Answer:
the answer is D Smart Object
Answer:
I think he should use a pen tool
When entering numbers that start with a zero, apply the _____ number format.
A. Text
B. Context
C. Zero
D. Zero decimal
Answer:
The Answer is gonna be D. Zero decimal
Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service
Answer:
C. user accounts
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.
Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.
In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.
Answer:
user accounts
Explanation:
What is the relationship between optical drives and WORMs?
Optical drives are advanced versions of WORMs.
WORMs do not affect optical drives.
Optical drives are susceptible to WORMs.
WORMs are types of optical drives.
Answer:
When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.
Explanation:
Good luck
Need answer ASAP. Thanks
Answer:
1. XHTML
2. XML
3. HTML
4. CSS
Explanation:
What is the status of this account?
A)Current
B)Current, but closed
C)Potentially negative
D)Potentially negative, but closed
D)Potentially negative, but closed
we know this due to this
-scav
The given account is Potentially negative, but closed. Option D is correct.
What is the Potentially negative account?A closed account with a “Potentially negative closed” designation has a history that a lender would find unfavorable.
Negative account are the information includes things like missed payments on credit cards and loans, charge-offs, collections, bankruptcies, short sales, deeds in lieu of foreclosure, and foreclosures.
The given image clearly indicated that the account is under the debt and it is called as the Potentially negative, but closed account. The section under “Potentially negative items” will contain a list of all accounts that could be seen negatively by lenders or other people looking at your credit history.
Therefore, option D is correct.
Learn more about the account, refer to:
https://brainly.com/question/29108212
#SPJ2
5.What type of mic would you use for the following scenario:
• You want to pick up a wide range of frequencies , You are looking for an extraordinarily rich representation of the original sound, You seek smooth, detailed sound, You want to capture the subtle nuances in a recording studio, You expect and appreciate subtle, sensitive sound
a. Ribbon
b. Condenser
c. Dynamic
Answer: ribbon
Explanation:
Ribbon microphones are regarded as the most natural mics which can be used in capturing the voice, the sound of an instrument, and also the ambience of a room.
Ribbon microphone gives an extraordinarily rich representation of the original sound and also provide a smooth, and detailed sound.
Need answer ASAP
Complete the following sentences
____ objects are programmer defined objects with programmer developed properties and methods. Custom objects are ____
Objects.
Options for first box are:custom, built-in, user-defined
Option for the second box: user-defined, system-defined, undefined
Answer:
built-in objects are programmer-defined objects with programmer-developed properties and methods. Custom objects are user-defined objects.
What is the purpose of a hyperlink in a presentation?
A to add a joke to a presentation
B to create an attractive image
C to connect a user to a new slide, a file, or a webpage
D to keep track of the order of slides
Answer:
Answer:c to connect a user to a new slide, a file, or a webpage
Explanation:
Explanation:c
Answer:
c
Explanation:
List any two software that could be used for creating visual information
Answer: inkscape
Microsoft PowerPoint
Explanation:
Visual information is the presentation of information in visual format e.g through pictures, etc. It is the use of pictures, signs, icons etc to pass a message with one's sense of sight.
The software that could be used for creating visual information include inkscape and Microsoft PowerPoint. IInkscape is an open-source vector graphics editor which is used in the creation of vector images. Microsoft PowerPoint is also a presentation program.
Name the tools in plant propagation.
Q
18.
16.
17.
19.
20.
please po asap
What behavior do elements in a stack follow?
Answer:
last in, first out, or LIFO behavior
Explanation:
B
A computer database uses a binary sequence of 10 bits to represent unique user IDs. To increase the number of unique IDs that the database is able to represent, the database administrator increases the number of bits in a user ID to 11 bits. How many times more unique user IDs can be represented with the new system?
Answer:
2 times more unique IDs
Explanation:
The number of bits used to represent unique IDs in the computer system = 10 bits
The number of bits to which the database is upgraded to = 11 bits
The number of unique IDs represented by a 10 bits binary sequence, n = 10¹⁰ = 1024
The number of unique IDs represented by a 10 bits binary sequence, n = 10¹¹ = 2048
Therefore, the number of times more unique IDs that can be represented with the new system of 11 bits = 2048/1024 = 2 times more unique IDs
Which of the following might an audio technician do to music in a recording studio? (select all that apply)
a) write it
b) mix it
c) perform it
d) master it
Answer
perform it
master it
mix it
Explanation:
That's the Answer
Write a program to Find the Sum of 4 numbers
Answer:
Following are the code to the given question:
#include <iostream>//header file
using namespace std;
int main()//main method
{
int a,b,c,d;//defining integer variable
cout<<"Enter numbers:";//print message
cin>>a>>b>>c>>d;//input numbers
int sum=a+b+c+d;//add value in sum variable
cout<<"4 number sum is:"<<sum;//print sum
return 0;
}
Output:
Please find the attachment file.
Explanation:
In the program inside the main method 4 integer variable "a,b,c, and d" is declared that uses the print method to input the value from the user-end and after accepting the value an integer variable "sum" is declared that adds all input values and use a print method that prints the value with the message.
Write the program to convert the string “ SOFTware” into lower case ,”hardware “ string into upper case.
Combine the two strings and find the length of the combined string.
Answer:
The program in Python is as follows:
str1 = " SOFTware".lower()
str2 = "hardware ".upper()
str3 = str1+str2
lent = len(str3)
print(lent)
Explanation:
(1) Convert " SOFTware" to lower
str1 = " SOFTware".lower()
(2) Convert "hardware " to upper
str2 = "hardware ".upper()
(3) Combine both strings
str3 = str1+str2
(4) Calculate the length of the new string
lent = len(str3)
(5) Print the calculated length
print(lent)
What technology standard is commonly used today for hard drives to interface with the motherboard in a system? pasago po salamat ^_^
Answer:
Serial Advanced Technology Attachment (SATA).
Explanation:
The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Thus, the hardware components of a computer are the physical parts that can be seen and touched. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
Digital storage of data refers to the process which typically involves saving computer files or documents on magnetic storage devices usually having flash memory. Some examples of digital storage devices are hard drives, memory stick or cards, optical discs, cloud storage, etc. A reliable storage such as a hard-disk drive ensures that computer files or documents are easily accessible and could be retrieved in the event of a loss.
Serial ATA (SATA) is a technological standard which is commonly used today for hard drives to interface with the motherboard in a computer system. Thus, it's simply a bus interface on computer systems that is typically used for connecting mass storage devices to host bus adapters such as motherboards.
Generally, SATA comprises of two ports and these are the power and data connector.
list and explain seven functions of operating system software
Answer: Security – ...
Control over system performance – ...
Job accounting – ...
Error detecting aids – ...
Coordination between other software and users – ...
Memory Management – ...
Processor Management – ...
Device Management –
HOPE THIS HELPS
ced-vfrj-yiu
ev.eyo.ne joi.n.thro.ugh goog.le m.eet
Answer:
n.o
Explanation:
n.o.
(Java)
Summarize the connection between controls, events, and subroutines.
In order to create an effective summary, you must take time to read through the topics that you have been given. Namely:
"The Connection between Controls, event, and subroutines".
What is a Summary?A summary refers to a concise statement or account or report of the key points of an event, story, or literature.
A summary is usually exclusive of details that are not necessary. It focuses on the key points.
The text relating to the topic must be carefully researched. Jot down your points on a separate sheet, especially when looking at introductory paragraphs and chapters. You will also find key points in the conclusive paragraphs of each chapter or the text.
Then ensure that all your points are arranged in an order that is logical and sequential.
Learn more about Summaries at:
brainly.com/question/25605883
The following procedure is intended to return true if the list of numbers myList contains only positive numbers and is intended to return false otherwise. The procedure does not work as intended. PROCEDURE allPositive(myList) { index ←← 1 len ←← LENGTH(myList) REPEAT len TIMES { IF(myList[index] > 0) { RETURN(true) } index ←← index + 1 } RETURN(false) } For which of the following contents of myList does the procedure NOT return the intended result?
Answer:
[-1, 0, 1]
Explanation:
Given
The above procedure
Required
Which list does not work as intended
The question has missing options (the options are available online).
From the question, we understand the procedure is to return true for lists that contain only positive numbers.
However, the list does not work for [-1, 0, 1]
The reason is that; the procedure starts checking from index 1.
i.e. index ←← 1
In [-1, 0, 1], the element at index 0 is negative (-1).
Since the procedure starts checking from index 1, the procedure will not check the element at index 0 (i.e. -1).
Hence, it will return true, instead of false
In this exercise we have to use the knowledge of computational language in python, so we have that code is:
It can be found in the attached image.
So, to make it easier, the code in python can be found below:
NumList = []
Number = int(input("Please enter the Total Number of List Elements: "))
for i in range(1, Number + 1):
value = int(input("Please enter the Value of %d Element : " %i))
NumList.append(value)
print("\nPositive Numbers in this List are : ")
for j in range(Number):
if(NumList[j] >= 0):
print(NumList[j], end = ' ')
See more about python at brainly.com/question/2266606
When should we not use Inheritance in programming?
Answer:
You shouldn't be using inheritance if your program doesn't reuse code a lot.
Explanation:
This is really the purpose of inheritance, to make it easier for us to call repeated method calls without having to copy and paste all the time and making our program long and redundant. If you have simple programs that don't have repeated calls, then inheritance is unnecessary.
PLSSSSS HELPP!! Population biologists are concerned about invasive species such as the zebra mussel found in North American water ways because
A.The introduced species compete for resources more effectively than native species
B.These introduced species will require more land to be protected
C.Introduced species often become endangered when they are placed in a new habitat
D.Predators of the zebra mussels will decrease after these organisms are introduced into the habitat
Answer: A.The introduced species compete for resources more effectively than native species.
Explanation:
An introduced species is also called the exotic species and this is an organism which is not a native organism or specie and therefore isn't native to the place but rather it's being transported to the place through the activities of human being.
When the introduced species are introduced to a particular area, they compete with the natives for the available resources and often do this more effectively than the other native species.
Therefore, the correct option is A.
Hey does anyone think nervegear would be possible? (Just asking)
Answer:
Depends
Explanation:
Technology is not advanced yet, so building a fully functional nerve gear is difficult. It could be possible in a few years though.
Answer:
No, the Nerve Gear cannot be possible at the moment. However, in Japan, they are creating the Nerve Gear and is to be released in May 2022 told by the creator, Kayaba Akihiko. So, the Nerve Gear cannot be possible in 2020 but in 2022. We just have to wait for two more years.
Explanation:
please choose me as brainliest if that is ok ;)
Which option best describes what spotting sessions are in the context of filmmaking? ASAP PLEASEEEEE!!!!!!! 40 points
A.
They are sessions dedicated to discussing the film's art direction.
B.
They are sessions dedicated to discussing the film's screenplay.
C.
They are sessions dedicated to discussing the film's cinematography.
D.
They are sessions dedicated to discussing the film's costume design.
E.
They are sessions dedicated to discussing the film's score.
Answer:
E. They are sessions dedicated to discussing the film's score.
Explanation:
PLATO
Which of the following best describes the protocols used on the Internet?
The protocols of the Internet are designed by government agencies to ensure they remain free to use
The protocols of the Internet are secret to maintain the privacy and security of people using them
Each device connected to the Internet will use a protocol designed by the company that manufactured it
The protocols of the Internet are open and used by all devices connected to the network
The protocols of the Internet are open and used by all devices connected to the network
-scav
Need answer ASAP I’ll mark brainliest if correct
How can you create a class without any methods, yet call a method from that class?
The class can___ methods from another class
In an event-driven program, you design the screens, define the objects, and define how the screens will connect.
Answer:
True.
Explanation:
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Maintenance.
One of the most important steps in the software development life cycle (SDLC) is design. It is the third step of SDLC and comes immediately after the analysis stage.
Basically, the design phase is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.
Hence, in an event-driven program, the software developer design the screens, define the objects to be used, and define how the screens will connect to other sources or resources.
Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in: a) agriculture and away from services b) services and away from agriculture c) industry and away from services d) agriculture, services, and industry
Answer:
^^^^^ what they said
Explanation:
its b
Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture. Thus, option C is correct.
What does the graph represents?According to the graph, the globalization process (period 2000-2019) has affected China by decreasing the proportion of workers in agricultural activities from more than the 40% to not much above the 10%.Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture.
Meanwhile, workers in the service sector have increased from less than the 30% to more than the 60%. The percentage of people working in manufacturing activities has remained more or less stable, around the 30%.
Thus, option C is correct.
Learn more about service sector on:
https://brainly.com/question/14606383
#SPJ7
does anyone know the code to rating 5.2:4 on CodeHS?
Answer:no
Explanation:
no
1. Samantha uses the RSA signature scheme with primes p = 541 and q = 1223 and public verification exponent e = 159853. (a) What is Samantha's public modulus? What is her private signing key? (b) Samantha signs the digital document D = 630579. What is the signature?
Answer:
Why is samantha asking us? She should find out herself smh
Explanation: