Answer:
1. Pop
2. 2
3. Swim
4. add a / to the final h1 tag
(this is just the answers for the images)
Select the effective subject lines.
Timecard Machine Relocated
This Message Contains Some Important New Information About Company Operations
Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed
Test Results Attached
New Expense Reporting Procedures
Servers
IT Department Closed for Server Maintenance
Answer:
dont click the link
Explanation:
Answer:
Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed
Servers
This Message Contains Some Important New Information About Company Operations
Explanation:
i did this on edge 2021 there is a quizlet with most of the questions
Help Please! Computer science question !!!!!!!!!!20 points!!!
Answer:
45 abc
Explanation:
I need help I have questions I need answers in coding html,css,js and python.Fast
The purpose of the sleep method is to reduce the amount of energy the program uses.
True
False
The _____ is a collection of webpages that use the internet.
pseudocode
World Wide Web
Python
server
Which of the following lines of code would correctly create a list called weapons?
weapons == [“sword”, “sling”, “knife”]
weapons = [“sword” or “sling” or “knife”]
weapons = (“sword”, “sling”, “knife”)
weapons = [“sword”, “sling”, “knife”]
Which of these lines of code would import both the random and the time modules?
import random, time
import random and time
time.import, random.import
import(random, time)
When using HTML, your text should be placed between the opening and the closing tags.
True
False
Answer:
1. True
2. World Wide Web
3. weapons = [“sword”, “sling”, “knife”]
4. import random, time
5. True.
Explanation:
For number 1 I'm not quite sure since I never personally used it, but it does reduce CPU usage when activated so it's very possible it's true.
What should a user do to find and replace text throughout a field? Use the drop-down menus to complete the steps
1. Put the cursor in the field to search
2. In the Home tab, open the dialog box
3. On the
tab, enter the text to search for and the replacement text
4. After a few instances to make sure the text is being replaced correctly, you can then click
to
change all instances
The thing that a user should do to find and replace text throughout a field are:
1. Put the cursor in the field to search.
2. Open the find dialog box.
3. On the Replace tab, enter the text to search for and the replacement text.
4. Click Replace All to change all instances.
How do you search for and replace text across an entire field?The keys on the keyboard CTRL+F is often used to find. The dialog window for Find and Replace appears. Click the Find tab in the Find and Replace dialog box to search for data. Click the Replace tab to perform a find-and-replace operation.
The operations are:
1. Click Find and Select in the Editing group on the Home tab, then select Replace from the drop-down list.
2. In the dialog box, select the objects you want to Find and Replace by clicking the Options button.
3. Press the Replace or Replace All button.
Therefore, If you want to replace all occurrences of a word or format in a document, use the Ctrl+H Find and Replace function. This is very useful for lengthy papers.
Learn more about Editing from
https://brainly.com/question/15768529
#SPJ1
See full question below
What are the steps to replace one piece of text with another throughout a field? Use the drop-down menus to
complete the statements.
1. Put the cursor in the field to search.
2. Open the _____
dialog box.
3. On the Replace tab, enter the text to search for and the replacement text.
4. Click -------to change all instances.
Join for a pack battle loud microphone.
--concept mapping--
importance of trees for people:
1.
2.
3.
4.
5.
importance of trees for animals
1.
2.
3.
4.
5.
Answer:
-Both need oxygen from the trees to breathe
-Without trees the population of animals and people would be dying
Explanation:
Thats all I can think of
Please help! No one is answering these correctly!
A gateway is a common network hardware component that does what?
enables a network to connect to other networks
verifies user credentials to grant network access
connects many devices to a network using a single port
allows specific kinds of data into different parts of a network
What is the best way to prevent the most common cause of network failure?
Avoid using USB cables for connecting devices.
Maintain careful records of networked devices.
Use up-to-date antiviral software to protect computers.
Upgrade routers and servers annually.
Answer:
it is either c or d
I'm 99.5% sure it is C tho
1.Two robots start out at 426c cm. apart and drive towards each other. The first robot drives at 5 cm per second and the second robot drives at 7 cm. per second. How long will it take until the robots meet?
In your response below, please answer each of the following questions:
a. What is the question being asked?
b. What are the important numbers?
c. Are their any variables?
d. Write an equation.
e. Solve the equation.
f. Do you think your answer is reasonable? Explain.
Answer:
a. The time it will take for the two robots meet
b. The important numbers are;
426 (cm), 5 (cm/second) and 7 (cm/second)
c. Yes, there are variables
d. The equation is 5 cm/s × t + 7 cm/s × t = 426 cm
e. The solution of the equation is, t = 35.5 seconds
f. Yes, the answer is reasonable
Explanation:
a. The question being asked is the time duration that will elapse before the two robots meet
b. The important numbers are;
The distance apart from which the two robots start out, d = 426 cm
The speed of the first robot, v₁ = 5 cm/second
The speed of the second robot, v₂ = 7 cm/second
c. The variables are;
The distance apart of the two robots = d
The speed of the first robot = v₁
The speed of the second robot = v₂
The time it takes for the two robots to meet = t
d. The equation is;
v₁ × t + v₂ × t = d
Plugging in the known values of v₁, v₂, we have;
5 cm/s × t + 7 cm/s × t = 426 cm...(1)
e. Solving the equation (1) above gives;
5 cm/s × t + 7 cm/s × t = t × (5 cm/s + 7 cm/s) = t × 12 cm/s = 426 cm
∴ t = 426 cm/(12 cm/s) = 35.5 s
t = 35.5 seconds
f. The time it would take the two robots to meet, t = 35.5 seconds
The answer is reasonable, given that the distance moved by each robot in the given time are;
The distance moved by the first robot, d₁ = 35.5 s × 5 cm/s = 177.5 cm
The distance moved by the second robot, d₂ = 35.5 s × 7 cm/s = 248.5 cm
d₁ + d₂ = 177.5 cm + 248.5 cm = 426 cm.
PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?
A.
all cabling
B.
all internal components
C.
the CPU
D.
the internal DVD drive
Answer:
a) all cabling hope it helps
what are the uses of plotters
Answer:
Plotters are use to produce the hard copy of schematics and other similar applications They are mainly used for CAE applications.They can print on a wide variety of flat materialsHope it helps :)❤
Answer:
Plotters are used to print graphical output on paper. It interprets computer commands and makes line drawings on paper using multicolored automated pens. It is capable of producing graphs, drawings....
Which sentence best justifies the benefits of using enterprise systems?
Early systems (in the 1960s) focused on the automation of individual functions, such as financial accounting and inventory management, primarily in the manufacturing industry. In the 1970s, the systems allowed planning of product requirements. Resource planning then began, which included not just shop floor planning but finance, engineering, human resources, distribution, and project management planning activities as well.
We now use enterprise systems that integrate all functions, including inventory control, accounting, and human resources. These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency. Extended ERP systems include CRM, SCM, and advanced planning and scheduling. New systems include capabilities for business intelligence and cloud-based computing.
Answer:
These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency.
Explanation:
when should a computer definitely have an ip address
Use the drop-down tool to select the word or phrase that completes each sentence. Text within a document that is linked to other information available to the reader is called _______. A unique location for a computer on the network is its _______. The ________ is the ability of a network tor cover after any type of failure. The computer that responds to requests from the client computer is known as the ________. A ________ is an ordered list of tasks waiting to be performed.
Answer:
1. Hyperlink
2. IP address
3. Fault tolerance
4. Server
5. To do list
Explanation:
Text within a document that is linked to other information available to the reader is called HYPERLINK.
A unique location for a computer on the network is its IP ADDRESS.
The FAULT TOLERANCE is the ability of a network to cover after any type of failure.
The computer that responds to requests from the client computer is known as the SERVER.
A TO-DO LIST is an ordered list of tasks waiting to be performed.
Answer:
hypertext
IP address
fault tolerance
server
queue
Explanation:
just did it on edg
Every single device can be connected to every other device on network, making the network mesh. This statement is True or False? *
1 point
True
False
Answer:
true
Explanation:
we can connect to any device which has a network connection
What is ransomware
я
Answer:
Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.
Explanation:
:)
Why do we use if statements?
To tell Tracy to stop our code if there’s an error
To have Tracy make decisions based on conditional statements
To tell Tracy to do something if we run our code
To have Tracy complete one function at a time
1. Harold Worden, then 56-years-old, stole Kodak property
that was worth millions of dollars. He had worked for
Kodak for over 30 years and did not return confidential
documentation when he left the company in 1992.
He attempted to try and sell his ill-gotten gains to Kodak's
competitors while trying to start his own consulting firm.
The following scenario is an example of?
Answer:
Industrial espionage
Explanation:
Espionage is defined as the act of spying or the use of spies to acquire information on the activities and plans of a government of another country or those of a company in a competitive market
It is the practice of obtaining confidential or secret information and can be considered a felony depending on the case circumstances and the manner of damages caused by the act which is provable and made by the claimant
Industrial espionage is also known as economic espionage
How did imperialism lead to WWI? A The debate of the morality of imperialism created tensions around Europe b Native people were conquered and rebelled against Europe c Europe went into an economic depression when imperialism failed d European nations competed and made alliances to control colonies
Answer:
d. European nations competed and made alliances to control colonies.
Explanation:
The world War I was a period of battle between various countries from 1914 to 1918. It started formally on the 28th of July, 1914 and ended on the 11th of November, 1918.
Imperialism can be defined as a policy, ideology, or advocacy that sought to extend a country's power, dominion, authority and influence over another country through diplomacy, use of military force or colonization (direct territorial acquisition).
This ultimately implies that, imperialism is an advocacy or policy that is typically used to impose or extend a country's power, dominion, authority and influence. It simply means to seek colonies of other nations or countries.
Hence, imperialism led to WW1 because European nations competed and made alliances to control colonies.
In conclusion, there was an eagerness on the part of European Nations to gain colonial territories that were owned by other rival nations.
8.6 Code Practice: Question 2
Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.
After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.
Answer:
import random
def buildArray():
amount = int(input("How many values to add to the array: "))
array = []
for i in range(amount):
array.append(random.randint(10, 99))
return array
array = buildArray()
print(array)
def sumArray(array):
return sum(array)
sum_array = sumArray(array)
print("The total is: ", sum_array)
Explanation:
this gave me 80%
In this exercise we have to use the knowledge of computational language in python to write the code.
We have the code in the attached image.
The code in python can be found as:
import random
def buildArray():
amount = int(input("How many values to add to the array: "))
array = []
for i in range(amount):
array.append(random.randint(10, 99))
return array
array = buildArray()
print(array)
def sumArray(array):
return sum(array)
sum_array = sumArray(array)
print("The total is: ", sum_array)
See more about python at brainly.com/question/26104476
what is the best free website to learn phyton programming