What are the pros and cons of using ICT
Answer:
Communication - Speed / time – money can be saved because it's much quicker to move information around. ...
Globalization - Video conferencing saves money on flights and accommodation. ...
Cost effectiveness - It feels free to send an email (although it isn't); it's without doubt cheaper than phone calls.
Explanation:
The Quick Access Toolbar is typically
located in the top-right corner of the
window, above the ribbon.
True
False
Answer:
False
Explanation:
It is on the left
A student is writing a research paper about the poetry of the Harlem Renaissance. Which style guidelines will the
student most likely follow when writing about this topic?
-American Chemical Society (ACS)
-Modern Language Association (MLA)
-Council of Science Editors (CSE)
-American Psychological Association (APA)
Answer:
b
Explanation:
lesssss gooo CLOUWT
The style guidelines that the student is most likely to follow when writing about the poetry of the Harlem Renaissance is Modern Language Association (MLA). The MLA style is commonly used for writing in the humanities, including literature, language, and cultural studies.
What is Modern Language Association (MLA)?The Modern Language Association (MLA) is a professional organization for scholars of language and literature. It is mainly focused on the study and teaching of languages and literature, particularly in the United States.
The MLA publishes several academic journals, including the flagship journal PMLA (Publications of the Modern Language Association of America), and produces a well-known academic writing style guide called the MLA Handbook for Writers of Research Papers.
This handbook provides guidelines for how to format academic papers and how to properly cite sources in research writing.
To know more about Modern Language Association (MLA):
https://brainly.com/question/2031731
#SPJ2
Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. Which information system will he use in the unit to keep track of the deliveries?
Answer:
E. Transaction processing system
Explanation:
Explanation: He will need a transaction processing system to know the amount of logistics available daily and how many to ship and how many to order. Transaction processing system will make him keep track of what transactions take place during the various days to help him give a good report.
Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed
Answer:
Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.
Explanation:
Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.
Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.
what is modern? explain
Answer:
modern means present like the moment like for example the iphone 12 is modern because it was made last year or this year i forgot but pretty much it means in the present
Explanation:
Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given operating system will handle this activity by performing _____.
soak testing.
stress testing
load testing
spike testing
Answer:
load testing
Explanation:
to see if the activity can handle under performance
Suppose cell C5 contains the formula =B$6+C1.
Match each formula with its respective cell if you copied it.
=A$6+B4 =B$6+C6 =C$6+D2 =D$6+E1
Thank you, have a great week.
Answer:
=A$6+B4 will be in B8
=B$6+C6 will be in C10
=C$6+D2 will be in D6
=D$6+E1 will be in E5
Explanation:
$ sign is used to lock a certain column or row value, with the $ sign we can create an absolute reference which will remain unchanged as we copy our formula from one cell to another.
As formulars are copied, the references change respectively.
With =B$6+C1 in C5 ; As we move up or down of cell C5, only the row numbers will change that is formula in C6 becomes =B$6+C2.
As we move left and right, the column alphabet will also experience change like the rows did.
Only the absolute reference won't change no matter the direction.
Hence,
=A$6+B4 ; A and B means one move to the left of C5 and 4 signifies, 3 moves downward of C5 that gives B8
=B$6+C6 ; B and C means no horizontal change, 6 means 5 moves downward of C5 which gives C10
=C$6+D2 ; C and D means 1 move to the right and 2 means one move downward of C5 which gives D6
=D$6+E1 ; D and E means 2 moves to the right and 1 means no vertical change from C5 ; which gives E5
Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest
Answer:
Explanation:
also have a good day people !!
Answer:
Thx u2!!
Explanation:
Everyone have a good day!
Answer:
You too and thank you for 50 points!!
Explanation:
write any two reasons why files are stored in folders
Answer:
Explanation:
The answer is The tree structure suggests the main benefit of folders: to organize your files. You can create folders to store and organize your pictures, your documents, your videos, and so on. Folders are also used to separate the files created by different users.
Answer:
Putting files into folders can help you stay organized and keep your files seperated. Having seperate place for different files make them easy to find. Having folders for your files also make them easier to move, for example, if you are moving your information to a new device, it is faster and more efficient because your files are placed in folders, so you don't have to move each indviual file.
I hope this was helpful! =)Can you use 2 wireless keyboards and 2 wireless mouse on a dual monitor desktop without interfering with the other monitor ?
Answer:
I'm pretty sure this is not possible on Windows OS.
Explanation:
Two different monitors can work, as you probably know, but I don't think you can use separate keyboards and mice on the same machine.
Computer programmers must be fluent in every programming language. (5 points)
O True
O False
Answer:
False, its true that they need to know some programming languages but they do not need to be fluent in all of them.
Complete the sentence with the correct response.
If you were to create a mobile app and wanted to create it on an operating system that would allow the users to personalize preferences within the operating system, you would use the operating system.
Answer:
You would use the Android operating system.
Explanation:
Android is a mobile operating system based on a modified version of the Linux kernel and other open source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Many application developers prefer it due to its many customization options.
Match each operating system drawback to its respective operating system.
1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System
Answer:
Microsoft Windows - More susceptible to viruses
Linux - Limited support system
Apple - Fewer compatible applications
Explanation:
Generally windows is more susceptible to viruses.
Linux is open source meaning it's up to the community to help you.
Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.
Answer:
1. Microsoft Windows is more susceptible to viruses
2. Mac OS X (Apple OS) has fewer compatible applications
3. Linux OS has a limited support system.
What is the dark, sticky substance that forms when tobacco is burned?
Answer: Tar.
Explanation:
A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.
Type the correct answer in the box. Spell all words correctly.
Alan maintains the efficiency of a printing plant by supervising plant operations and implementing safety procedures. What does he work as?
Alan is working as a _____________.
Answer:
Alan is a Maintenance Supervisor.
Explanation:
Answer:
printing plant manager
Explanation:
If a citation has a volume, title, and page numbers, it is a:
journal article citation
book citation
website citation
amphlet citation
Answer:
It has to be Journal Article Citation
Explanation:
the main work area of the computer is the
Answer:
Desktop
Explanation:
The desktop is the main work area of your computer, and will likely be the most visited area of your computer. Your desktop appears every time you log into your account, and contains icons and shortcuts to your most used programs and files.
Which print preview of your slide show includes a notes section for your audience?
Answer:
I would say the one on the left side, have a good day! :)
Explanation:
I hope this helps! :)
essence of radio program
Answer:
Radio has the ability to reach across borders and can become a valuable source of information where reliable news is scarce. Radio has proved its worth in times of emergency such as when access to the mobile network is down as a result of an overload, or phone lines are cut.
Explanation:
z 1
-- = --
7 21
solve
Answer:
[tex]z= \frac{1}{3}[/tex]
Explanation:
Given
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Required
Solve
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Multiply both sides by 7
[tex]7 * \frac{z}{7} = \frac{1}{21} * 7[/tex]
[tex]z= \frac{1}{21} * 7[/tex]
Rewrite as:
[tex]z= \frac{1 * 7}{21}[/tex]
[tex]z= \frac{7}{21}[/tex]
Simplify fraction
[tex]z= \frac{1}{3}[/tex]
JAVA
Write a method that takes 2 parameters: an ArrayList list, and an int numRepeats representing the number of times to repeat each element in the array.
Return a new ArrayList with each element repeated numRepeats times.
For example, if we had an ArrayList list with the values ["hello", "world"]:
repeatElements(list, 3)
Should return a new ArrayList with the elements:
["hello", "hello", "hello", "world", "world", "world"]
public ArrayList repeatElements(ArrayList list, int numRepeats)
{
}
Answer:
Explanation:
The following Java code creates the repeatElements method as requested and uses the test case shown in the question to test the method. The output can be seen in the attached picture below.
import java.util.ArrayList;
class Brainly {
public static void main(String[] args) {
ArrayList list = new ArrayList();
list.add("Hello");
list.add("World");
System.out.println(repeatElements(list, 3));
}
public static ArrayList repeatElements(ArrayList list, int numRepeats) {
ArrayList newList = new ArrayList();
for (Object x:list) {
for (int i = 0; i < numRepeats; i++) {
newList.add(x);
}
}
return newList;
}
}
always follow the routine "clean up while in use and clean up before keeping it".
true or false
A man-in-the-middle attack or impersonation are likely to result in problems with
data availability.
data confidentiality.
data integrity.
data mining.
Answer:
Data Confidentiality
Explanation:
A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.
A man-in-the-middle attack or impersonation is likely to result in problems with data confidentiality. Thus, option B is correct.
What is a man-in-the-middle attack?A man-in-the-middle (MITM) attack is a broad name used whenever an abuser inserts himself into a conversation between a user and now an application. That will listen in on the conversation or to pretend to be one of the participants and create the impression that normal information-sharing is taking place.
Attacks compromise the integrity and confidentiality of exchanges, which exposes information, technology, and other things to malevolent use. Consider the threat if a hacker was able to remotely open an automatic door lock or deploy the airbags in a linked car.
Therefore, option B is the correct option.
Learn more about man-in-the-middle attack, here:
https://brainly.com/question/13014110
#SPJ6
Graphics created within Illustrator CC are always vector graphics true or false
True we use illustrator to draw vectors and vectors only
why? they are infinitely scalable
Hope this helps.
-scav
Sasha has just gotten a new job in a nearby city. After
comparison shopping, she found that renting a nice two-
bedroom apartment would cost around $800 per month.
Her utilities would cost about $150 per month.
Sasha has enough money saved for a down payment, and
she found that she can buy a three-bedroom house or
condo with a mortgage payment of $1,000 per month,
including taxes and homeowner's insurance. Her utilities
would cost about $200 per month.
Sasha's new.company has told her that she will be
required to move at her own expense in two years.
What should she consider before making her decision?
The monthly costs of renting and buying
The extra expenses needed for maintenance while
she lives in the house.
The amount of the down payment she will need to
make
The expense of selling the home when she leaves
the city
where is the question??
Explanation:
How might you develop a game where players need strong twitch skills in a way that still makes the game fun for players of all skill levels and abilities?
Answer:
here ya go
Explanation:
I would suggest either having a default difficult being easy, and if people want to be challenged they can increase it, or try to balance how much of the game requires strong twitch skills.
how important the role of valet and butler service in the hospitality
what is the answer???
Answer:
I think it should be C
Explanation:
A group of two or more computers that are link together.