Answer: it’s B
Explanation:
I just took the test and got it right. The other answer is incorrect.
If you delete a conversation many times with someone like this, will you stop receiving messages from them, even if you text them
e. Define the term ‘user interface’, giving examples.
f. What is a mobile application?
g. Explain briefly what a multi-tasking system is and how it works?
Answer:
uExplanation:
iiiiiiiiiiiiiiiiiiii
Directions: True or False. Write True if the statement is correct, and False if it is incorrect. Write your answer on the space provided before the number.
1. You can insert illustrations easily by using the illustrations group of the Insert Tab.
2. Artistic effects improves brightness, contrast and sharpness.
3. Graphic design can be used by companies to promote and sell products through advertising.
4. Graphic balance uses visual compositions to solve problems and communicate ideas through typography, imagery, color and form
5. Camera is a representation of the external form of a person or thing in art.
6. Graphics are visual images or designs on some surface, such as a wall, canvas, screen, paper, or stone to inform, illustrate, or entertain.
7. To quickly change the appearance of the shape, click the drop down arrow of the Shape Styles then click one of the gallery of shape styles.
8. Mail Match is a word processing feature that allows you to easily create multiple letters, labels, envelopes, nametags, or catalogue documents to group of people as stored in a list in a database or spreadsheet.
9. Principles of graphic design are set of guidelines that help a design achieve effective composition.
10. Graphics may be captured by optical devices such as cameras, mirrors, lenses, telescopes, microscopes, and natural objects and phenomena, such as the human eye or water.
Answer:
kskkdkzkKlallakskfjdjxkkakmdnisiamnnedjzmmwirjfkdks
If you can tell me what Ella Mai's last name is I'll mark you brainliest.
Ding Dong
I know you can hear me
Open up the door
I only want to play a little
Ding Dong
You can't keep me waiting
It's already too late
For you to try and run away
I see you through the window
Our eyes are locked together
I can sense your horror
Though I'd like to see it closer
Ding Dong
Here I come to find you
Hurry up and run
Let's play a little game and have fun
Ding Dong
Where is it you've gone to?
Do you think you've won?
Our game of hide and seek has just begun
I hear your footsteps
Thumping loudly through the hallways
I can hear your sharp breaths
You're not very good at hiding
Just wait, you can't hide from me
(I'm coming)
Just wait, you can't hide from me
(I'm coming)
Just wait, you can't hide from me
(I'm coming)
Just wait, you can't hide from me
Knock Knock
I am at your door now
I am coming in
No need for me to ask permission
Knock Knock
I'm inside your room, now
Where is it you've hid?
Our game of hide and seek's about to end
I'm coming closer
Looking underneath your bed but
You're not there, I wonder
Could you be inside the closet?
Ding Dong
I have found you
Ding Dong
You were hiding here
Now you're it
Ding Dong
Finally found you, dear
Now you're it
Ding Dong
Looks like I have won
Now you're it
Ding Dong
Pay the consequence
Ding Dong
Looks like I have won
Now you're it
Ding Dong
Pay the consequence
Answer:
her last name is Howell so her full name is Ella Mai Howell lol
Explanation:
Hi, I am from India. Our brainly platform isn't so good, many of 'em keep spamming questions that I ask. US platform seems much cleaner. Anyways, just wanna know, what do you guys think about India? Give your honest reviews.
Which person would be the best fit for a career in the Information Technology field?
a social person with a logical mind
a confident person with a quick mind
a creative person with a flexible mind
a strong person with a methodical mind
I think it is A please correct me if im wrong, answer asap
Answer:
A social person with a logical mind is answer.
Which of the following is not a common operating system? A) Apple B) Linux C) Unix D) Windows Vista
Answer:
A) Apple
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
Apple is not a common operating system.
However, MacOS is an operating system that is designed and developed by an American multinational technology company called Apple Inc.
PLZ HELP ME LOLZ
In the mentioned switch case structure, select the program statement that the processor will execute after verifying the conditional
Statement
Answer:
The console will print "Unknown Grade"
Explanation:
The grade is not A, B, C, or D
What is data and what are some of the kinds of data that are increasingly being stored online? What is a "data breache
for governments, organizations, and individuals? THIS IS MY LAST QUESTION I WILL MARK U BRAINLIEST OR PAY U IDC PLEASE JUST HELP
Answer:
data is just information about something
Data breaches may change the course of your life. Businesses, governments, and individuals can experience huge complications from having sensitive information exposed.
Explanation:
Select the correct answer.
Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?
OA.
inspection
OB
internal audit
Ос.
test review
OD
walkthrough
Answer:
A. inspection
Explanation:
To find - Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?
A. inspection
B . internal audit
C. test review
D . walkthrough
Proof -
SQA process - Software Quality Assurance process
The correct option is - A. inspection
Reason -
Formal review in software testing is a review that characterized by documented procedures and requirements. Inspection is the most documented and formal review technique.
The formality of the process is related to factors such as the maturity of the software development process, any legal or regulatory requirements, or the need for an audit trail.
The formal review follows the formal process which consists of six main phases – Planning phase, Kick-off phase, the preparation phase, review meeting phase, rework phase, and follow-up phase.
Answer:
answer: test review
The library ....................... open until six o’clock yesterday. *
1 point
(A) remain
(B) remains
(C) remained
(D) will remain
CodeHS Go Down the Slide: Part One Anyone know what it is?
I don't know what you are talking about.
3.1.14 Wormhole CodeHS
May I have it in a copy and paste, please?
Answer:
3.1.14 Wormhole CodeHS
Explanation:
3.1.14 Wormhole CodeHS
What is operating System? Graphically explain the categorias
of operating System. Also mention the type of operating
System you are using
in your home.
Answer:
.............................................................. ..........
Select the correct answer.
Which document represents a written record of how the software should perform and the results of its performance?
A. STD
B.SDD
c.SPMP
D.SRS
E. RTM
Note that from the option given, the document that presents a written record of how the software should perform and the results of its performance is: SRS (Option D)
What is SRS?An SRS (Software Requirements Specification) is a document that represents a written record of how the software should perform and the results of its performance.
It typically includes a detailed description of the functions and features that the software is expected to provide, as well as any constraints or limitations on its operation.
The SRS is used as a reference for both the development team and the client, and it helps to ensure that everyone involved has a clear understanding of what the software is expected to do. Other common documents that may be used in software development include the STD (Software Test Description), the SDD (Software Design Document), the SPMP (Software Project Management Plan), and the RTM (Requirements Traceability Matrix).
Learn more about SRS:
https://brainly.com/question/24003956
#SPJ1
Abigail, Henry, Nelson, and Olivia, whose last names are Brown, Garcia, Lewis, and Murphy, are a dolphin trainer, a hotel chef, a landscaper, and a surgeon.
Find each person’s full name and occupation.
1. Henry and Murphy work outdoors, but Nelson and Brown work indoors.
2. The surgeon does not know Abigail or Brown.
3. The landscaper, who is not Lewis, is expert at his work.
Answer:
Henry Garcia, Landscaper.
Abigail Murphy, Dolphin Trainer.
Olivia Brown, Hotel Chef.
Nelson Lewis, Surdeon.
Explanation:
Trust me, I double checked.
Most search engines provide specific pages on which you can search for____ and
_____, among other types of content.
1.
A. government reports
B. images
C. software programs
2.
A. news
B. essays
C. computer games
Answer: c
Explanation: a
Most search engines provide specific pages on which you can search for government reports and news, among other types of content. The correct options are A and A respectively.
What is a search engine?A search engine is a piece of software that enables users to use keywords or phrases to get the information they're looking for online.
Even with millions of websites available, search engines are able to deliver results swiftly by continuously monitoring the Internet and indexing every page they come across.
A software programme used to do web searches is known as a search engine. They conduct systematic searches of the World Wide Online for specific data that is defined in a text-based web search query.
The majority of search engines offer specific sections where you can do searches for news and reports from the government as well as other kinds of content.
Thus, A and A are the correct options respectively.
For more details regarding search engine, visit:
https://brainly.com/question/11132516
#SPJ2
Which technology or technique standardized the process of publicly sharing and accessing information over the internet?
A.
TCP/IP
B.
HTTP
C.
dial-up connections
D.
coaxial cables
E.
internet forum
Answer:
B. HTTP
Explanation:
The standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.
Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.
HTTP is an acronym for hypertext transfer protocol and it can be defined as a standardized application layer protocol used for the transfer of data (Informations or files) such as image files, HTML files, query results, etc., over the internet (world wide web).
Hence, Hypertext Transfer Protocol (HTTP) is a technology that standardized the process of publicly sharing and accessing information over the internet. Thus, it's a standard protocol that ensures that the security of a data isn't compromised as they're been transferred from one node to another over the internet.
Also, the default port used for Hypertext Transfer Protocol (HTTP) is 80.
Answer: HEY THERE, YOU ANSWER TO THIS QUESTION IS (B)....
HOPE THIS HELPS HAVE A NICE DAY ...... :)
Explanation:
What is a collection of quantities or characters computers use to perform operations?
A. Data
B. Functions
C. Information
D. Statistics
Answer:
I believe it is A, data.
Explanation:
Hope this helped :)
Answer:
A. Data
Explanation:
I just took the module exam.
How can i fix a all white phone screen
Answer:
Since you're unable to see anything on the screen, this will be a manual job. To Restart, hold down the Volume Up key and Power Button (on the side of your smartphone) at the same time until the phone shuts down, it will automatically come up again. or
In order to resolve this issue, users should double tap the iPhone's screen, using three fingers pushed together. The triple-finger double tap will restore the screen back to its default view.
In many cases, all it takes for the user to fix his iPhone's white screen is to restart the phone. However, when a regular restart does not help, the user needs to try a hard reset, which is a more powerful restart.
With a hard reset, the user does not have to worry about touching or seeing the screen. This type of restart also clears more memory without wiping out the iPhone's data.
To try a hard reset, the user must simultaneously press and hold the power button and home button. If the user has an iPhone 7, he should hold the power button and volume decrease button at the same time. The user must continue to hold the two buttons until the phone's screen flashes. When he sees the Apple logo, the user can release the buttons and allow the iPhone to start.
There is an alternative button combination the user can try if the aforementioned hard reset instructions do not work. First, he needs to press and hold the power button, volume increase button and home button at the same time. The user must keep holding these three buttons until the screen goes dark. Then, the Apple logo should appear. Once the user sees the Apple logo, he should release all of the buttons and let the phone load.
Explanation:
mrk me brainliest please.
During system testing, developers test the program in an environment that is very similar to how the program will eventually be used.
A. True
B. False
Answer:
True
Explanation:
When it is time to test a system, a great way to test and confirm the program is safe, and ready is in the most used environment.
Select the correct answer.
Mike needs to write the primary objectives of a project in a project plan. In which section should he write them?
A.
scope
B.
overview
c.
baselines
D.
schedule
Answer:
overviews
Explanation:
Which option is the easiest way to configure macros in Access 2016?
O Edit VBA code.
Create VBA code.
O Use the Macro Builder.
O Use the Database Analyzer.
The easiest way to configure macros in Access 2016 is to use the Macro Builder. The Macro Builder is a graphical interface that allows you to create macros without having to write any code.
Here's how you can use the Macro Builder:
1. Open your Access database and go to the "Create" tab in the ribbon.
2. In the "Macros" section, click on "Macro" to open the Macro Builder.
3. In the Macro Builder window, you will see a list of actions on the left side. These actions represent different tasks that you can perform using macros.
4. To create a macro, you can simply drag and drop actions from the left side into the main area of the Macro Builder.
5. Once you have added an action, you can specify any required parameters by clicking on the action and filling in the necessary information.
6. You can add multiple actions to your macro by repeating steps 4 and 5.
7. To run the macro, you can save it and then assign it to a button or event in your Access database.
Using the Macro Builder is a great option if you're new to programming or if you prefer a visual approach to creating macros. It allows you to easily build and customize macros by selecting actions from a list and setting parameters. This way, you can automate repetitive tasks in your Access database without needing to write any code.
To learn more about macros
https://brainly.com/question/30057195
#SPJ8
If your e-mail program has a spell checker, you don't have to proofread your e-mail messages. Spell checker does it for you and is better at it than humans.
True
False
Answer:
False you would still have to proof read to make sure you don't sound dum⁶ saying what ever your trying to say and spell check doesn't always correct things
The portion of the IoT technology infrastructure that focuses on how to transmit data is a. hardware. b. applications.
Answer:
The correct answer is not among the two options listed above (hardware, and applications). The correct answer is "connectivity"
Explanation:
The answer would have been "hardware" if the portion of the IoT technology infrastructure focuses on sensors that take note of the changes in the environment the technology is used. I would have also been "applications" once it focuses on controlling what and how information is captured.
The IoT (Internet of Things) uses sensors, computer applications, and hardware to make devices interact processing and sending large data between computers, collecting data from their surroundings to update the system, and it also uses connectivity to transmit data. This technology is employed in so many fields like health care, Automobile industries, and so more. An example is Self-driving cars which allow devices to be connected to a cloud system.
PLZ WILL MARK BRALEYST
If an organization’s technology is compromised, it can spell disaster for the company’s _____. Select 3 options.
operations
spoofs
reputation
revenues
software bugs
Answer:
Operations, revenues, and reputation
Explanation:
i just got the question right, pls mark brainlyest
Answer:
Your answer will be the following;
1. Operations
2. Revenues
3. Reputation
Explanation:
If the technology of the organization is not correct then it will cause massive problems to the operators, revenues, and reputation.
Therefore, your 3 answers will be operators, revenues, and reputation.
Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.7 GHz Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do
Answer:
double the bandwidth assigned per channel to 40 MHz
Explanation:
The best way of doing this would be to double the bandwidth assigned per channel to 40 MHz. This will make sure that the capacity is more than sufficient. This is simply because the bandwidth of a channel represents how much information can pass through the channel at any given second, the larger the channel, the more information/data that can pass at the same time. Therefore, if 20 MHz is enough for the network, then doubling this bandwidth channel size would be more than sufficient capacity for the network to handle all of the data.
Select the correct answer.
Which statement is true with regard to project scheduling?
O A. Scheduling in plan-based processes does not change with the progress of the project.
B.
Plan-based processes use an iterative approach for scheduling each phase of the project.
O c.
Scheduling in an agile process involves planning the short-term phases of a project.
OD
Agile processes require less detail than plan-based processes do in an initial project schedule.
Answer:
Agile processes require less detail than plan-based processes do in an initial project schedule.
The statement which is true about project scheduling is, “Agile processes require less detail than plan-based processes do in an initial project schedule."
What is project scheduling?Project scheduling is an activity under project management that lists and schedules all the activities, tasks, and objectives related to that particular project. The project schedule makes the work more efficient and smoother since everything is planned prior to its start.
Project scheduling is a task that is genrally used by the managers to list and make a timeline of their projects in order to complete them timely.
Thus, the claim that Agile processes require less detail than plan-based processes do in an initial project schedule. As a result, option D is the best one.
Learn more about project scheduling here:
brainly.com/question/15126136
#SPJ6
Both instructions and data in a digital
computer are represented as binary
digits. True False
Answer:
False
Explanation:
insturctions are represented in binary numbers, data are represented in decimal numbers.
Need the answer ASAP!!! I’ll mark brainliest if correct
Select the correct answer.
Project team member Kevin needs to define the use of change bars to show deleted and modified paragraphs. Under which standards does
this fall?
O A.
interchange standards
OB.
identification standards
O C.
update standards
OD.
process standards
O E.
presentation standards
Answer:
I think it's c because it's change and with change most the time change comes with updates
Answer:
update standards
Explanation: