Don't click on this I am testing... I want the points so.
Answer:
ok
Explanation:
Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of her first subheading, not the format of the main heading, to the second subheading. Which feature of Word would help her to complete this task efficiently? the Styles task pane the Replace task pane the Format Painter feature the Copy and Paste feature
Answer:
C. format painter
Explanation:
Answer would be C, I guessed it and got it correct.
A _________________ operating system accepts random enquires from remote locations and provides an instantaneous response
Answer:
Real-time operating system (RTOS) are
Explanation:
Real-time operating system (RTOS) are operating systems that are meant for use with time sensitive applications and systems that have very strict time requirements such as in computers serving air traffic control systems, robot systems, or missile control systems.
The processing time for each process are in the order of tenths of a second or shorter time frames using given constraints.
Real-time systems are applied in life saving systems like parachutes or air bags so as to prevent injuries in the event of an accident.
Which troubleshooting utility allows generating DNS request messages and transmitting them to specific DNS servers on the network?
Answer:
nslookup
Explanation:
Which troubleshooting utility allows you to generate DNS request messages and transmit them to specific DNS servers on the network?
ans -nslookup
Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of her first subheading, not the format of the main heading, to the second subheading. Which feature of Word would help her to complete this task efficiently?
Answer:
the Format Painter feature
Answer:
the format painter feature
Explanation:
Match the type of cyber attackers to the description.
1. State-sponsored attackers
2. Hacktivists
3. Terrorists
4. Script kiddies
a. Gather intelligence or commit sabotage on specific goals on behalf of their government.
b. Make political statements in order to create an awareness of issues that are important to them.
c. Make political statements, or create fear, by causing physical or psychological damage to victims
Answer:
The answer can be defined as follows:
In choice 1 the answer is the point "a".
In choice 2 the answer is the point "b".
In choice 3 the answer is the point "c".
Explanation:
In the given question the last choice is missing. so, we define only the first three matches and these explanations can be defined as follows:
In point 1, It is used on behalf of their authority for intelligence collection or disruption for specific purposes. It has one of three aims to manipulate and investigate the flaws of national infrastructure. it also collects information and uses capital from structures and people. In point 2, It is used to make political declarations, which raise awareness of matters which is important to them. In other words, we can say that it is a community of criminals uniting in pursuit of the social goal to carry out cyber attacks. In point 3, It means a person who encourages and spreads errors. Someone has misguided confidence. It is used to make political claims or panic by damaging the victims physically or psychically.Which file sharing client component intercepts requests for resources and examines it to determine whether the resource is local or remote?
Answer:
"Redirector " is the correct response.
Explanation:
Technology that routing desktop computers (clients) demand information to the computer within a LAN. The redirector software is introduced to the Computer in something like a Windows network that intercepts or captures requests for documents as well as printers, however if necessary, direct those to just the correct connected system.Select the correct answer. Andy wants to become a multimedia producer. Which degree can help him achieve this goal? A. bachelor’s degree in visual communications B. bachelor’s degree in fine arts C. bachelor’s degree in filmmaking D. associate degree in web design
Answer:
C. bachelor’s degree in filmmaking
Explanation:
Because Andy wants to become a multimedia producer, the degree that would best help him achieve his goal is a bachelor's degree in filmmaking.
Multimedia has to do with both audio, video and graphics or animations because it encompasses multiple media files.
Filmmaking has to do with the various forms of making and producing films. Filmmaking has to do with multiple media (multimedia) and it would help him achieve his goal.
Answer: A. bachelor’s degree in visual communications
Explanation: Employers prefer people with a bachelor’s degree in multimedia, visual communications, journalism, graphic design, marketing, or a related field
As you begin to develop a software application, what is one of the most helpful tools to ensure a quality product?
variable processing chart
central processing output chart
syntax and tags chart
input processing output chart
The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incoming signal on any of its ports is re-created and sent out onany connected ports.
a. Router
b. Switch
c. Bridge
Complete Question:
The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.
Group of answer choices
a. Router
b. Switch
c. Bridge
d. Hub
Answer:
d. Hub.
Explanation:
A hub can be defined as a layer one (physical) device used for connecting various network devices such as switches and routers in a local area network (LAN). It comprises of many ports which are used for connecting segments of a local area network (LAN). Hubs are generally considered to be unintelligent because when frames are received at a port, it is then copied to every other connected port on the network.
Hence, the main disadvantage of using a hub is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.
Which of the following is not a concern that has come out of the widespread adoption of the Internet?
Censorship of information
Increased anonymity
Selecting the correct browser to use for the sites you want to visit
Unauthorized sharing of copyrighted information
Answer:
The correct option is;
Selecting the correct browser to use for the sites you want to visit
Explanation:
Censorship of information is the subduing of information based on the consideration of such information being harmful or inconvenient
Increased anonymity
Making an individual anonymous which is one of the capabilities of the internet, is seen as encouraging unethical behavior and promoting discussions which are deemed uncivil in a commonly shared space online.
Unauthorized sharing of copyrighted information
The sharing and distribution of copyrighted material is against the law but it is a common occurrence and in various formats online
Out of the given options, selecting the correct browser to use for the sites you want to visit is the one that is not a concern.
(BRAINLIEST QUESTION) When your friend Sarah turns on his computer, she hears four beeps. The computer won’t fully boot. Sarah has a Dell computer with a quad-core processor and has recently upgraded her RAM. Apply the troubleshooting methodology to help her understand and resolve this problem; I have them listed below: Identify the Problem Internet Research Establish a Theory of Probable Cause Test the Theory Establish a Plan of Action Implement the Solution or Escalate Verify Full System Functionality Document Findings
Answer:
4 beeps indicate a Memory Read / Write failure. Try re-seating the Memory module by removing and reinserting it in the slot. this could mean it could've just jiggled loose after a while or dust, there could be a hundred other problems but those are the two most common
Write a function silence (typecode, length) that returns a new data array containing all zeros of the given type code and length.
python programming
Answer:
Following are the code to this question:
import array as a#import package array
def silence(typecode, length):#defining method silence that accepts two parameters
Val= a.array(typecode, [0]*length)#defining Val variable that stores zeros of the given type code and length
return Val# use return keyword for return Val variable value
typecode = input('Enter typecode value: ')#use input method for input
length = int(input('Enter length value: '))#defining length variable that input integer value
print(*(silence(typecode, length)))#use print method to call silence method
Output:
Enter typecode value: b
Enter length value: 10
0 0 0 0 0 0 0 0 0 0
Explanation:
description of the code:
In the above-given Python code, Firstly we import a package that is the array, after that a method "silence" is defined that accepts two variables in its parameter that is "typecode and length". Inside the method, the "Val" variable is declared, which is used to calculate and store all zeros of the typecode and length variable. Outside the method, "typecode and length variable" is used for input the value from the user end-use the print method to call the function "silence" with an asterisk.Do you think that people have a “right” to remain anonymous online? Why or why not?
Answer:
Yes
Explanation:
because everyones privacy should be respected
The Event Viewer(Microsoft windows) or console(apple Mac OS x) is used for what purpose?
Answer:
it is used to view incidents recorded in the Application, Security, and System logs
Explanation: pls make my answer brainliest
Answer:
C) it is used to view incidents recorded in the Application, Security, and System logs
Your company has just opened an office in another state and you need the computers to communicate between the offices. What type of network should you create?
Answer:
WAN network
Explanation:
A WAN network is an abbreviation for wide area network. This telecommunication network is mainly used for networking computers. They are not tied to just one location. They can also be called network of networks. It connects several LANs. The lans stand for local area and networks and they are computer networks and devices that are connected to each other within a geographical area.
write a progrma in java to input a letter. If it is an upper case letter then encode it by next 5th letter,otherwise encode it with 3rd previous letter in the ASCII code
BK Kaunas sa job I am b2k
In the context of IT jobs in the information systems field, a ____ is typically responsible for providing network and cybersecurity.
Answer:
Network Administrator or Network Security Engineer
Explanation:
This seems like an excerpt from a textbook or article, but in the workplace, usually, the network administrator or a network security engineer are responsible for providing network and cybersecurity resources.
which part of the word application window should the user go to for "read the document"
Answer:
idk
Explanation:
PLEASE HELP !!!!!!!!!!
An assignment my gaming and animations teacher gave me said to explain (insert game)’s objectives, operation, obstacles, and outcomes. I don’t know what an operation means here. Please help
Answer:
Operation means what does the game do? What is the purpose. If you press left arrow key what happens...etc. That is what operation is in "gaming" sense.
Hope i helped!
Jack knows how to use word processors, spreadsheets, and presentation software. He also has a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Jack has _____ literacy.
Answer: computer literacy
Given the above information, it can be concluded that Jack has computer literacy.
What is Computer literacy?This is known to be defined as given knowledge and ability that a person has in the area of the use of computers and its related technology in an efficient manner.
Note that Given the above information, it can be concluded that Jack has computer literacy.
Learn more about computer literacy from
https://brainly.com/question/20892559
#SPJ6
What do production designers have to have extensive knowledge of when they are involved in the production of a motion picture?
A. The era in which the story happens
B. The place in which the story is set
C. The movie’s characters
D. All of the above
Answer:
The correct option is;
D. All of the above
Explanation:
The role of a production designer in film and television production involves portraying the generally perception and appearance of the narrative. The production designer is responsible for addressing the viewer perception of the location, the period in time of the narrative about the leading character, the depiction of the acts of the and experiences of the characters and the reason for their acts and experiences.
The production designer have an essential role in movie production and television programming and they work first hand with the motion picture cinematographer, director and producer.
Answer:
All of the above
Explanation:
edg2021
The production designer must have a solid understanding of many aspects of the film’s production. Location and time period of a film are especially important from a production design perspective, as is the amount of money available for production design. This means A and B are 100% correct, so all of the above is the only one.
he most important reason study habits are necessary is so students can become more popular. have academic success. improve social skills. have time for sports.
Answer:
academic success
Explanation:
studying is for your school. your welcome.
The most important reason why study habits are necessary is that students have achieved improved social skills. Thus, the correct option for this question is C.
What is the significance of study habits?The significance of study habits is determined by the fact that increase your confidence, competence, and self-esteem. They can also reduce anxiety about tests and deadlines.
By developing effective study skills, you may be able to cut down on the number of hours spend studying, leaving more time for other things in your life.
Consistency is key when it comes to studying, so do your best to make a habit of it! It's a good idea to find a spot on campus where you feel comfortable and inspired to dive into a successful study session.
In modern times, the main objective of study habits is to become social and work for society in such a way that enhances each and every character and aspect of that.
Therefore, the most important reason why study habits are necessary is that students have achieved improved social skills. Thus, the correct option for this question is C.
To learn more about Study habits, refer to the link:
https://brainly.com/question/18949374
#SPJ6
Which tab do you select to execute Mail Merge option?
Answer:
I don't know if you are not the intended recipient, you can get it right away and we are a couple days, so I'm sure it was the only one that has
Explanation:
uueej, but it was the only one that is a great way. . . . . , and then you have a lot more to do. . the other side, but the most of us who we were all very
Question 1
Which of the following would Java recognize as a String?
"%.*
i 8a
"4bout T!me"
O "word"
Question 2
Answer:
The answer is "4bout T!me" and "word"
Explanation:
In the given java program code, the two choices that are "4bout T!me" and "word" were correct, because it uses the double quote, and its example can be defined as follows:
Example:
public class Exa //defining class Exa
{
public static void main(String[] args) //defining main method
{
String x ="4bout T!me";//defining String variable x and assign value
String y ="word";//defining String variable y and assign value
System.out.println(x+" "+y);//print message
}
}
Output:
4bout T!me word
What will be displayed if the following Java code segment is run? System.out.println("one "); System.out.print("two "); System.out.println("three");
I'm not familiar with Java, but I'm familiar with C#.
Ok, back to the point. Those lines will print in your console: "One", "Two" and "Three"
All of the following are basic functionality provided by e-commerce merchant server software except: Question 22 options: A) productivity software. B) a product catalog. C) a shopping cart. D) credit card processing.
Answer:
The correct answer is option A "productivity software"
Explanation:
An e-commerce merchant server software is a software that enables sales exclusively over the Internet. It is a software that connects to a company server with the aim of allowing sales of the company's products to take place over the internet. Here, sales are capped with customers even paying for what they purchase online.
A product catalog in an e-commerce merchant server software shows lists of essential products that buyers can purchase online. These lists include product features, price, color, brand, size, and so many other examples.
A shopping cart is some sort of functionality in eCommerce software used to collect the items potential buyers select online with the aim to make it easier for the buyers to see all the items selected after shopping, make necessary adjustments if need be before payment.
Credit Card processing allows e-commerce merchant server software make buyers get card payment options to get their payment processed. In the authorization stage, the merchant must obtain approval for payment from the issuing bank. Some banks would require their client to activate this payment option with them at the bank before such clients are allowed to do e-commerce payments.
The correct answer is productivity software because it is a software used for producing information that shows the productivity of a particular group, persons. In other words, productivity software can help produce things that simplify productivity they include worksheets, graphs, digital videos, and so many other examples.
what is the full form of DBMS
Answer:
Database Management System.
Answer:
"Database Management System."
Explanation:
In short, a DBMS is a database program. Technically speaking, it is a software system that uses a standard method of cataloging, retrieving, and running queries on data.
CLS
INPUT "Enter your marks in computer": CS
C>40 THEN
PRINT "You are passed.
ELSE
PRINT "You are failed."
IF
END
DEBUG THE PROGRAM
Answer:
INPUT "Enter your marks in computer";CS
IF C>40 THEN
PRINT "You are passed. "
ELSE
PRINT "You are failed."
END IF
Explanation:
see corrections above.
Why is digital data, at the base level in computers, represented in binary? * 10 points 0's and 1's are the easiest numbers to deal with mathematically. Using decimal or hexadecimal instead would change the meaning of the underlying data. A system with only 2 states is the most efficient way to organize data in a computer. Because other number systems do not allow you to represent both numbers and letters.
Answer:
The representation of the digital data in the computer system in the binary form because it is easier and cheaper to use in the system. It is more reliable to build the machine and the devices for distinguish the binary states.
Computer basically uses the 0 and 1 binary digits for storing the data in the system. The computer processor circuits are basically made up of the various types of transistors that uses electronic signals for the activation process in the system.
The o and 1 are the binary digits that reflect the different states of the transistor that is OFF and ON state.
which of the following would be considered a career in communication? Select all that apply. A actor B author C editor D journalist
Answer:
1. The answers are B and D
2. The answer is A
3. The answer is A
4. The answers are C and D
Are the answers to this question.
A career in communication involves the use of professionals in mass media to to pass messages across to an audience.
Professionals in media work with different companies, organizations and businesses to do the jobs of influencing and educating people or the intended audience about happenings, products and services and practices.
read more at https://brainly.com/question/13391998?referrer=searchResults