering.
A fragile watermark will resist manipulations of the media.
What is a watermark?A faint design made in paper during manufacture that is visible when held against the light and clearly identifies the maker.
The watermark can be of different types depending on the application.
A robust watermark will not resist tampering.
A fragile watermark will resist manipulations of the media.
Learn more about watermark.
https://brainly.com/question/26321908
#SPJ2
If your presentation uses a background, your text should _____.
be placed in bulleted lists
work well with the background
be at least 50-points
be written in paragraph form
your text should work well with the background.
It's very important for the text to be readable.
Answer:
B (work well with the background )
Explanation:
I have chosen B, to be the best solution and here is why. Since, your presentation uses a background you would want your text to be fitted well with the background of your choice. That way users can still see the text.
simplify the expression below and state the value of m for which the simplified expression is not defined 2m² + m - 15/ m² - 9
Answer:
The simplified expression is: [tex]\frac{2m-5}{m-3}[/tex]The simplified expression is undefined for m=3Explanation:
The given expression is:
[tex]\frac{2m^2+m-15}{m^2-9}[/tex]
The numerator can be siplified by using factorization and denominator will be simplified using the formula
[tex]a^2-b^2 = (a+b)(a-b)[/tex]
So,
[tex]= \frac{2m^2+6m-5m-15}{(m)^2-(3)^2}\\=\frac{2m(m+3)-5(m+3)}{(m-3)(m+3)}\\=\frac{(2m-5)(m+3)}{(m-3)(m+3)}\\=\frac{2m-5}{m-3}[/tex]
A fraction is undefined when the denominator is zero. In order to find the value of m on which the simplified fraction will be undefined we will put denominator equal to zero.
So,
[tex]m-3 = 0 => m = 3[/tex]
Hence,
The simplified expression is: [tex]\frac{2m-5}{m-3}[/tex]The simplified expression is undefined for m=3Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk. Even though the risk was migrated, Robert observes some remaining risk linked with access control. What type of risk has been observed by Robert
Answer:
Disruption of computer service
Explanation:
Access control is a method or technique used by network administrators to organize and limit access to resources in a network. In a computer network, there several threats and risk experienced by users and technician, that threatens the confidentially of information and other resources.
The configured badge reader system needs data and draws bandwidth. When this bandwidth is in use, it reduces the network efficiency and computer services causing low productivity in the organization.
Out of these video games which one do you think is the best
(dont answer if you have never played at least 3 of these games)
Rivals of Aether
Super smash bros ultimate
Smash flash 2
Project M
Answer:
Tbh Rivals of Aether was pretty good but I gotta go with SMBU
Explanation:
SMBU was lit that's all there is to it
Answer:
Super smash bros ultimate
Explanation:
its ultimate
I'm not sure if these are correct.
Answer:
All the mention codes are correct.
Explanation:
In the task1, a "name" variable is declared, that store a string, and in the next step, the built-in method "title, lower and upper" is defined, in which the title method capitalized the first character of the given word in each sentence, upper method change each character into upper case and the lower method changes each character into lower case.
In task2, a message variable is declared, that holds a string value in which the count method is used that counts the space character value.
In task3, a string value is used in the message variable, which uses a replace method to change the given string value.
In task3, a response variable is declared that uses an input method for input a string value, and inside the print method, len method is used that counts each input character number.
QUICKLY PLEASE!!!
Respond to the following in three to five sentences.
What is the purpose of netiquette guidelines?
Answer: As the conventional etiquette, which lays out rules of ethics in social contexts, the purpose of netiquette is to help create and sustain a friendly, relaxed and productive atmosphere for online contact, as well as to avoid putting pressure on the system and creating tension between users.
Explanation: