Answer: Convenience
Explanation:
good job
Explanation:
i just need points but i need the answer too
The intersection of column D and row 6 is a cell with a cell address of
Select one:
a. D:6
b. D6
c. 6:D
d. 6D
Answer:
C. 6:D
Explanation:
Answer:
6:D
Explanation:
This works for plato but as for any other testing site I am unaware of.
Edmentum Plato Course - Learning in A Digital World: Strategies for Success
How can a student tell if a piece of research is current?
A.
The information was written recently or has been updated recently.
B.
The ideas fit with what is widely known about the topic now.
C.
The writer of the information is still writing other pieces.
D.
The website the information is from is up to date and still active.
Answer:
A
Explanation:
The information was written recently or has been updated recently.
name the statement which is used at end of each case from computer subject
(plz answer fast and correct i will mark as brainlist ......)
Answer:
In computer programming, a statement is a syntactic unit of an imperative programming language that expresses some action to be carried out.[1] A program written in such a language is formed by a sequence of one or more statements. A statement may have internal components (e.g., expressions).
Many programming languages (e.g. Ada, Algol 60, C, Java, Pascal) make a distinction between statements and definitions/declarations. A definition or declaration specifies the data on which a program is to operate, while a statement specifies the actions to be taken with that data.
Statements which cannot contain other statements are simple; those which can contain other statements are compound.[2]
The appearance of a statement (and indeed a program) is determined by its syntax or grammar. The meaning of a statement is determined by its semantics.
how do you hack someone's wifi. (Hacker needed)
Answer:
Ask God he knows all
Explanation:
How did imperialism lead to WWI? A The debate of the morality of imperialism created tensions around Europe b Native people were conquered and rebelled against Europe c Europe went into an economic depression when imperialism failed d European nations competed and made alliances to control colonies
Answer:
d. European nations competed and made alliances to control colonies.
Explanation:
The world War I was a period of battle between various countries from 1914 to 1918. It started formally on the 28th of July, 1914 and ended on the 11th of November, 1918.
Imperialism can be defined as a policy, ideology, or advocacy that sought to extend a country's power, dominion, authority and influence over another country through diplomacy, use of military force or colonization (direct territorial acquisition).
This ultimately implies that, imperialism is an advocacy or policy that is typically used to impose or extend a country's power, dominion, authority and influence. It simply means to seek colonies of other nations or countries.
Hence, imperialism led to WW1 because European nations competed and made alliances to control colonies.
In conclusion, there was an eagerness on the part of European Nations to gain colonial territories that were owned by other rival nations.
Does a Laser Printer use its beam to attach dry powdered ink to a sheet of paper?
Answer: A laser printer is different only in terms of ink heads. Hile Traditional Printers use physical contact to embed ink onto the paper laser jets use laser beams with inks to forms impressions into papers. They require no special paper to print. So probably not.
Which sentence best justifies the benefits of using enterprise systems?
Early systems (in the 1960s) focused on the automation of individual functions, such as financial accounting and inventory management, primarily in the manufacturing industry. In the 1970s, the systems allowed planning of product requirements. Resource planning then began, which included not just shop floor planning but finance, engineering, human resources, distribution, and project management planning activities as well.
We now use enterprise systems that integrate all functions, including inventory control, accounting, and human resources. These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency. Extended ERP systems include CRM, SCM, and advanced planning and scheduling. New systems include capabilities for business intelligence and cloud-based computing.
Answer:
These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency.
Explanation:
I need help I have questions I need answers in coding html,css,js and python.Fast
The purpose of the sleep method is to reduce the amount of energy the program uses.
True
False
The _____ is a collection of webpages that use the internet.
pseudocode
World Wide Web
Python
server
Which of the following lines of code would correctly create a list called weapons?
weapons == [“sword”, “sling”, “knife”]
weapons = [“sword” or “sling” or “knife”]
weapons = (“sword”, “sling”, “knife”)
weapons = [“sword”, “sling”, “knife”]
Which of these lines of code would import both the random and the time modules?
import random, time
import random and time
time.import, random.import
import(random, time)
When using HTML, your text should be placed between the opening and the closing tags.
True
False
Answer:
1. True
2. World Wide Web
3. weapons = [“sword”, “sling”, “knife”]
4. import random, time
5. True.
Explanation:
For number 1 I'm not quite sure since I never personally used it, but it does reduce CPU usage when activated so it's very possible it's true.
Every single device can be connected to every other device on network, making the network mesh. This statement is True or False? *
1 point
True
False
Answer:
true
Explanation:
we can connect to any device which has a network connection
Help Please! Computer science question !!!!!!!!!!20 points!!!
Answer:
45 abc
Explanation:
Which WYSIWYG editor keeps the code clean and validates HTML code
?
A. MS Word
B. Kompozer
C. Gedit
D. Notepad
E. BlueGriffon
Answer:
E. BlueGriffon
Explanation:
Answer:
b. KompoZer
Explanation:
KompoZer is free software. You can use it on Windows, Mac OS, and Linux. It has a customizable interface with modified toolbars. It validates HTML against the current web standard and keeps the code clean.
Which of the following is a table which can be rearranged to analyze data in a variety of ways?
A. Pivot Table
B. HLOOKUP Table
C. VLOOKUP Table
D. PivotLookup
Answer:
A. Pivot Table
Explanation:
Given that a Pivot Table is a form of a table in statistics that comprises various data of several tables in a shortened form.
This table is then used to carry out analysis of data in numerous ways to reach a meaningful conclusion to make a decision.
Hence, in this case, the correct answer is a PIVOT TABLE.
Select the effective subject lines.
Timecard Machine Relocated
This Message Contains Some Important New Information About Company Operations
Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed
Test Results Attached
New Expense Reporting Procedures
Servers
IT Department Closed for Server Maintenance
Answer:
dont click the link
Explanation:
Answer:
Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed
Servers
This Message Contains Some Important New Information About Company Operations
Explanation:
i did this on edge 2021 there is a quizlet with most of the questions
RESEARCH TITLE FOR CSS
Explanation:
sksmsskdkdkdkdkkkkdkdkdkdkfkfkfkfkkfkggkhkkkkkbkjvk
What should a user do to find and replace text throughout a field? Use the drop-down menus to complete the steps
1. Put the cursor in the field to search
2. In the Home tab, open the dialog box
3. On the
tab, enter the text to search for and the replacement text
4. After a few instances to make sure the text is being replaced correctly, you can then click
to
change all instances
The thing that a user should do to find and replace text throughout a field are:
1. Put the cursor in the field to search.
2. Open the find dialog box.
3. On the Replace tab, enter the text to search for and the replacement text.
4. Click Replace All to change all instances.
How do you search for and replace text across an entire field?The keys on the keyboard CTRL+F is often used to find. The dialog window for Find and Replace appears. Click the Find tab in the Find and Replace dialog box to search for data. Click the Replace tab to perform a find-and-replace operation.
The operations are:
1. Click Find and Select in the Editing group on the Home tab, then select Replace from the drop-down list.
2. In the dialog box, select the objects you want to Find and Replace by clicking the Options button.
3. Press the Replace or Replace All button.
Therefore, If you want to replace all occurrences of a word or format in a document, use the Ctrl+H Find and Replace function. This is very useful for lengthy papers.
Learn more about Editing from
https://brainly.com/question/15768529
#SPJ1
See full question below
What are the steps to replace one piece of text with another throughout a field? Use the drop-down menus to
complete the statements.
1. Put the cursor in the field to search.
2. Open the _____
dialog box.
3. On the Replace tab, enter the text to search for and the replacement text.
4. Click -------to change all instances.
conceited or self confident? why?
Answer:
self confident
Explanation:
self confident mean that u don't lose your hope and you can focus on your aim then u cann be success in any field
Answer: self confident because you should always love yourself and not need other people option or attention to motivate yourself
Explanation:
8.6 Code Practice: Question 2
Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.
After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.
Answer:
import random
def buildArray():
amount = int(input("How many values to add to the array: "))
array = []
for i in range(amount):
array.append(random.randint(10, 99))
return array
array = buildArray()
print(array)
def sumArray(array):
return sum(array)
sum_array = sumArray(array)
print("The total is: ", sum_array)
Explanation:
this gave me 80%
In this exercise we have to use the knowledge of computational language in python to write the code.
We have the code in the attached image.
The code in python can be found as:
import random
def buildArray():
amount = int(input("How many values to add to the array: "))
array = []
for i in range(amount):
array.append(random.randint(10, 99))
return array
array = buildArray()
print(array)
def sumArray(array):
return sum(array)
sum_array = sumArray(array)
print("The total is: ", sum_array)
See more about python at brainly.com/question/26104476
Use the drop-down tool to select the word or phrase that completes each sentence. Text within a document that is linked to other information available to the reader is called _______. A unique location for a computer on the network is its _______. The ________ is the ability of a network tor cover after any type of failure. The computer that responds to requests from the client computer is known as the ________. A ________ is an ordered list of tasks waiting to be performed.
Answer:
1. Hyperlink
2. IP address
3. Fault tolerance
4. Server
5. To do list
Explanation:
Text within a document that is linked to other information available to the reader is called HYPERLINK.
A unique location for a computer on the network is its IP ADDRESS.
The FAULT TOLERANCE is the ability of a network to cover after any type of failure.
The computer that responds to requests from the client computer is known as the SERVER.
A TO-DO LIST is an ordered list of tasks waiting to be performed.
Answer:
hypertext
IP address
fault tolerance
server
queue
Explanation:
just did it on edg
In a well-developed paragraph - using domain-specific vocabulary and academic writing - address the following writing prompt:
Explain the concepts of GIGO—garbage in, garbage out. Why do you think it’s a helpful concept in coding? How do you think it can be a helpful concept outside of coding?
Answer:
GIGO is a computer science acronym that implies bad input will result in bad output. Good programming practice dictates that functions should check for valid input before processing it. ... A well-written program will avoid producing garbage by not accepting it in the first place.
Explanation:
what are the uses of plotters
Answer:
Plotters are use to produce the hard copy of schematics and other similar applications They are mainly used for CAE applications.They can print on a wide variety of flat materialsHope it helps :)❤
Answer:
Plotters are used to print graphical output on paper. It interprets computer commands and makes line drawings on paper using multicolored automated pens. It is capable of producing graphs, drawings....
what is the fullform of COMPUTER?
Answer:
COMPUTER stands for Common Operating Machine Purposely Used for Technological and Educational Research
Explanation:
Please help! No one is answering these correctly!
A gateway is a common network hardware component that does what?
enables a network to connect to other networks
verifies user credentials to grant network access
connects many devices to a network using a single port
allows specific kinds of data into different parts of a network
What is the best way to prevent the most common cause of network failure?
Avoid using USB cables for connecting devices.
Maintain careful records of networked devices.
Use up-to-date antiviral software to protect computers.
Upgrade routers and servers annually.
Answer:
it is either c or d
I'm 99.5% sure it is C tho
what is the best free website to learn phyton programming
In a single file, you wrote a bike class and used this line of code in the program.
bike A = bike('Acme', 111)
Which statement is true about the code in your file?
O The code to define your class (beginning with "class bike") must come after the line "bike A = bike('Acme' 111)."
The code to define your class (beginning with "class bike") must come before the line "bikeA = bike('Acme' 111)."
O The code to define your class (beginning with "class bike") cannot be in the same file as the line "bike A = bike('Acme' 111)."
O The code to define your class (beginning with "class bike") can come either before or after the line "bike A = bike('Acme' 111)."
Answer:
Explanation:
Based on the available options the one that would be correct would be that the code to define your class (beginning with "class bike") must come before the line "bikeA = bike('Acme' 111)." This is because the line of code declaring the object and initializing it needs to be able to grab the information of the class that it is creating an object of. To do this, the class would need to have already been compiled by the program. It is good practice to have each class definitions as its own separate files but this is not a necessity.
Answer: The code to define your class (beginning with "class bike") must come before the line "bikeA = bike('Acme',111)."
Explanation:
Edge 2022 Correct
PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?
A.
all cabling
B.
all internal components
C.
the CPU
D.
the internal DVD drive
Answer:
a) all cabling hope it helps
What is ransomware
я
Answer:
Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.
Explanation:
:)
PLEASEEE HELPPP im gonna cry
What’s the name for the array of buttons that provides quick access to commonly used commands?
A.
menu bar
B.
toolbar
C.
ruler
D.
scroll bar
Your answer is:
B. toolbar
Answer:
B) Toolbar
_______________
Join for a pack battle loud microphone.
pLZ PLZ PLZ HELP I HAVE SO MANY MISSING ASSINMENTS. why is physical security so important and necessary for both personal users and businesses?
1. Harold Worden, then 56-years-old, stole Kodak property
that was worth millions of dollars. He had worked for
Kodak for over 30 years and did not return confidential
documentation when he left the company in 1992.
He attempted to try and sell his ill-gotten gains to Kodak's
competitors while trying to start his own consulting firm.
The following scenario is an example of?
Answer:
Industrial espionage
Explanation:
Espionage is defined as the act of spying or the use of spies to acquire information on the activities and plans of a government of another country or those of a company in a competitive market
It is the practice of obtaining confidential or secret information and can be considered a felony depending on the case circumstances and the manner of damages caused by the act which is provable and made by the claimant
Industrial espionage is also known as economic espionage