Answer:
our laptops to do school work etc
our phones- use them everywhere
Explanation:
how to take a pic with a cumputer
Answer:
Ctrl+Shift+4
Explanation:
Answer:
Use Snip+Sketch on your taskbar
It looks like this~
Need answer Asap!!!! Which file type is the best choice if the image will be made into a billboard?
Answer:
A .psd file
Explanation:
Adobe photoshop files are always going to be same and there is no compression. Even better .ai files are saved into equations so you can't alter or dumb it down.
Jon wants to set up a trihomed DMZ. Which is the best method to do so? A. use dual firewalls B. use a single firewall with only two interfaces C. use a single three-legged firewall with three interfaces D. use dual firewalls with three interfaces
Answer:
The correct option is C) Use a single three-legged firewall with three interfaces
Explanation:
DMZ is an acronym for a demilitarized zone.
A DMZ network is one is situated between the internal network and the Internet. It is supported by an Internet Security and Acceleration (ISA) server.
The interfaces you'd get with the DMZ network are
A public network (Internet Protocol-IP) address with a public interfaceAn internal network interface with a private network (IP) address A DMZ interface with a public network (IP) addressUnlike the back-to-back DMZ settings, a trihomed DMZ is unable to use private IP addresses. To use the trihomed DMZ, public IP addresses are a must suitable requirement.
Cheers!
Someone plz im begging for ur help plzz??
Answer:
woah what subject is this-
Explanation:
Prepare a profile on major universities in the country Nepal
Answer:
Formal higher learning in Nepal began with the establishment of Tri-Chandra College in 1918, the first college in the country. Until 1985, Tribhuvan University (TU) was the only university in the country. The second university to be founded was Mahendra Sanskrit University. The inception of this university was soon followed by Kathmandu University in 1990, and Purbanchal and Pokhara Universities in 1995 and 1996, respectively. Many schools and colleges are run privately but none of the universities in Nepal are private.
This list includes all notable universities and colleges/campuses in Nepal. Entries are organised by courses offered, and listed in alphabetical order. Some entries that provide multiple courses may be duplicated in each of the relevant categories.
There are fourteen universities in Nepal. They are: Khwopa University (Proposed)
Agriculture and Forestry University in Chitwan
Far-western University in Kanchanpur
Gandaki University in Tanahun
Kathmandu University in Dhulikhel
Lumbini Bouddha University
Madan Bhandari University of Science and Technology
Manmohan Technical University in Biratnagar
Mid Western University in Birendranagar
Nepal Open University[1][2] in Lalitpur
Nepal Sanskrit University
Pokhara University in Pokhara
Purbanchal University in Biratnagar
Rajarshi Janak University in Janakpurdham
Tribhuvan University in Kirtipur
The university that will be profiled in their case is the Agriculture and Forestry University, Chitwan, Nepal.
The Agriculture and Forestry University, Chitwan, Nepal offers undergraduate, graduate, and PhD programs in agricultural sciences.
The university has several faculties such as the faculty of agriculture and animal sciences, fisheries, and aquaculture.
Learn more about universities on:
https://brainly.com/question/25853486
Question 1 (10 points)
When using MLA format your font type and font size should be what?
Question 1 options:
Rockwell 12
Calisto 11
Times New Roman 11
Times New Roman 12
Question 2 (10 points)
What tab would you go to to add citations to your paper so you can include your source information?
Question 2 options:
Insert
Design
View
References
Question 3 (10 points)
What tab do you go to to put a header on your paper
Question 3 options:
References
Insert
Layout
Home
Question 4 (10 points)
When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a (n) ____________ or word similar in meaning.
Question 4 options:
Synonym
Homonym
Antonym
Metronym
Question 5 (10 points)
In Word you can force a page break
Question 5 options:
By positioning your cursor at the appropriate place and pressing the F1 key
By hitting the enter key twice really fast
By clicking the Insert Tab and selecting Page Break in the ribbon
By changing the font size of your document
Question 6 (10 points)
In your ruler there are two triangles. The triangle on top that points down is called
Question 6 options:
First Line Indent
Hanging Indent
Tab
Left Indent
Question 7 (10 points)
Which would you choose to save a document with a new name?
Question 7 options:
Press Ctrl+S
Click File, Save
Click Tools, Options, Save
Click File, Save As
Question 8 (10 points)
To put a ruler on your screen to help you with spacing and alignment on your paper you would go to this tab
Question 8 options:
Insert
References
Design
View
Question 9 (10 points)
User can use ______ commands to search for and correct words in a document
Question 9 options:
Copy and Paste
Find and Replace
Header and Footer
Print and Print preview
Question 10 (10 points)
What tab do you go to for the spelling and grammar check?
Question 10 options:
Home
Review
Insert
File
Answer:
Find and replace header and footer
ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! <3
Answer:
ABC PLEASE
Explanation:
Answer:
ABC i have mega owl and neon cow and mega frost <3
¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones) dentro de la informática?
Answer:
In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help
What is GIGO ?
plz answer me
Answer:
Garbage in, garbage out
Explanation:
In computer science, garbage in, garbage out is the concept that flawed, or nonsense input data produces nonsense output or garbage
What is the output of the following code:
lang=
['Python','C','C++, JAVA,ASP'PHP',VB', Oracle
'MySQL)
list1 = lang(2:-2]
list2 = langl-2:-5)
list3 = langl: : 3]
print(list)
print(list)
print(list3)
Answer:
Syntax error.
Explanation:
There are many typing mistakes in this source code.
The Quick Access tool bar allows you to customize the actions or commands you frequently use.
True
False
Order the steps for accessing the junk email options in Outlook 2016
Select Junk Email Options
Click the Junk button
Select a message
Choose one of the protection levels
Locate the Delete group on the ribbon
Answer:
To access the the junk email options in Outlook 2016, follow the following steps.
1. Click the Junk Button
This will take you to the Junk messages that you have.
2. Select a message
Select a junk message from the list.
3. Locate the Delete group on the ribbon
The Junk email options is located in the 'Delete' group on the ribbon in the Home tab.
4. Select Junk Email Options
Click on the Junk email options button and a popup window will appear.
5. Choose one of the protection levels
Select the protection level you want from the various options listed including low, high, automatic etc.
Answer:
select a message, locate the Delete group on the ribbon, click the junk button, select junk email options, choose one of the protection levels.
Explanation:
HELP!!!!!
Your colleague has made a suggested change to an important document you are both working on. You disagree with their suggested change. They will be reviewing the changes you make before the final version of the document is submitted to your boss. You both work remotely and are in radically different time zones. What is the best step to take next?
A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet
ermano envia foto de lo que necesitas yo te ayudo
The meaning of docile can be determined by the... context clue. synonym atonym or explanation
Answer:
Synonym
Explanation:
I'm pretty sure it's either synonym or explanation, but if there isn't an explanation, it's almost always synonym... so... synonym is correct.
Answer:
it is explanation
Explanation:
trust me
Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the mistake?
A) Clear the rule she created by going to the Conditional Formatting Rules Manager dialog box and deleting the rule.
B) Clear all rules that have been applied to the worksheet or selected range by clicking the Clear Rules button.
C) Use the Undo button or Ctrl+Z.
D) Right-click the area where the conditional formatting rule has been applied, and select Clear Rule from the menu list.
Answer:
its b
Explanation:
on edg
Answer:
b
Explanation:
who invite computer ?
Answer:
Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer", he conceptualized and invented the first mechanical computer in the early 19th century.
50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.
The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.
Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!
import java.util.Scanner;
public class JavaApplication46 {
public static boolean passwordCheck(String pass){
String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";
boolean legit = true;
if (pass.length()>= 8){
for(int i = 0; i < pass.length(); i++){
if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){
legit = true;
}
else{
legit = false;
}
}
}
else{
legit = false;
}
return legit;
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.print("Enter a password: ");
String password = scan.next();
System.out.println(passwordCheck(password));
}
}
I hope this helps!
In most places of work, how long should it take someone to respond to an e-mail?
no obligation to respond
one hour
twenty-four hours
one week
Answer:
24 Hours
Explanation:
Now Ideally, someone when they are working should respond immediately, but its 24 hours because, if someone is in a different Timezone, Or you sent an email late and tehy read it at 12pm or something it allows them good wiggle room while giving you a dcently fast reply.
Answer: 24 hours
Explanation: It's correct
Which term means an unsecure protocol used when remotely accessing a computer?
Transmission Control Protocol (TCP)
Secure Shell (SSH)
Telnet
Internet Protocol (IP)
Answer:
9Internet Protocol (IP)
Answer:
The answer is Secure Shell (SSH)
Select all the lines that have a slope of 5/2
Answer:
Add a picture, then ask the question again.
Which component in a CPU is responsible for transferring
data from one functional component to another?
Justify the use of an e-diary in the organisation of the meeting.
Answer:
It can be used to easily organize stuff
Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.
a.
Define a computer with its proper meaning.
Answer:
Computer
Explanation:
a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.
Answer:
computer
Explanation:
An electronic machine that processes, stores data, and does calculations.
PLEASE HELP!!
Computer networks allow computers to send information to each other. What is the term used to describe the basic unit of data passed from one computer to another?
message
package
packet
transmission
Answer:
Paquete de red o paquete de datos es cada uno de los bloques en que se divide la información para enviar, en el nivel de red. Por debajo del nivel de red se habla de trama de red, aunque el concepto es análogo. En todo sistema de comunicaciones resulta interesante dividir, la información a enviar, en bloques de un tamaño máximo conocido. Esto simplifica el control de la comunicación, las comprobaciones de errores, la gestión de los equipos de encaminamiento (routers), etcétera.
Al igual que las tramas, los paquetes pueden estar formados por una cabecera, una parte de datos y una cola. En la cabecera estarán los campos que pueda necesitar el protocolo de nivel de red; en la cola, si la hubiere, se ubica normalmente algún mecanismo de comprobación de errores.
Explanation:spero teyaudee
Answer:
Packet
Explanation:
A data packet is the precisely formatted unit of data that travels from one computer to another.
(Confirmed on EDGE)
I hope this helped!
Good luck <3
Which of the following expressions shows the correct amount of sales tax for the computer at Store A? Select all that apply.
6%($1,200)
0.6($1,200)
0.06($1,200)
One-sixth($1,200)
StartFraction 3 over 50 EndFraction($1,200)
Answer:
6%($1,200) 0.06($1,200) 3/50($1,200)
Explanation:
hope this helps sorry if i am wrong
have a nice day
Answer:
a,c,e
Explanation:
it just makes sense U^U
While an image is still being editing, it is best to save it as a PDF. Group of answer choices True False
Answer:
f
Explanation:
Does anyone have a leg pet on adopt me? Ty!
Answer:
no
Explanation:
I have a legendary pet in adopt me, these are the legendaries im TRADING:
frost furry, ride or fly kitsune, mega neon owl (Traded), and kangeroo (traded).
are you interseted in anything?
Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of
Answer:
Responsibility
Explanation:
Which kind of a person will you be if you prove to be accountable for your actions?
Answer: You would be a person of integrity.
Explanation: Look up Integrity for details.