Answer:
I. You own it.
II. You can edit.
Explanation:
A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.
Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.
The requirements which are necessary in order for you to share a file are;
I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.
II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.
Which of the following belongs in a website citation? (select all that apply)
the place where the author works
the Internet address or web page address
the person or organization responsible for the website
page numbers
the date when you got the information
Answer:
the Internet address or web page address
the person or organization responsible for the website
the date when you got the information
Explanation:
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? a. Use mail merge for steps 1 and 2 and a word processor for step 3. b. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. c. Use a word processor for steps 1 and 2 and a graphics software for step 3. d. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
Answer:
1: Word Processor
2: Graphics Software
3: Mail Merge
Explanation:
Given
1. Create a list of invitees
2. Design an invitation card
3. Personalize the card
Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.
So task 1 requires a word processor
An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.
So task 1 requires a graphics software
Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.
You defined a class as follows.
def __init__(self, style, color):
self.style = style
self.color = color
This portion is the _____.
creator
instantiator
constructor
initiator
Answer:
instantiator
Explanation:
MRK ME BRAINLIEST PLZZZZZZZZZZZZZZZ
Answer:
instantiator
Explanation:
What would you classify anti-malware software as?
SaaS
enterprising
cloud
security
Answer:
enterpriseing is the answer
write examples of hacking in internet?
Answer:
Although hacking is very bad, it can be found everywhere and anywhere.
Examples: Phishing, password checking, and keyloggers
Explanation:
Explanation:
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.
To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.
Who has gotten a random file link from someone? What file does it contain?
Answer:
those are bots , just report those
Explanation:
Which of the following code snippets will output the following:
Hello
Hello
Hello
A:
print("Hello")
print("Hello")
print("Hello")
B:
for i in range(3):
print("Hello")
C:
print("Hello"*3)
D:
print("Hello\n"*3)
Answer:
A, B and D
Explanation:
Given
Options (a) to (d)
Required
Which outputs
Hello
Hello
Hello
(a) Each print statement prints "Hello" on separate lines.
Since there are three print statements, then (a) is true
(b) The loop iterates 3 times; and each iteration prints "Hello" on separate line,
Hence, (b) is also true
(c) The statement prints "Hello" 3 times, but all are on the same line
Hence, (c) is false
(d) The statement prints "Hello" 3 times; The '\n' ensures that each "Hello" string is printed on separate line.
Hence, (d) is true
Answer:
option A B D
Explanation:
hope helps you
have a nice day
What is the correct HTML for adding a background color?
Question 7 options:
< background>yellow
< body background-color=yellow>
< body bg="yellow">
< body style="background-color:yellow;">
Answer:
< body background-color=yellow>
Explanation:
This is the correct HTML command that is used for adding a background color of choice.
You are planning a storage solution for a new Windows server. The server will be used for file and print services and as a database server. The new server has five hard disks, all with equal capacity. Your storage solution should meet the following requirements: System files should be on a volume separate from data files. All volumes should be protected so that the server can continue to run in the event of a failure of one of the disks. The data volume should be optimized for improved disk access times. You will use Windows Disk Management to create and manage the volumes. What should you do
Answer:
Explanation:
The best solution for this scenario would be to first create a mirrored volume for the system volume using two of the available disks and then a single RAID 5 volume with the remaining 3 disks for the data volume. This setup will allow all of the data to be backed up so that if one of the disks fails the server will continue running accordingly. The RAID 5 volume offers error checking and redundancy for the data, therefore, allowing the data to be accessed quickly and efficiently with far greater security and far less chance of data becoming corrupt.
(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?
Answer:
a trade mark is something where someone owns the rights to something in a specific country
What is the output of this program?
grades = [89, 70, 98, 100, 83]
print(grades[-4])
Group of answer choices
89
100
70
98
Answer:
70 is the answer negative one begins from 83 and count down to 89, Therefore, 70 is is -4 and is chosen as the best answer
Define self-esteem: A how I feel about myself B how I visualize myself C how I esteem myself
Answer:
A how I feel about myself
Explanation:
Self-esteem is your overall opinion of yourself — how you feel about your abilities and limitations. When you have healthy self-esteem, you feel good about yourself and see yourself as deserving the respect of others. When you have low self-esteem, you put little value on your opinions and ideas.
What form of infrastructure improved trade and communication among Roman cities?
aqueducts
canals
reservoirs
roads
Answer:
aqueducts
Explanation:
Answer:
c
Explanation:
Irene is creating a wireframe of a website she is working on to show her client. In which phase of the development process is she?
A. planning
B. design
C. development
D. testing
Answer:
The Answer Is B: Design
Explanation:
I took the test on edmentum and it was correct your welcome m8 :)
just need to know if these are correct
Answer:
Yes, they are correct.
Answer:yea g
Explanation:
which of the following is another term for a subfolder
Answer:
below
Explanation:
subdirectory
Explanation:
Subdirectory is the another name of sub folderwhich is the small folder of files created withing a main folder.
Match each storyboarding technique with its appropriate description.
Answer:
Hierarchical – Option C
Linear – Option D
Webbed - Option A
Wheel - Option B
Explanation:
Hierarchical means something that follows the order from general to specific .
Hierarchical – Option C
Linear means something that follows the order from general to specific .
Linear – Option D
Webbed – There is no order in flow of information or it is inconsequential. Hence, option A
Wheel - means the flow is sequential i.e as per the sequence
Wheel – Option B
an option already selected by windows is called____ ( default option/ default selection).
this is urgent
Answer:
default option
Explanation:
Plz help:(!!!!
Type the correct answer in the box. Spell all words correctly.
Claire wants to use a filter to ensure quality in the software development process and product. What can Claire use for this purpose?
Claire should use_________
as a filter to ensure quality in the software development process and product.
Answer:
Defect filters
Explanation:
Answer:
"a quality gate" is the correct answer :D
Explanation:
Readable code includes the use of
color and symbols to make the code look good.
consistent and meaningful variable names, helpful comments, and formatting.
variable names that do not vary from program to program.
comments that include the programmers' reactions to a particular piece of code used.
Answer:
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbbbbbbbbbbbbbbbbbbbbbbbbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
Explanation:
The Readable code includes the use of color and symbols to make the code look good is; A consistent and meaningful variable names, helpful comments, and formatting.
Since Readable code is crucial for software development. It makes it easier for programmers to understand, modify, and maintain the code. It is well-organized, with consistent and meaningful variable names, helpful comments, and proper formatting.
Using consistent and meaningful variable names allows programmers to easily understand what the variable represents.
Helpful comments also play a crucial role in making the code readable. Comments should be used to explain, the code is doing, why it is doing it, and any other important details that would help programmers understand the code.
Formatting is also essential in making the code readable.
In summary, readable code includes consistent and meaningful variable names, helpful comments, and proper formatting.
Learn more about the code here;
https://brainly.com/question/14278291
#SPJ4
A small computer on a smart card has 4 page frames. At the first clock tick, the R bits are 1000 (page 0 is 1 and the rest are 0). At subsequent ticks, the values are 0110, 0101, 1010, 1101, 0101, 0011, and 1100. If the aging algorithm is used with a 16-bit counter, give the values of the four counters after the last tick. If page fault occurs, which page should be swapped out
Answer and Explanation:
Aging algorithm Aging algorithms are the NFU algorithm with modification to know the time of span and increment the page referenced. The ageing method sort customer invoices by date in four columns. By using the ageing algorithm, counters are shifted by 1 bit, and the R bit is added to the leftmost bit. The values of counters are
Page 0: 01101110
Page 1: 01001001
Page 2: 00110111
Page 3: 10001011
The system clock is 2ns and interval is 2ms for that one bit per interval is the ability to analyze the references in a tick. Counters have a finite number and have two pages, where counter value 0 have two pages. The page fault appears, and pick just one of them randomly.
PLZ HELP FAST
The third party which is authorized to make a final decision in a dispute is called the ______.
a.
Mediator
b.
Arbiter
c.
Supervisor
d.
Manager
Please select the best answer from the choices provided
A
B
C
D
Answer:
This is called an Arbiter!
Explanation:
A somehow similar task belongs to the mediator, that is to help in solving of the conflict, but the mediator does not have the power of making a final decision. The Arbiter however takes the final decision and all the parties are expected to accept this decision.
who ever can get me the lyrics to raining tacos will get 46 points + the crown! i want the song!
Explanation:
Lyrics
It's raining tacos
From out of the sky
Tacos
No need to ask why
Just open your mouth and close your eyes
It's raining tacos
It's raining tacos
Out in the street
Tacos
All you can eat
Lettuce and shells
Cheese and meat
It's raining tacos
Yum, yum, yum, yum, yumidy yum
It's like a dream
Yum, yum, yum, yum, yumidy yum
Bring your sour cream
Shell
Meat
Lettuce
Cheese
Shell
Meat
Lettuce
Cheese
Shell
Meat
Cheese, cheese, cheese, cheese, cheese
It's raining tacos
Raining tacos
Raining tacos
It's raining tacos
It's raining tacos
Raining tacos
Raining tacos
Shells, meat, lettuce, cheese
It's raining tacos
It's raining tacos
Answer:
Explanation:
is that even a real song??
btw i answered so the other guy can get brainlest annnnnnd bc i want the point LOL
4. Which of the following is a face-to-face meeting between the hiring party and the applicant?
A. Interview
B. Application
C. Résumé
D. Reference
Answer:
A. interview
Explanation:
first calculating device
Answer:
abacus is first calculating device
PLEASE HELP! Please dont answer if your going to guess
You have three modes for opening a file. You wish to create a new file and write data to
the file. What letter belongs in this line of code?
myFile = open("another.txt", "_____")
r
w
a
d
Answer:
r
Explanation:
I literally learned this today when trying to make a python server with an html file:)
Answer:
w
Explanation:
What browser do you use?
Brave
Chrome
Firefox
Opera
Edge
Tor
Answer:
Explanation:
What is a bounding box
Answer:
bounding or enclosing box for a point set in N dimensions is the box with the smallest measure within which all the points lie.
Functions of file in computer
[tex]\huge{\textbf{\textsf{{\color{pink}{An}}{\red{sw}}{\orange{er}} {\color{yellow}{:}}}}}[/tex]
File in computers are used to store data, information and commands.
Thanks hope it helps.Pls mark as brainliest.Engineers at Edison Laboratories developed a _____ strip that allowed them to capture sequences of images on film.
kinetoscope
selenium
cotton
celluloid
Answer:
Celluloid
Explanation:
It is Sis