Answer:
animate
Explanation:
PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.
Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.
Furthermore, slide transition is an inbuilt feature of a presentation software that automatically changes the slides at regular intervals.
Generally, when a PowerPoint presentation is created, applying movement to a text or an object in order to control its display during the presentation is simply referred to as animation. There are various animation effects that could be applied by the user depending on his or her choice.
what is computer and its features
Answer:
A computer is a machine that can be programmed to manipulate symbols.
Explanation:
Following are the features of PC (computer)
Processor
speed
reliability
accuracy
automation
diligence
consistency
Random access memory (RAM)
Operating system
Graphics adapter and video RAM
Monitor
Answer:
Computer Is a Electronic Machine Used To Play Games and for school assigments
i know i know i should be asking a question HOWEVER i have a task for you... PLAY LEGEND OF ZELDA BREATH OF THE WILD AND I"LL GIVE YOU BRAINLIEST!!!!!!
Answer: who doesnt play that down right amazing game?
Explanation: it is perfection
Answer:
I ALREADY HAVE OVER 1000 HOURS ON THE GAME! I STARTED IN 2019
Explanation:
Best game ever
Take a list of numbers that range in value from 0 to 9 and output how many occurrences of each number exist.
Answer:
The program in Python is as follows:
def count_occur(myList):
freq = {}
for item in myList:
if item in freq:
freq[item] += 1
else:
freq[item] = 1
for item in freq:
print(item," ",freq[item])
Explanation:
This gets the list from the main
def count_occur(myList):
This initializes an empty dictionary
freq = {}
This iterates through the list and count the occurrence of each item
for item in myList:
if item in freq:
freq[item] += 1
else:
freq[item] = 1
This iterates through the dictionary
for item in freq:
This prints each dictionary item and the frequency separated by -
print(item," ",freq[item])
which format is best for photos?
JPEG
DOC
GIF
Wav
Select the correct answer.
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quality assurance?
O A.
billing
ОВ.
recruiting
OC.
testing
OD
installing
O E.
accounting
Answer:
E
Explanation:
any part of a computer which you are able to touch is called
Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, including the LAN and WAN. Reesa routinely monitors network performance, and performs network maintenance. Reesa is employed as a __________.
Answer:
System Administrator
Explanation:
A System Administrator is the individual who specifically handles the administrative functions of the IT department in an organization. The personnel is also responsible to administer, maintain, configure and upkeep the security of the computers.
In the given situation, Reesa is provided with the job responsibility of installing and maintaining the internet system in the company. The job specifications that are entitled to Reesa is of the System Administrator.
Why are message board discussions moderated?
A.
to rectify spelling and grammar
B.
to delete irrelevant or offensive posts
C.
to facilitate communication between group members
D.
to ensure that discussions topics are interesting
You have assigned one administrator the task of conducting database backups only and another co-worker can only perform the restores. What is this security principal called
Answer:
Separation of Duties
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Separation of duties can be defined as a strategic process which typically involves assigning specific tasks or responsibilities to certain employees and no one is expected to take the role of another.
In this scenario, you assigned the task of conducting database backups only to an administrator while another co-worker is saddled with the responsibility of perform backup restores only. Thus, this security principle is called the separation of duties.
Why do people say badass
Answer:
ummm....
Explanation:
maybe they just think it sounds cool?
Que es hipermedia
porfavorrrrr
Explanation:
hipermedia sirve para designar al conjunto de métodos o procedimientos para escribir, diseñar o componer contenidos que integren soportes tales como: texto, imagen, video, audio, mapas y otros soportes de información emergentes, de tal modo que el resultado obtenido, además, tenga la posibilidad de ...
11.An Artificial Neural Network Is based on a) Strong Artificial Intelligence approach b) Weak Artificial Intelligence approach c) Cognitive Artificial Intelligence approach d) Applied Artificial Intelligence approach
Answer:
C.
Explanation:
The cognitive Artificial Intelligence Approach is an approach that helps to test theories concerning human minds. It is an artificial intelligence agent that is designed to think and act rationally like humans.
The artificial neural network is based on the cognitive artificial intelligence approach. With the help of this artificial intelligence, computers will be able to test theories of how humans recognize faces, for instance.
Therefore, option C is correct.
A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engineer utilize in an attempt to find the origin of the malware
Answer:
Analyze network traffic
Identify the method of execution
Explanation:
Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.
Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.
Hence, in this case, the system engineer should carry out the following steps:
1. Analyze network traffic
2. Identify the method of execution
APCS A: I'm reviewing an old ap test and can't get past this problem:
What is the difference between printing (n) and printing row[n]?
Answer:
The answer is "Option A"
Explanation:
Following are the complete code to these question:
public class Arr//defining a class-Arr
{
public static void main(String[] args)//main method
{
int [][] numbers={{1, 2, 3},{4,5,6}}; //defining 2D array numbers
for(int[] row : numbers) //use for loop that holds all array value into 1D array
{
for (int n: row)//defining n variable that holds row array values
{
System.out.print (n); //print n variable value
}
}
}
}
The code comment explains its functioning.
What is an abstraction?Parts of a song that are related, but also are distinct from each otherA bundling of ideas to form a single conceptA variety of sounds throughout sectionsA statement that returns a value to the function call
Debug the following program.
REM "Program to generate 2 2 4 6 10. 16... up to 10th terms" CLS
A=2
B=3
For I=1 to 10
Display A; B;
A=A+B
B=A+B
NEXT X
END
Answer:
The debugged program is as follows:
A=2
B=2
For I=1 to 10
PRINT A
TEMP = A
A=B
B=TEMP+A
NEXT I
END
Explanation:
First, the value of B should be changed to 4 (because the second term of the sequence is 2
Next, change Display to Print because Q-basic uses the print keyword to display output
The sequence is not properly generated. So, I update that part of the program to:
For I=1 to 10
PRINT A
TEMP = A
A=B
B=TEMP+A
NEXT I
Lastly, the loop is controlled by variable I (not X).
So change NEXT X to NEXT I
how do I type over Images (photo posted
Answer:
Explanation:
1) Download onto computer
2) Open using MS WORD
3) Go to insert and choose the textbox option and draw a textbox.
4) Write one of the answers in the textbox.
5) There will be like a upside down ribbon when textbox is selected. IT will be called layout options. Select "In front of text".
6) Simply move the textbox in front of the picture in the desired place.
I tried on my end and it works!
help please give me the correct ans....
write a qbasic program to print the word "hello" 10 times [by using for next]
http://www6.uniovi.es/qbasic/qtutor1.html
go to this link and it will show you how to solve your problem
Edwin owns a smart phone with a digital assistant. He frequently enquires on political, sports, and weather updates. The assistant recognizes the words and phrases and provides appropriate answers. What technology is used to make the assistant respond to Edwin
Answer:
Speech synthesis
Explanation:
Synthesized speech is the technology of production of the speech of humans artificially. The technology can be made use of in hardware and software products such as a speech computer which is used to perform speech synthesis
Another implementation of the synthesized speech technology is the text-to-speech (TTS) systems that are used for the conversion of speech into written text as the words are dictated.
Match each of the following network types to its definition: I. HAN II. MAN III. LAN IV. PAN V. WAN A. confined to a small geographic location beyond the home B. services a residence C. used to communicate among devices near an individual D. covers a city E. a network that covers the greatest distance
Answer:
I. ===> B
II. ===> D.
III ===> A
IV ===> C
V ===> E.
Explanation:
PAN is the smallest network. Then comes then HAN then LAN.
MAN covers a city and WAN covers the greatest distance.
1. Which is not a cold sandwich?
a. Pinwheel sandwich
b. Tea sandwich
c. Wrap sandwich
d. Grilled sandwich
Answer:
D. Grilled sandwich
Explanation:
Grilled sandwich is a kind of hot sandwich.
Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or activities that are not appropriate in the workplace?
Do not use computer access or the Internet for unprofessional or inappropriate purposes.
Protect system access of users.
Do no harm to a company when leaving.
Be fair and honest with customers.
Answer:
"Which of the following ethical guidelines is best described as preventing Social Security numbers, bank account numbers, addresses, and phone numbers from getting in the wrong person’s hands?"
A: Respect confidentiality of data
Explanation:
correct on Edg
Answer:
Respect confidentiality of data.
And
Do not use computer access or the Internet for unprofessional or inappropriate purposes.
Explanation:
artefacto o servicio producido de manera artesanal o Industrial que puede satisfacer plenamente una necesidad o interés de la localidad la región en que viven
Answer:
sorry, don't speak this language :)))
Explanation:
Computers are able to think like human beings true or false?
Answer:
False. Cuz they work the way they are programmed, which can be like a human being, but is not exactly it. They are built this way so they work as what the user thinks. (e.g. being sure to delete a file/recommending what the user might like)
make me brainliestt :))
what are the answers for these question?
Answer:
tbh u gotta give more points in order for me to solve that:)
Explanation:
Question 6 [10 marks] a) How does a company's use of information systems affect its corporate strategies? (7 marks) b) Provide an example. (3 marks)
Answer:
following are the responses to the given question.
Explanation:
The capability to successfully utilize IT is mutually dependent on its ability to execute strategic strategy and set business goals. The ability to compete more and more relies on the capacity of an organization of using technology. In the future, what a company wants to do will rely on what its technologies can do. It may be an example of a company investing in information technology that allows a company to manufacture new products or improve the efficiency of the distribution system to the corporation's economic efficiency.
A table is a set of rows and columns that is used for organizing data.
True
False
Los organos de los sentidos perciben de la misma manera un estimulo?porque?
Espero que te ayude!!!!
Can anyone can tell me the full form of CRT
Answer:
[tex]\huge\colorbox{pink}{✏﹏ \: CRT \: }[/tex]
✏ CRT stands for Cathode Ray Tube.
Answer:
CRT stands for; CATHODE RAY TUBE
Advertising Photography: Mastery Test
5
Select the correct answer.
Maria is writing advertising copy for a client. What is a good practice for her to follow?
A.
write the copy from her own perspective
B.
use long sentences and strong words
ООО
C.
use active voice in sentences whenever possible
D.
use ambiguous sentences whenever possible
Answer: C. use active voice in sentences whenever possible
Explanation:
Since Maria is writing advertising copy for a client, the good practice for her to follow is to use active voice in sentences whenever possible. Active voice is important as it'll create vivid images and will also make the sentences to be clear, and convincing.
Writing the copy from her own perspective, the use of long sentences, strong words and ambiguous sentences are incorrect. Therefore, the correct option is C.