what features allows the user to insert individual names in a primary document​

Answers

Answer 1
I believe its copying, pasting, moving and deleting text within a document. Formatting text such as font type, bolding, underlining or italicizing.

Related Questions

What are limitations of AI

Answers

Explanation:

Limitations of artificial intelligence. One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale.

Answer:

Risks and limitations of artificial intelligence in business

Businesses are increasingly looking for ways to put artificial intelligence (AI) technologies to work to improve their productivity, profitability and business results.

However, while there are many business benefits of artificial intelligence, there are also certain barriers and disadvantages to keep in mind.

Limitations of artificial intelligence

One of the main barriers to implementing AI is the availability of data. Data is often siloed or inconsistent and of poor quality, all of which presents challenges for businesses looking to create value from AI at scale. To overcome this, you should have a clear strategy from the outset for sourcing the data that your AI will require.

Another key roadblock to AI adoption is the skills shortage and the availability of technical staff with the experience and training necessary to effectively deploy and operate AI solutions. Research suggests experienced data scientists are in short supply as are other specialised data professionals skilled in machine learning, training good models, etc.

Cost is another key consideration with procuring AI technologies. Businesses that lack in-house skills or are unfamiliar with AI often have to outsource, which is where challenges of cost and maintenance come in. Due to their complex nature, smart technologies can be expensive and you can incur further costs for repair and ongoing maintenance. The computational cost for training data models etc can also be an additional expense.

Software programs need regular upgrading to adapt to the changing business environment and, in case of breakdown, present a risk of losing code or important data. Restoring this is often time-consuming and costly. However, this risk is no greater with AI than with other software development. Provided that the system is designed well and that those procuring AI understand their requirements and options, these risks can be mitigated.

See also Industry 4.0 challenges and risks.

Other AI limitations relate to:

implementation times, which may be lengthy depending on what you are trying to implement

integration challenges and lack of understanding of the state-of-the-art systems

usability and interoperability with other systems and platforms

If you're deciding whether to take on AI-driven technology, you should also consider:

customer privacy

potential lack of transparency

technological complexity

If you're considering writing a tender document to procure AI, you can seek help from the Northern Ireland Artificial Intelligence Collaborative Network(link is external).

AI and ethical concerns

With the rapid development of AI, a number of ethical issues have cropped up. These include:

the potential of automation technology to give rise to job losses

the need to redeploy or retrain employees to keep them in jobs

fair distribution of wealth created by machines

the effect of machine interaction on human behaviour and attention

the need to address algorithmic bias originating from human bias in the data

the security of AI systems (eg autonomous weapons) that can potentially cause damage

the need to mitigate against unintended consequences, as smart machines are thought to learn and develop independently

While you can't ignore these risks, it is worth keeping in mind that advances in AI can - for the most part - create better business and better lives for everyone. If implemented responsibly, artificial intelligence has immense and beneficial potential.

A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​ a. ​ technical user b. ​ privileged user c. ​ database administrator d. ​ supervisor user

Answers

Answer:

C

Explanation:

This type of user would be called a privileged user.

What does DOS stand for?

Answers

Answer:

Disk Operating System

Explanation:

"DOS is a platform-independent acronym for Disk Operating System which later became a common shorthand for disk-based operating systems on IBM PC compatibles."

A section break would work better than a page break for which task? separating text by topic applying different formatting to text within a document viewing a document as an outline breaking up a small amount of text into several pages

Answers

Answer:

applying different formatting to text within a document

Explanation:

A section break is used to separate a documents into different sections, thereby making it possible to apply different formats to the sections such as having different headers and footers, using a single column and double column for different sections, applying different page numbers e.t.c.

A page break is used to end a page and start a new page even if the old page has not been filled with text.

A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the integers 5215 and 7282. How many elements of the array would be examined by the algorithm to locate A). the integers 5215 stored in element 499 B.) the integers in 7282 stored

in element 686.

Answers

Answer:

The overview of the given scenario is described in the explanation section below.

Explanation:

BTS (Binary search tree) tends to be a tree with several nodes noting that perhaps the left sub-tree, along with its leaf, tends to have a key which is less than or equal to anything like the parental node value. The do-tree, including its leaf, seems to have a value greater than those of the key from it's own parent node.Binary search algorithm finds a general vicinity in the collection of O(log n) time complexity items whereby n represents the number of elements in the array.

So the provided has never been the binary search trees of its algorithm.

A. 249

B. 342

write down a description of how a magnetic had drive works

Answers

Answer:

This is how a magnetic hard drive works

Explanation:

The hard drive contains a spinning platter with a thin magnetic coating. A "head" moves over the platter, writing 0's and 1's as tiny areas of magnetic North or South on the platter. To read the data back, the head goes to the same spot, notices the North and South spots flying by, and so deduces the stored 0's and 1's.

Hope it helps pls mark as brainliest

______ greetings are used when we talk to friends or family members.

A)Formal

B)Informal

C)Gestures

D)None of these​

Answers

Answer:

B. Informal

Explanation:

You know your parents, greet them normally

Answer:

Informal

Explanation:

What are examples of some Exotic currencies?
A) EURUSD, AUDUSD
B) GBPCHE, EURUSD
C) AUDCHF, NZDJPY
D) MXN, ZAR, HKD

Answers

Answer:

D) MXN, ZAR, HKD

Explanation:

Exotic currencies refer to currency that are used in countries with emerging economies therefore they lack liquidity, are extremely volatile and have very low volumes. The exchange rate of exotic currencies are usually very high because of its lack of liquidity, therefore trading these currencies are expensive. Examples of exotic currencies are South African rand (ZAR), Mexican peso (MXN), Hong Kong dollar (HKD), Chinese yuan (CYN), Turkish lira (TRY) and so on.

Consider the following code snippet: int score = 0; double price = 100; if (score > 0 && price < 200 && price / score > 10) { System.out.println("buy"); } Which of the following statements is true on the basis of this code snippet? The output is buy. The code snippet compiles and runs, but there is no output. The code snippet doesn't compile. The code snippet causes a divide-by-zero error.

Answers

Answer:

The code snippet compiles and runs, but there is no output.

Explanation:

The condition is

score > 0 && price < 200 && price / score > 10

score = 0

price = 100

[(0) > 0]  and [(100) < 200] and [100)/(0) > 10]

false and ........

Since the first condition is false, the program will not validate the other conditions because the conditional "and" is false when at least one of the conditions is false

. Prove that every polynomial of degree k, p(n) = aknk + ak-1nk-1 + ... +a0 with ak> 0, belongs to \Theta (nk)

Answers

Answer:

The answer is explained below

Explanation:

i) [tex]p(n) \ is\ an\ element\ of\ O(n^k)[/tex]

Therefore [tex]p(n)\leq c.n^k,therefore\ p(n) \ is\ an\ element\ of\ O(n^k)[/tex]

ii) [tex]p(n) \ is\ an\ element\ of\ \Omega(n^k)[/tex]

[tex]p(n)=a_kn^k+a_{k-1}n^{k-1}+.\ .\ .+a_o\\p(n)=a_kn^k(1+\frac{a_{k-1}}{a_k}\frac{1}{n} +.\ .\ .+\frac{a_o}{a_k}\frac{1}{n_k} )\\p(n)=1, as\ n\ tends\ to\ \infty, the \ limit\ in\ the \ parenthesis=1. For\ c=\frac{1}{2}a_k,n\geq n_o \\Therefore:\\p(n)\ge \frac{1}{2}a_kn^k=c.n^k[/tex]

[tex]p(n) \ is\ an\ element\ of\ \Omega(n^k)[/tex]

From i and ii, [tex]p(n) \ is\ an\ element\ of\ \Theta(n^k)[/tex]

Why would you want to hyperlink objects into your own Google Slides presentation? (Select all that apply.) Select All Correct Responses For extending the learning experience for students. To make sure the presentation is linear So students can use the Slides for review and can go to additional resources outside of the presentation. To make the presentation more graphically appealing

Answers

The correct answers are A.  For extending the learning experience for students. C. So students can use the Slides for review and can go to additional resources outside of the presentation. D. To make the presentation more graphically appealing

Explanation:

The use of hyperlink objects in presentations means objects such as images, texts, or icons are associated with links or websites students can easily access by clicking on the specific image or element. This might be used in educational contexts to allow students to have a complete learning experience by providing alternative and external sources outside the presentation. For example, if the topic is space hyperlinks to NASA website can be included. This means, hyperlink objects extend learning experiences and provide additional resources (Option A and D).

Besides this, this resource can make a presentation more appealing as links to images, videos, and other visually interesting resources can be included (Option D). However, it also breaks the linearity of the presentation as students will need to move to other websites as they go through the presentation.

i want pizzzzzzzaaaaaaaaaaa

Answers

sameeeeeeeeeeeeeeeeeeeee

_________ is the start up sequence a computer conducts.

Answers

Answer:

Booting

Explanation:

Booting is the start up sequence a computer conducts when it is being turned on. The booting is done by the operating system. The booting process is usually started when a hardware on the computer is pressed or by a software command. For a windows computer, the BIOS is used to start the booting sequence. These boot sequence is called boot order or BIOS boot sequence.

"Consider the following code snippet: int number = 0; Scanner in = new Scanner(System.in); System.out.print(""Enter a number: ""); number = in.nextInt(); if (number > 30) { . . . } else if (number > 20) { . . .. } else if (number > 10) { . . . } else { . . . } Assuming that the user input is 40, which block of statements is executed?
a. if (number > 30) { . . .}
b. else if (number > 20) { . . .}
c. else if (number > 10) { . . .}
d. else { . . .}

Answers

Answer:

if (number > 30) {. . .}

Explanation:

This code block uses a simple if-elseif-else control structure to do a comparison on a value.  In this type of control structure, each operation of control is check until the correct condition is met, and once the code executes, it exits the control structure, never touching the remainder of the structure.

In this example, we are fortunate that the value triggers the first part of the control structure with if (number > 30) and will execute that section of code.  Once the code finishes, it will exit the structure, never making it to the other 3 control conditions.

Cheers.

The database model that uses a series of two-dimensional tables or files to store information is the ________________ model. This database model has become the most popular database structure, as it is used by most microcomputer DBMS packages:

Answers

Answer:

The relational database model

Explanation:

The database model that uses a series of two-dimensional tables or files to store information is the relational structure model.

What is the relational structure model?

The relational model (RM) is known to be set up for database management as it is a method used in managing data via the use of a structure and language that are in line with first-order predicate logic.

Note that The database model that uses a series of two-dimensional tables or files to store information is the relational structure model.

Learn more about database from

https://brainly.com/question/26096799

#SPJ9

Why are the social and ethical consequences of emerging technology hard to
predict?

Answers

Answer:

Technology is rapidly evolving over a short period of time. Which leads to a change in how people perceive and subsequently react to these fast paced advances.

Answer: try this one: It is impossible to see how technology will be applied to situations that have not yet occured.

Explanation: if it’s wrong please tell me

What is the features of Mark 1​

Answers

Answer:

Okay:

Mark I was enourmous in size, measuring 8 feet high, 51 feet long and three feet deep. It weighed 5 tons, used 530 miles of wire and 730,000 separate parts. The operation of these parts was powered and synchronized by a long horizontal rotating shaft. A four horsepower engine drives the mechanical parts.

Harvard Mark I, an early protocomputer, built during World War II in the United States. While Vannevar Bush was working on analog computing at the Massachusetts Institute of Technology (MIT), across town Harvard University professor Howard Aiken was working with digital devices for calculation. He had begun to realize in hardware something like the 19th-century English inventor Charles Babbage’s Analytical Engine, which he had read about. Starting in 1937, Aiken laid out detailed plans for a series of four calculating machines of increasing sophistication, based on different technologies, from the largely mechanical Mark I to the electronic Mark IV.

Explanation:

hope it is helpful to you

Which of these is a biotic factor in a forest?
Will
O A. Climate
O O
O B. Terrain
O C. Trees
O D. Water​

Answers

Answer: trees

Explanation:

Draw a truth table & logic circuit corresponding to the following logic statement
X = 1 if ( ( M is 1 OR N is 1 ) AND ( M is 1 AND N is 1 ) ) OR ( O is NOT 1 )

Answers

Answer:

The truth table, as well as the logic circuit of the given statement, is attached below.

Explanation:

Logical gates seem to be the essential building blocks of just about any computerized signal. It becomes a digital device with one or even more inputs and therefore only single output. The arrangement among outputs and inputs would be focused on this kind of logic. Upon that basis, logic gates were already called as AND, NOT, OR gate, etc.

What visual practice provides more information about logical relations when creating an ERD

Answers

Answer:

Logical Data Model

Explanation:

An Entity Relationship Diagram (ERD) is a model or a diagram designed to reveal the relationship between various entities such as people, places, objects, and so on within an institution. Entity relationship diagram is also known as Entity relationship model. This model is used to design relational database by various sectors such as education, engineering, business, etc.

ERD is designed using conceptual data model, logical data model, and physical data model.

The visual practice or model that gives more insight into the logical relations among the entity is the logical data model.

The logical data model is used to illustrate more detailed operational and relational data among the entities. It is more detailed than the conceptual data.

So, the correct answer is logical data model.

What is the value of the var variable after the execution of the following snippet of code:
int var;
var = -1;
var = var - 1;
var = var - var;

Answers

Answer:

The value of var is 0

Explanation:

Given:

The code snippet above

Required

Find the value of var after program execution

This line declares var as type integer

int var;

This line initializes var to -1

var = -1;

This line subtracts 1 from var; var - 1 = -1 -1 = -2

var = var - 1;

At this stage the value of var is -2

This line subtracts the value of var from var; i.e. -2 - (-2) = -2 + 2 = 0

var = var - var;

At this stage, the value of var is 0

In the cases of int, byte, long, short (In Java) Can you give the heirachy in ascending order?​

Answers

Answer:

Byte Short Int Long

Explanation:

Byte's 8 bit, short's 16, int's 32, and long's 65.

which topology enables only one person, at one time, to send data to others on the network?

Answers

Question:

Which topology enables only one person, at one time, to send data to others on the network?

Answer:

Ring topology

What are the useful techniques in program design?

Answers

A broad question, with many answers.

When designing a program you can use:

Setting up requirements, possibly in a use-case form ("as a ... I want to ... so that ...")Mapping the verbs and nouns in your requirements to classes and operations Drawing UML diagrams of the subject matterCreating flow charts and sequence diagrams Identify component boundaries with thin interfaces to keep complexity organized and local

How to Fix 0xc000007b

Answers

Answer:

Method 1. Restart your computer

The first thing to try is restarting Windows. It sounds too simple, but it sometimes yields results.

Method 2. Update .NET framework

In most cases it's Microsoft .NET framework causing the issues. You can download the latest version of .NET Framework from Microsoft.

When it's installed (or re-installed) reboot and try your app or game again

Method 3. Enable Administrator rights

Try running the game or app with admin rights. To do that, right-click on the shortcut or the actual executable for the game, select Properties and open the Compatibility tab. Tick the 'Run this program as an administrator' box, and click on OK.

Method 4. Reinstall the app or game

You can uninstall and re-installing the game or program you're trying to run - simple but sometimes the quickest and most effective way to get rid of the error.

Method 5. Update Windows

Update Windows. In many cases Windows will automatically update, but to check, head to Control Panel and search for 'Windows Update'.

In later versions, including Windows 10, you can open the new Settings app (just search the Start menu or click the cog icon which appears just above the Windows logo when you click it in the bottom-left of the screen.

In the Settings app, click on Update & Security then you should see a button to check for updates:

Explanation:

Method 6. Run ChkDsk

Run chkdsk by opening cmd (search for it or press Win+R).

In the window type "chkdsk c: /f /r". If it is the primary windows disk, it will ask you to schedule it for next boot. When you restart, it will do a check before get to the login screen. Partitions or other drives can also be checked this way.

Method 7. Reinstall DirectX

This can be the fix for games that won't load. The way to do this depends on your version of Windows and which version of DirectX you need. There are full instructions on Microsoft's website

Hope it's help you. :-)

Mention 2 precautionary
measures to be observed
when using ICT tools​

Answers

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage

A port allows you to plug hardware into your CPU. Select one: A. False B. True

Answers

Answer: The answer is true.

An array of int named a that contains exactly five elements has already been declared and initialized. In addition, an int variable j has also been declared and initialized to a value somewhere between 0 and 3. Write a single statement that assigns a new

Answers

Answer:

a[j] = 2 * a[j+1];

Explanation:

The complete statement is to Write a single statement that assigns a new value to the element of the array indexed by j. This new value should be equal to twice the value stored in the next element of the array.

So lets say a is an array of type int which is already declared and initialized.

int a[] = {};

declare an int variable j as int j;

The element of array a indexed by j can be represented as a[j] This means the j-th index of array a

The value to be assigned to a[j] is 2 * a[j+1]; with an assignment operator "= " between a[j] and 2 * a[j+1]; in order to assign 2 * a[j+1]; to a[j]

According to the requirement this new value should be twice the value stored in next element of array. The next element of array is represented by a[j+1] which means j+1 index of array a. This means the element at j+1 index that comes after the element at j-th index a[j].

Value should be twice the value stored in next element of array means multiply the 2 with the next element of array i.e. a[j+1]

Now assign this new value  2 * a[j+1];  to a[j].

what is the best combos for Nix in Brawlhalla (PS4)?​

Answers

I have never played the game but chose the good ones.

Answer:

sycthe is simple. Do down light and then turn them around. Then do chase dodge to neutral air. its an infinite combo

Explanation:

When testing for current in a cable with eleven ​color-coded wires, the author used a meter to test five wires at a time. how many different tests are required for every possible pairing of five ​wires?

Answers

Multiply 5 times 5, then times 11, and you'll get 275.

Other Questions
An underpinning of all commerce is effective communications, knowledge of where goods and services exit and where they are needed and the ability to communicate instantaneously across vast distances. Facilitation this movement into the future one can observe which shifts in examining world population and telecommunications? what is the volume of a right trianular prism with the dimesions of 15 11 17 Which source provides the most reliable information about testing for sexually transmitted infections (STI) There are 4562 boys in a school. The number of girls is 689 less than the number ofboys. Find the total strength of the school. Pls answer fast halppppppp meeeaaaaaaaaaaaa To decide whether two different types of steel have the same true average fracture toughness values, n specimens of each type are tested, yielding the following results. Type Sample Average Sample SD 1 60.7 1.0 2 60.5 1.0Required:a. Calculate the P-value for the appropriate two-sample z test, assuming that the data was based on n = 100. (Round your answer to four decimal places.)b. Calculate the P-value for the appropriate two-sample z test, assuming that the data was based on n = 500. (Round your answer to four decimal places.)c. Is the small P-value for n = 500 indicative of a difference that has practical significance A cowboy fires a silver bullet with a muzzle speed of 200 m/s into the pine wall of a saloon. Assume all the internal energy generated by the impact remains with the bullet. What is the temperature change of the bullet? Question 50/2 pointsSelect and type the correct verb that best completes each sentence, then conjugate it to agree with the subject in the subjunctiveform.Insistimos en que las gallinas nos_puedan huevos. (poner, poder) Perform the indicated operation. 1 3/4 7/3? a.3/4 b.41/12 c.121/12 d.23/4 do you always have to begin with two compounds in a neutralization reaction Two cannonballs are dropped from a second-floor physics lab at height h above the ground. Ball B has four times the mass of ball A. When the balls pass the bottom of a first-floor window at height above the ground, the relation between their kinetic energies, KA and KB, is A nurse is reinforcing teaching with a group of healthy older adult clients aboutexpected age-related changes and sexual responses. Which of the following changesshould the nurse include as an age-related change? Which of the following industries is most important to the Witersrand area of southern Africa?MiningManufacturing Agriculture Fishing When Winston hears O'Brien what does he think, and what does he discover? In agovernment, goods and services are equally shared, and the political power is distributed among thepeople. Consider fully developed laminar flow in a circular pipe. If the viscosity of the fluid is reduced by half by heating while the flow rate is held constant, how will the pressure drop change 5x+2y=57 what is x and y equal to? The question is in the image below. PLEASE ANSWER, HURRRRRYYY!!! If a sky diver decides to jump off a jet in Arkansaswith the intention of floating through Tennessee toNorth Carolina, then completing his journey in alikely manner back to Arkansas by drifting Northfrom his last point. What state would be the third tbe drifted over and what is the estimated distancebetween the zone and then drop point?