Question #1
What do you use to navigate through a file by moving the view
up and down or side to side?
O Title bar
O Ribbon
O Document area
O Scroll bar


Answers

Answer 1
d scroll bar be cause it’s a file which means computer
Answer 2

Answer:

Answer is the Scroll Bar

Explanation:

When you are in a document, the way you move around or navigate in it is by dragging the scroll bar that is to the left of your screen or at the bottom of your screen.  Hope this helps!


Related Questions

Name 3 examples of operating system software that are not Windows based.

Answers

Ubuntu, Linux, and Mint

What are language standards? At this point in your study of programming, what do they mean to
you?

Answers

In computing, a programming language specification (or standard or definition) is a documentation artifact that defines a programming language so that users and implementors can agree on what programs in that language mean.

Choose the two statements that best describe the relationship between HTTP and the World Wide Web

Answers

Answer:

(I) and (III)  statements that best describe the relationship between HTTP and the World Wide Web.

Explanation:

Given that,

The following statements that is describe the relationship between HTTP and the World Wide Web

(I). HTTP and WWW are used in website.

(II).  World Wide Web are not interlinked by hypertext.

(III). WWW is the system of connected hypertext documents that can be viewed on web browsers.

We know that,

HTTP :

The full form of HTTP is Hypertext Transfer Protocol . A protocol  which permits the getting of plans it is called HTTP.

For example : HTML documents.

It is an application of a protocol where any data exchange on the Web.

It is a protocol of online communication and data transfer one system to another system.

WWW :

The full form of WWW is world wide web. It is used as a web which is information systems where documents and other web methods are checked by uniform resource locators, which may be interlinked by hypertext.

It is a collection of webpages.

Hence, (I) and (III)  statements that best describe the relationship between HTTP and the World Wide Web.

1. Which of the following is a result of a successful negotiation?
Mediation
Win-win outcome
Conflict resolution
Consensus

Answers

Maybe a Win win outcome
I guess its Win-win outcome.
Thank you!

The primary reason for networking standards is to: Group of answer choices simplify cost accounting for networks ensure that hardware and software produced by different vendors can work together make it more difficult to develop hardware and software that link different networks ensure that all network components of a particular network can be provided by only one vendor lock customers into buying network components from one vendor

Answers

Answer:

ensure that hardware and software produced by different vendors can work together.

Explanation:

Networking standards can be defined as a set of rules and requirements for data communication which are necessary for the inter-operation of network devices (hardware) and software application processes.

Hence, the primary reason for networking standards is to ensure that hardware and software produced by different vendors can work together. This ultimately implies that, networking standards makes it possible for various vendors and manufacturers to develop or produce networks that avail users the ability and opportunity to share informations and communicate with one another easily.

Some examples of organizations responsible for creating networking standards are;

1. International Telecommunications Union— Telecommunications (ITU-T).

2. International Organization for Standardization (ISO).

3. American National Standards Institute (ANSI).

Additionally, the generally accepted standards for networking are; HTML, HTTP, IMAP, POP, SNMP, SMTP, TCP etc.

6. Write pseudo code that will perform the following. a) Read in 5 separate numbers. b) Calculate the average of the five numbers. c) Find the smallest (minimum) and largest (maximum) of the five entered numbers. d) Write out the results found from steps b and c with a message describing what they are.

Answers

Answer:

Pseudo CODE

a)

n= Input “Enter 5 integer value”

b)

sum=0.0

For loop with i ranging from 0 - 5

Inside loop sum=n[i]+sum

Outside loop avg= sum/5

Print avg

c)

small=n[0] # assume the first number in the list is smallest

large= n[0] # assume the first number in the list is largest

For loop with i ranging from 0 - 5

Inside loop if n[i]<small #if any another number is smaller than small(variable)

Inside if Then small=n[i]

Inside loop if n[i]>large # if any another number is larger than large(variable)

Inside if then large=n[i]

Print small

Print large

d)

print avg

print small

print large

Pseudocodes are used as a prototype of an actual program.

The pseudocode is as follows:

input n1, n2, n3, n4, n5

avg = (n1 + n2 + n3 + n4 + n5)/5

small = n1

large = n1

for i = 2 to 5:

   if n1 > ni then:

       small = ni

   if n1 < ni: then:

       large = ni

print("Average:", avg)

print("Smallest:", small)

print("Largest:", large)

The pseudocode starts by getting inputs for the 5 valuesNext, the average of the 5 values is calculatedThe fourth line iterates through the numbersWithin the iteration, there are 2 conditional statements that calculate the smallest and the largest valuesThe last three lines print the average, the smallest and the largest input

Read more about pseudocodes at:

https://brainly.com/question/24735155

Explain why decomposition will be used in creating the algorithm for the game including two dice.

Answers

I saw this question while reviewing the notes in class

How does the new digital image compare to the one from Challenge A? What effect did taking a larger number of samples have on the image?

Answers

Answer:

their is no image

Explanation:

How many different Microsoft Windows file types can be infected with a virus?

Answers

Phishing, scam, Fraud, just to get to hack your computer.

People convicted of cyberbullying in most states
face no punishment for their actions.
face varying degrees of punishment.
are taught how to use technology positively.
are forced to do community service.

Answers

Answer: The Answer is B. face varying degrees of punishment.

Hope this helps! ^^ (also i know this is the right answer because i got it correct)

Answer:

b

Explanation: the punishment depends on the severeness , so we dont know the exact punishment

When following maintenance procedures, it is important to carefully read the procedures and to complete
each step before moving to the next step.
True or
False

Answers

True, is the way to go

What is the difference between an IP address and an IP Packet?

Answers

Answer:

The IP address is a numerical number assigned to a device when connected to the internet for better identification. Whereas, the IP packet is the packet which contains the total information of the content that is carried over the network from host to destination and vice versa.

Explanation:

I hope this helped and plz give brainliest!

Interpersonal skills are extremely important in production management. true or false

Answers

Answer:

The statement is true. Interpersonal skills are extremely important in production management.

Explanation:

Every manager of any type of sector within a company, be it production, communications, human resources, etc., must have within their abilities those of managing interpersonal relationships with their employees and their superiors. This is so because when dealing with positions of importance within the chain of command, the constant exchange of directives, opinions and indications is necessary, with which it is very important to know how to communicate so as not to generate misunderstandings or discomfort at the time of giving such directives or indications.

Answer:

B: true

Explanation:

edg2021

Which device listed below is NOT a storage device?
ROM
RAM
SSD
Removable FLASH drive

Answers

ssd is not a storage device
Answer: RAM

Explanation: RAM is the temporary memory for the motherboard. It is not used to store your favorite games, music, and documents.

Which of these is an example of gathering secondary data?
searching for a chart
drafting a map
collecting soil samples
interviewing experts

Answers

Answer:

searching for a chart

Explanation:

:)

Answer:a

Explanation:

took the quiz

Choose all of the items that represent functions of the operating system kernel.

memory management

process management

user interface

system input and output (I/O) management

file creation and management

Answers

Answer:

A. memory management

B. process management

D. system input and output (I/O) management

E. file creation and management

Answer:

1,2,4,5

Explanation:

E2020 - Intro to Information Technology

A DBMS commonly receives data update requests from application programs.A. TrueB. False

Answers

Answer:

A. True

Explanation:

DBMS is an acronym for database management system and it can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Some examples of a database management system (DBMS) are RDBMS, Oracle, SQL server, PostgreSQL, dBASE, Clipper, MySQL, Microsoft Access, etc.

A DBMS commonly receives data update requests from application programs through the Open Database Connectivity ( ODBC ) driver in case of communication with other database management softwares.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

The next four octal numbers after 36 is:________.
a. 36, 37, 40, 41
b. 37, 40, 41, 42
d. 36, 37, 38, 39
c. none of the Above

Answers

Answer: b. 37, 40, 41, 42

Explanation:

The next four octal numbers after 36 is 37, 40, 41, 42.

The octal numeral system, which is also referred to as "oct" for short, is simply base-8 number system.

It is a number system whereby only digits from 0 to 7 are used and there are no letters or numbers that are above 8 that are used.

In this case, after 36, the next number will be 37 after which we go to 40 as we can't write 38 in the octal system. Therefore, the next four octal numbers after 36 is 37, 40, 41, 42.

Tomi is testing all of the links on her web page by clicking on each one in a browser. What type of testing is this considered?
Accessibility testing
Broken link testing
Mobile testing
Readability testing

Answers

Answer:

Broken Link testing.

Explanation:

Took the test and did research.

Answer:

Broken link testing

Explanation:

Broken link testing is when you test all of your hyperlinks in a browser window. You can do this by clicking each hyperlink to see if it works. This will ensure the best possible user experience.

Property Tax

Madison County collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a house is valued at $158,000, its assessed value is $94,800. This is the amount the homeowner pays tax on. At last year's tax rate of $2.64 for each $100 of assessedvalue, the annual property tax for this house would be $2502.72.

Write a program that asks the user to input the actual value of a piece of property and the current tax rate for each $100 of assessed value. The program should then calculate and report how much annual property tax the homeowner will be charged for this property.

Answers

Answer:

sorry i really dont know

Explanation:

Answer:

Here is the C++ program

====================================================

#include <iostream>

#include <iomanip>

using namespace std;

int main(){

const double ASSESS_VALUE_WEIGHT = 0.60;

double houseValue, assessedValue, taxRate, tax;

cout<<"Enter the actual value of property: ";

cin >> houseValue;

cout<<"Enter the current tax rate for every $100: ";

cin >> taxRate;

assessedValue = houseValue * ASSESS_VALUE_WEIGHT;

tax = assessedValue * taxRate / 100;

cout<<setprecision(2)<<fixed<<showpoint;

cout<<"Annual property tax: $ " << tax;

return 0;

}

Explanation:

Write a program that produces a Caesar cipher of a given message string. A Caesar cipher is formed by rotating each letter of a message by a given amount. For example, if your rotate by 3, every A becomes D; every B becomes E; and so on. Toward the end of the alphabet, you wrap around: X becomes A; Y becomes B; and Z becomes C. Your program should prompt for a message and an amount by which to rotate each letter and should output the encoded message.

Answers

Answer:

Here is the JAVA program that produces Caeser cipher o given message string:

import java.util.Scanner;  //to accept input from user

public class Main {  

   public static void main(String args[]) {  //start of main function

       Scanner input = new Scanner(System.in);  //creates object of Scanner

       System.out.println("Enter the message : ");  //prompts user to enter a plaintext (message)

       String message = input.nextLine();  //reads the input message

       System.out.println("Enter the amount by which by which to rotate each letter : ");  //prompts user to enter value of shift to rotate each character according to shift

       int rotate = input.nextInt();  // reads the amount to rotate from user

       String encoded_m = "";  // to store the cipher text

       char letter;  // to store the character

       for(int i=0; i < message.length();i++)  {  // iterates through the message string until the length of the message string is reached

           letter = message.charAt(i);  // method charAt() returns the character at index i in a message and stores it to letter variable

           if(letter >= 'a' && letter <= 'z')  {  //if letter is between small a and z

            letter = (char) (letter + rotate);  //shift/rotate the letter

            if(letter > 'z') {  //if letter is greater than lower case z

               letter = (char) (letter+'a'-'z'-1); }  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //compute the cipher text by adding the letter to the the encoded message

           else if(letter >= 'A' && letter <= 'Z') {  //if letter is between capital A and Z

            letter = (char) (letter + rotate);  //shift letter

            if(letter > 'Z') {  //if letter is greater than upper case Z

                letter = (char) (letter+'A'-'Z'-1);}  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //computes encoded message

           else {  

         encoded_m = encoded_m + letter;  } }  //computes encoded message

System.out.println("Encoded message : " + encoded_m.toUpperCase());  }} //displays the cipher text (encoded message) in upper case letters

Explanation:

The program prompts the user to enter a message. This is a plaintext. Next the program prompts the user to enter an amount by which to rotate each letter. This is basically the value of shift. Next the program has a for loop that iterates through each character of the message string. At each iteration it uses charAt() which returns the character of message string at i-th index. This character is checked by if condition which checks if the character/letter is an upper or lowercase letter. Next the statement letter = (char) (letter + rotate);   is used to shift the letter up to the value of rotate and store it in letter variable. This letter is then added to the variable encoded_m. At each iteration the same procedure is repeated. After the loop breaks, the statement     System.out.println("Encoded message : " + encoded_m.toUpperCase()); displays the entire cipher text stored in encoded_m in uppercase letters on the output screen.

The logic of the program is explained here with an example in the attached document.

In this exercise we have to use the computer language knowledge in JAVA to write the code as:

the code is in the attached image.

In a more easy way we have that the code will be:

import java.util.Scanner;

public class Main {  

  public static void main(String args[]) {

      Scanner input = new Scanner(System.in);

      System.out.println("Enter the message : ");

      String message = input.nextLine();  

      System.out.println("Enter the amount by which by which to rotate each letter : ");  

      int rotate = input.nextInt();  

      String encoded_m = "";  

     char letter;  

      for(int i=0; i < message.length();i++)  {

          letter = message.charAt(i);

          if(letter >= 'a' && letter <= 'z')  {  

           letter = (char) (letter + rotate);  

           if(letter > 'z') {  

              letter = (char) (letter+'a'-'z'-1); }

           encoded_m = encoded_m + letter;}  

          else if(letter >= 'A' && letter <= 'Z') {

           letter = (char) (letter + rotate);  

           if(letter > 'Z') {  

               letter = (char) (letter+'A'-'Z'-1);}

           encoded_m = encoded_m + letter;}  

          else {  

        encoded_m = encoded_m + letter;  } }

System.out.println("Encoded message : " + encoded_m.toUpperCase());  }}

See more about JAVA at brainly.com/question/2266606

You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and music. Which of these categories are best compressed using lossless compression? Which of these categories are best compressed using lossy compression? Why?

Answers

Answer:

texts and music are best compressed using lossy compression and videos are best compressed using lossless compression

Explanation: texts and music are best compressed using lossy compression because there are not many details to leave out while pictures and videos are best compressed using lossless compression because they need to be in good quality

Lossy compression should be applied to text messages and music while lossless compression should be applied to images and videos

A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.

This type of compression can be applied to text messages and music because a reduction in the size and quality will only reduce few details about the text messages and music file.

However, a lossless compression is such that even after the file size is reduced, the quality remains unchanged. This type of compression can be applied to video and pictures because even if the size is reduced, the quality of the files are not expected to change.

Hence;

Lossy compression should be applied to text messages and musicLossless compression should be applied to images and videos

Read more about file compressions at:

https://brainly.com/question/13663721

Create a Boolean function odd_number_digits(n) that returns True when a positive integer has an odd number of digits. (You may assume that I will not use a number greater than 1,000,000.) Then, use it to make a
function sum_odd_digits(n) that sums all the numbers from 0 to n that have an odd number of digits.

Answers

Answer:

Following are the code to this question:

import java.util.*;//import package for user input

public class Main//defining class main

{

   public static boolean odd_number_digits(int n)//defining boolean method odd_number_digits

   {

       if(n>0 && n%2!=0)//defining if block that check value is positive and odd number

       {

       return true;//return value true

       }

       else//defining else block

       {

           return false;//return false value

       }

   }

   public static void  sum_odd_digits(int n)//defining a method sum_odd_digits

   {

       int sum=0,i;//defining integer variable

       for(i=0;i<=n;i++)//defining for loop

       {

           if(i%2!=0)//defining if block for odd number

           {

               sum=sum+i;//add odd number

           }

       }

      System.out.print(sum);//use print method to print sum value

   }

public static void main(String[] args) //defining main method

   {

       Scanner ox=new Scanner(System.in);//creating Scanner object

       int n= ox.nextInt();//defining integer variable for input value

       System.out.print(odd_number_digits(n)+ "\n");//use print method to call method

       System.out.println("Sum of odd numbers: ");//print message

       sum_odd_digits(n);//calling method

   }

}

Output:

please find the attachment.

Explanation:

In the above code, two methods "odd_number_digits and sum_odd_digits" are defined in which the first method return type is boolean because it will true or false value, and the second method returns the sum of odd numbers.

In the "odd_number_digits" method,  an integer variable passes as an argument and inside the method, if block is used that check value is a positive and odd number then it will return a true value.

In the "sum_odd_digits" method, it accepts an integer parameter "n", and define integer variable "sum" inside the method, which uses the for loop, inside the loop if block is used that counts odd numbers and adds its in sum and print its value.

What is meant by computer generation?​

Answers

Answer:

The development of computer took place into 5 phases which is known as generation of computer.

Explanation:

From first generation computer till now, development of computer took place in 5 distinct which is also know as generation of computer.

Answer


Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

10010010 + 01100010 =

The problem above is called an _________. It means that there are more ________ than can be stored in a byte, or eight bit number.

Answers

Answer:

1. binary number or 8 bit

2. bits

Explanation:

What is the Internet address of the speech you listed to?

Answers

Answer:

To get the address of a website page, check the URL address at the top of the browser window.

Explanation:

The internet is global interconnection of multiple networks. All devices in the network must have a web address to communicate in the network. The IP version 4 and 6 are two concepts of addressing devices on the internet. The DHCP and DNS internet protocols are used to assign address and map addresses to string-like URLs respectively.

19 POINTS! What does the icon for changing the color of a cell or range look like? (Excel)


a pencil


the letter A


a paint bucket


a paintbrush

Answers

Answer:

Paintbucket

Explanation:

I got it right

Answer:

A Paint Bucket

Explanation:

Which color reflects more light red blue black or white

Answers

White black absorbs the light

Assignment 1 silly sentences

Answers

Answer:

Sally sells sea shells by the sea shore

Explanation:

PowerPoint Presentation on What type of device will she use to display her presentation and explain it to the rest of the children in her class?
Input Device
Output Device
Processing Device
Storage Device

Answers

Answer:

Output device

Explanation:

The screen/projector puts out data (in this case the presentation) for viewers.

The answer us definitely Output Device.
Thank you
Other Questions
- 32x - 40Whats the first step that I should do Armando has included the following lines in his personal narrative: The pedestrians were hit. Help was sought. But the ambulance was slow to arrive. What advice would you give Armando? Read the following sentence:Dino figured he had two choices in this situation.What tells you that this sentence is written in the third person? Whats the answer? Which phrase describes a scientific law? Which of the following is a nucleotide found in DNA? how can photography allowed to be in the world around us in different ways Pls help Im very stuck on this and dont understand What major U.S. landform stretches between 70 and 85 degrees West? As water moves from the roots up through the stem of a plant adhesion is a property of water that enables this to happens. which characteristic of water causes adhesion? Help A ) CohesionB ) Solvent capabilitiesC) ability to change stateD) Hydrogen bonds [tex]x { }^{2} < x + 2[/tex]interval notation Help asap neeed help simplify the following expressions ( use distributed property ) ! compose a dialogue two friends talking about their aim in life in at least six exchanges What is the Density of an object with a mass of 20 grams and avolume of 10 cm? I need help its geometry its due today at 11:59 pm Texas time Come up with a 16 measure melody in C major. help me please !! How did Native American women occupy different social roles and exercise different social responsibilities than European women ? I need help with B. Scientific Method of studying paleolithic life a) they were farmers b) archaeology, genetics, anthropology c) creation stories Then hot stinking blood fountained everywhere. The quote above appeals to thereader's sense of:A: tasteB:smellC:touchD:none of the answers apply