Answer:
CExplanation:
computer networkwhat is Doppler shift
Answer:
When a body that is emitting radiation has a non-zero radial velocity relative to an observer, the wavelength of the emission will be shortened or lengthened, depending upon whether the body is moving towards or away from an observer. This change in observed wavelength, or frequency, is known as the Doppler shift.
Describe the five steps of the process of assessing personal strengths and weaknesses
What is the purpose of the Chart feature in Word?
O A chart can be used to draw and format a Word table.
O A chart can be used to paste information from a graph.
O Information can be typed into a chart to create a graph.
O Information can be typed into a chart to insert a Word table.
Answer:
Its the third option.
Explanation:
Answer: its c Information can be typed into a chart to create a graph
Explanation:
Which is most likely to cause confusion, hinder thinking, and prevent quick access to resources in a study
environment?
O phones
O clutter
O noise
O laptops
Answer:
B. Clutter
Explanation:
I just looked it up on quizlet and quizlet is always right. Helps me on test and everything. But it distracts you unlike phone and laptop because you can not ignore clutter like you can with other things, because clutter makes you confused and wonder what is going on.
Which of the following is a tool HR managers can use to improve commincations between workers of different generations in the same workplace? A)recruitment pools B)l-9 forms C) mentoring programs D)work/life balance
Answer:
Mentor Programs
Explanation:
This is because it is talking about different ages which is a mentor type thing
Answer: mentoring programs
Explanation:
A p e x
What is the act of working with someone to produce or create something?
A. Collaboration
B. Decision-making
C. Non-verbal communication
D. Problem solving
Answer:
A
Explanation:
Answer: A
Explanation:
PLZ HELP 50 points. 4. How did Debevec and his team keep Emily from looking like a plaster mannequin?
Answer: Debevec and his team kept Emily from looking like a plastic mannequin by capturing her in a wide variety of facial expressions, and simulating the facial muscle movements in the animation software.
Explanation:
Technician A says that if a fuse blows it is good practice to replace it with a larger fuse to try to stop it from blowing. Technician B says that fuses can be tested quickly with a test light. Who is correct?
What does "Forward" in emails do?
Convert the following into binary system
and vice versa.
106
Write the name of the tab, the command group, and the icon that you need to use to justify
text in a Word document.
Tab:
Command group:
Icon:
Answer:
Tab: Home Tab
Command Group: Paragraph
Icon: Justify Icon
The icon has no name; rather it is represented by 4 horizontal lines that are aligned on both edges
Explanation:
To answer this question, I'll make use of the following attachment
Where
1- represents the home tab
2 - represents the paragraph
3 - represents the justify icon
Answer:
Tab: Home Tab
Command Group: Paragraph
Icon: Justify Icon
Explanation:
IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.
A.True
B. False
Answer:
a. true
Explanation:
IP is a unreliable protocol because it does not guarantee the delivery of a datagram to its destination. The reliability must be provided by the upper layer protocols like TCP. IP does not support flow control, retransmission, acknowledgement and error recovery.
What products can be benefited from cyber security?
Computers. It protects the system from viruses worms and spyware
what tool should you use to look for information on a network?
A. A social network
B. A magnifying glass
C. A search engine
D. A consumer report
Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
O add a title to a chart
o change the way a chart looks
change the position of the chart
add a chart to a Word document
change the type of an existing chart
Answer:
add a title to a chart
change the way a chart looks
change the type of existing chart
Explanation:
i just took it ! remember to stream fine line by harry styles, walls by louis tomlinson , hs1 by harry styles, lp1 by liam payne, mind of mine by zayn , icarus falls by zayn , flicker by niall horan, heartbreak weather by niall horan, up all night by one direction, take me home by one direction, midnight memories by one direction, four by one direction , and made in the am by one direction . :)
Answer:
add a title to a chart
change the way a chart looks
change the type of existing chart
Explanation:
took it on edu 100%
10 points
What is wrong with the following code:
(don't say syntax error, what is the wrong)
>>> print 'Hello world!'
File "
primt 'Hello world!'
SyntaxError: invalid syntax
Answer:
Primt
Explanation:
What should you remember about typography while creating your résumé?
It is advisable to avoid using [blank] font when creating your résumé. To facilitate readability, your font should not be smaller than [blank]
points.
Answer:
Your font should not be smaller than 0.5
Explanation:
(minimum 4 sentences) What is cyber security and why is it important
Answer:
A cyber security that is used for people being rude and disrespectful online.A cyber security is also used so that none of your personal information gets out.It is important to have cyber security because it keeps all your personal data safe.Cyber security is good to have if you have a job that has information about other people saved.
Explanation:
the font size sets the size of text
Answer:
Yup thats correct
Explanation:
Which number is equivalent to 3e-2?
3
0.3
O 30
my
0.03
Answer:
0.03
Explanation:
Edge 2020
0.03 is equivalent to 3e-2. Therefore option D is correct.
The notation 3e-2 represents 3 times 10 raised to the power of -2.
In scientific notation, the "e" indicates the exponent, which represents the number of places the decimal point must be moved to obtain the original value.
In this case, the exponent is -2, so we move the decimal point two places to the left.
Thus, 3e-2 is equivalent to 0.03. Option D (0.03) is the correct choice, as it represents the same value as 3e-2, which is three hundredths or 3/100.
Therefore option D 0.03 is correct.
know more about decimal points:
https://brainly.com/question/28338004
#SPJ6
Pleaseee answer number 9 I’m having trouble ❤️
Answer:
I think it is C but sorry if it wrong
Answer: A
Explination:
Which of the following are characteristics of the Boolean data type? Check all that apply
It holds infinite values.
It uses operators such as AND, OR, and NOT
It holds a TRUE or FALSE value.
It is named after a nineteenth-century mathematician and logician
Help I’m timed !!
Answer:
It uses operators such as AND, OR, and NOT.
It holds a TRUE or FALSE value.
It is named after a nineteenth-century mathematician and logician
Explanation: Just did it on edg
Answer:
It uses operators such as AND, OR, and NOT.
It holds a TRUE or FALSE value.
It is named after a nineteenth-century mathematician and logician
Explanation:
Got it correct on edge
What is it called when you want to see database records in a certain order?
is montior a visual display unit?
What are some cowboy ethics??
Answer:
giv meh a min plsssss
Explanation:
For some reason, Danica's classmate George could not find the registered symbol in the symbol gallery. He is selling
products that a popular baking company donated to him for the school fair. Danica tells George that he can access
the symbol using keystroke codes.
Which keystroke code does George need to use to add the registered symbol beside the company's name?
O Alt + 0174
O Ctrl + 0174
* Enter + 0174
O Windows + 0174
Intro
Done
Answer alt +0174
Explanation:
Answer:a
Explanation:
what is the term for sending emails that imitate legitimate companies?
Answer:
phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password
Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.
When you add a zero to the right of a decimal number, it multiplies its value by 10 (For example, "15" becomes "150"). What similar result happens to the value of a binary number when you add a zero on the right? (For example, "11" would become "110").
When you you add zero to the right hand side of a binary number such as 11, This binary number is going to become twice its value.
All the number that were 1 are now two times of what they were. We would have a solution like this:
(11)₂ = (1x2)¹ + (1x2)⁰
= 2 + 1
= 3
(110)₂ = (1x2)² + (1x2)¹ + (0x2)⁰
= 1x4 + 1x2 + 0x1
= 4+2+0
= 6
In conclusion, adding 0 to the right hand side of a binary number increases the number by 2. From the solution above, we can see 11 = 3, but after 0 was added, 110 = 6
Read more at https://brainly.com/question/14789125?referrer=searchResults
Which of these graphic elements combine text, illustrations, and color? Word Art Smart Art Clip Art none of the above
Answer:
I believe it's Word Art
Explanation:
How can you troubleshoot Internet access problems?
Answer:
Check the network icon (or wireless connection settings) to see if you have Internet access. ...
Check for changes to proxy settings.
Check the network cables if your computer is wired to the router.
Reset your router.
Check your firewall or security software.
Hopefully this helps.
Answer:
Delete items from the cache, check your Internet connection, and try using a different browser.
Explanation:
Edge lesson