Answer
I think its: The first line is missing quotes
Explanation:
Answer:
B
Explanation:
"(2, 6)" the space in between those numbers create a bad income I tried it and it was the problem so hence its B
How is a value list created?
by the user typing in values for the list
by the list pulling values from another table
by the list pulling values from the same table
by the user linking the list to another database
Answer:
A
Explanation:
edge
Dora has inserted a text box into a Word document that she is formatting. Which strategy will not format text boxes? Create a link between two text boxes. Set the height and width of the text box. Add background images to the text box. Link the text box to another document.
Answer:
D. Link the text box to another document.
Explanation:
A text box is an object that you may add to your page that allows you to place and enter text wherever in it. The correct option is D.
What is a text box?A text box is an object that you may add to your page that allows you to place and enter text wherever in it. Content boxes may be handy for attracting attention to a certain text and also for moving text about in your document.
Dora has inserted a text box into a Word document that she is formatting. Therefore, the strategy that will not format text boxes is strategy will not format text boxes.
Hence, the correct option is D.
Learn more about Text Box:
https://brainly.com/question/13812028
#SPJ2
pleaseeeee helppp
6. Which of the following action is required for creating a chart in a spreadsheet?
1 point
a. Print the data
b. Select the orientation
b. Select the paper size
c. Select the data
Answer:
c. Select the data
What percentage is considered an A+ (I am aware it varies based upon where you're from)?
hi! where im from (somewhere in the far southwest of the USA) a 96% or above is considered an A+
hope i helped!
How can you place a paragraph of text in a box smaller than the text content, and add a scroll bar?
You can do this by using the __ property and setting it to ___.
(First blank: Border, Margin, Overflow.)
(Second Blank: Auto, hidden, scroll)
Answer:
I think it's overflow and hidden.
Explanation:
Answer:
You can do this by using the overflow property and setting it to hidden .
Explanation:
What is bill Gates passion?
tO CrEaTe ToiLeT. Sorry, the real answer is to change the world via technology, and to keep on innovating.
I hope this helps, and Happy Holidays! :)
(This is for photography segment exam btw)
Who created the first known photograph?
A. George Eastman
B. Ansel Adams
C. Joseph Niepce
D. Louis Daguerre
Answer:
C. Joseph Niepce
Explanation:
Your friend told you that your favorite celebrity couple split. What is the best media form to use?
a
Wiki
b
Social Network
c
Infotainment site
d
Forum
Answer:
b
Explanation:
I think social network is the first source of every update of reality even wiki gets info from social network
Answer:a)wiki
kalo salah maaf ya
plz hurry i'm timed Which type of essay presents one side of an argument to convince readers to support it?
a descriptive essay
an expository essay
a narrative essay
a persuasive essay
Answer:
persuasive
Explanation:
if your tired but still need to proofread your document,what should you do?
proof read it anyway
scan through it quickly
submit your work as is
walk away and come back later
Answer:
If i were to choose one i would, come back to it later. But the best thing to do is have somebody else proofread your essay, doc, or anything else, because its the best thing to have a second pair of eyes so they can suggest what you could fix or change or any opinions on your document. Not sure why you need this but i hope it helps <3
Have a great day <33 -Blazetoxic123
Answer:
A
Explanation:
What is the missing line of code?
class vehicle:
self.model = strModel
self.color = strColor
def __str__(self):
return self.model + ' ' + self.color
Answer:
def__init__(self,strModel,strColor):
The missing line of the given code is as follows:
Class vehicle: def__init__(self,str Model,str Color). What is the significance of programming code?The significance of programming code may be determined by the fact that it implies a computer finishing the commands that are given by the user over and over again. As a result of this, people do not have to do the task repeatedly.
When it comes to using string commands in python, the sequence of characters inside either single quotes, double quotes, or triple quotes leads to their assignment to a variable. This variable more frequently relies on the instruction given by the user in a specific period of time.
Therefore, the missing line of the given code is well mentioned above with respect to python and code programming.
To learn more about Python programming, refer to the link:
https://brainly.com/question/26497128
#SPJ3
The harm of stereotypes are likely to be aggravated in
Answer:
conflict situations
Answer:
B. Conflict situations
Hope this helps!
Explanation:
Provide an example by creating a short story or explanation of an instance where availability would be broken.
Incomplete/Incorrect question:
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.
Explanation:
Note, the term confidentiality refers to a state or relationship between two parties in which private information is kept secret and not disclosed by those who are part of that relationship. Confidentiality is broken when this restricted information is disclosed to others without the consent of others.
For instance, a Doctor begins to share the health information of a patient (eg a popular celebrity, etc) with others such as his family members and friend
s without the consent of the celebrity.
You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows some accounts have been compromised, with their login and passwords overwritten by the hackers. They need to reset the accounts that the hackers have changed the passwords on. However, they don't have access to the passwords directly, and the change records were corrupted by the attack. They need students and staff to confirm their passwords by logging into a secure site. If the login fails, they'll know your account was compromised and reset your account immediately.
a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments phone number and call them about the email.
b.) This is a serious issue, and the email came from the head of IT. The site also shows that it's secure. The longer it takes to reset accounts, the longer the hackers will have access to your account. Follow the instructions in the email from the head of IT.
Answer:
a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.
Explanation:
This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.
Hope this helps!
Information stored on CD-ROM disc must be read and then erased.True or false?
Answer:
False
Explanation:
What social media profession entails determining how and in what way an organization will create and maintain a social media presence?
social media strategist
social media marketer
social media manager
social media specialist
Answer:
i believe the answer is b.
Explanation:
Answer:
(a) strategist
Explanation:
its the proven answer on my test
What are movies filmed before 1990's?
Answer: Once Upon a Time in the West (1968) PG-13 | 165 min | Western. ...
Cinema Paradiso (1988) R | 155 min | Drama. ...
Blade Runner (1982) R | 117 min | Action, Sci-Fi, Thriller. ...
2001: A Space Odyssey (1968) G | 149 min | Adventure, Sci-Fi. ...
Apocalypse Now (1979) ...
Chinatown (1974) ...
Stardust Memories (1980) ...
Le Notti Bianche (1957)
Explanation:
The image below shows an encoding for a black and white pixel image. The first two
bytes of the data (circled in red) are used to encode the width and height of the
image. What is the best term for this type of "data about the data"? Explain why it is
necessary to include this data in the encoding.
Answer:
where is the image i need the image
Explanation:
Automatic red-eye reduction settings work best on which type of flash?
A.
high-Speed Sync
B.
integrated
C.
external
D.
TTL
Answer:
c
Explanation:
Which file is usually the first file to be displayed when you navigate to a website?
A. Starter.html
B. Home.html
C.index.html
D. Template.html
Is anyone else excited for sephiroth (I think I spelt it wrong) in smash. And if you arn't are you excited for christmas
Answer: idek what that is but okay ;v;
Answer:
his ultimate is fire
Explanation:
PLS HELP QUICK!!!!
Read the following scenario:
A cell phone company is launching a brand new state-of-the-art smart phone. This phone has the latest wireless communications
technology built into its system. The phone is loaded with new apps and special devices that enhance speed and efficient Internet use.
Which of the following can a consumer most likely expect with the unveiling of this new product?
increases in the cost of services from providers
increased value of older smart phone models
O increase in sound quality
O decrease in the creation of competing apps
Answer:
increases in the cost of services from providers
Explanation:
With the advancement in the quality of the product, the price of the product also sees a hike. According to the given excerpt, the cell phone company had added many new features and upgraded the version of the smartphones. Because of this reason, it's value in the market will be more as compare to the last product. New technology and advanced features would help the customers in various ways. In return, the price of the product will be more.
If a computer company develops a touchscreen tablet with the intent that it will have to be replaced within two years by the consumer, this is known as which of the following? consumer fraud supply and demand planned obsolescence innovative commerce
Answer:
b
Explanation:
demand planned obsolescence
The number of binary digits required to count 10010 is called _________
What is the next line?
tupleA = (5, 20, 30, 40, 30)
tupleA.index(40)
The next line is
Answer:3
Explanation: it’s 3
Answer:
3
Explanation:
6.1.4: Decorate the Fence, what is the code program for the CodeHs Karel lessons?
Answer:
hi
Explanation:
function start(){
move();
move();
move();
move();
move();
turnLeft();
while(frontIsClear()){
if(rightIsBlocked()){
putBall();
move();
}
else{
move();
}
}
putBall();
}
What is the purpose of the Lookup Wizard?
to create a yes/no field quickly
to reference data from another table
to combine more than one field in a table
to generate a random number automatically
Answer:
The answer is B. To reference data from another table
Explanation:
I just got it right in Edg
How many bit make a byte .
Answer:
It is easy .8 bits.You have to note this
Answer: 8
1 byte = 8 bit
what is networking??????????????????????
Answer:
the activity or cycle of collaborating with others to trade data and create proficient or social contacts.
Explanation:
<3
this is very simple i just need someone to type out this for me
Answer:
#27
2i , -2i, i, -i i^2 = -1
1(x - 2i)(x + 2i) 1(x-i)(x+i)
x^2 +2x-2x -4.2i x^2 -xi-xi -i
(x^2 + 4) x^4 + 1
x^2 +x^2 +11x
x^4 +5x^2 +4
+4+2+2+-1
*This was not simple for me