Explanation:
I think it's d.
Hope this help
True False Technology Type The 6x6 rule means to keep all objects smaller than 6 inches tall and 6 inches wide. You can set the duration of an animation. Most presentation software lets you post and share presentations online. You cannot change the direction of the transition. A slide can contain a link to another slide, another document, or a Web page.
Answer:
Follows are the true and false statement:
Explanation:
The true statements:
This slide may include a path to a specific slide, paper, or web browser.
The length of the animation could be determined.
Many apps for demonstrations enable you to post and distribute online demonstrations.
The false statements:
Every course of the transformation could not be changed.
The with 6x6 rule, all objects are kept smaller than 6 inches tall and 6 inches wide.
Lifecycle environmental assessment is based on the important realization that
Answer: Life cycle impact assessment (LCIA) refers to the steps that assess the type and extent of environmental impacts that may arise quantitatively based on data collected in the LCI.
Explanation:
Compare the different specialties of video game design in which a video game designer can concentrate.
Answer:
design animators, visual effects, 3d animators
Explanation:
You need both designers and programmers.
Answer:
A game can't be created without both the designer and programmer working closely together from start to finish. Game designers are responsible for the overall creative vision of the game while programmers have the technological know-how to implement the game designers' ideas and bring them to life using computer code.
Explanation:
:)
How can I crack a computer password?
Which of the following statements is true regarding local area networks? SELECT 3 OPTIONS.
A: traditionally used Ethernet cables to connect devices
B: can include wired and wireless connections
C: often used in homes and small businesses
D: uses satellite technology for connections
E: connects devices in a large geographic area
Answer:
A, B and C are correct
Explanation:
A : yes, they did use ethernet cables.
B : Lan networks connected via wires are called , "LAN" and LAN networks that connect to devices wirelessly are called, "WLAN" (Wireless Local Area Networks).
C : LAN networks are a type of network that is based in a small geographical area, therefore, it can be used in homes and small businesses.
Statements that can be considered to be true about local area networks in this question are;
A: traditionally used Ethernet cables to connect devices
B: can include wired and wireless connections
C: often used in homes and small businesses
Local area network can be regarded as is group of two or more connected computers which are positioned in a small geographic area, it could just a small building.This connection can be a wired connection, it can also be a wireless connection.Example if this network is Home networks ,another one is small business networks.
Therefore, option A,BC are all correct.
Learn more at:
https://brainly.com/question/22245838?referrer=searchResults
In Word you can _____ or merge two different copies of the same document into one document. a. replicate b. duplicate c. copy d. combine
Which future US President attacked a French fort in the Ohio River Valley? A. John Adams B. George Washington C. Alexander Hamilton D. James Braddock
Answer:
George Washington
Explanation:
Find the value of 1/2 of 1/2
Answer:
1/2 of 1/2 is 1/4 or 0.25
Explanation:
Answer:
0.25 or 1/4
Explanation:
because 0.50 is 1/2 so half of 0.50 is 0.25 or 1/4
What would be the state of the following list after each of the first four passes in a Bubble sort, sorting into ascending sequence?
(a) 65, 34, 28, 68, 52, 21
Answer:
21,28,34,52,65,68
Explanation:
Following are the Python program to Bubble sort the given array value.
Program:def sort(l):#defining the a method sort that takes list value in parameter
for n in range(len(l)-1, 0, -1):#defining a loop that counts list value and performs the swapping
for i in range(n):#defining another loop that counts range of list
if l[i] > l[i + 1]:#defining if block that check list number value
l[i], l[i + 1] = l[i + 1], l[i]#performing the swapping
l=[ 65, 34, 28, 68, 52, 21]#defining a list l that holds integer value
print("Unsorted list: ")#print message
print(l)#print list value
sort(l)#calling the sort method
print("Sorted Array: ")#print message
print(l)#print sorted list value
Output:
Please find the attached file.
Program Explanation:
Defining the method "sort" that takes list value "l" as a parameter, and defines a loop that counts list values and performs the swapping.Inside the loop, another loop is defined that counts the range of the list and uses a conditional statement.In this case, it uses an if block that checks the list number value and performs the swapping.Outside the method, a list "l" that holds integer values is used, and the print method that calls and prints its value.
Find out more about the sorting here:
brainly.com/question/18568184
Type the correct answer in the box. Spell all words correctly.
How is it possible to access data from any location?
Storing data on the _________ enables access from any location.
Answer:
Storing data on the cloud enables access from any location.
Explanation:
Answer:
the answer is cloud becus i get it right
Explanation:
modern warfare players here lol
Answer:
The answer to this is: lol
Explanation:
Answer:
Gimme Dat UserName
Mine is meterhopper
Explanation:
i think it is a or c is it right?
what is computer?write feature of computer
Answer:
An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program is computer.
And it's feature are:
Multitasking.Accurate & Speed.Efficient.Reliability.Recoverabilitywhat is a computer?.
a computer is a electronic device that works under the control of information stored in its memory.
features of a computer
multitasking.
Which of the following behaviors is considered ethical?
A. copying another user’s password without permission
B. hacking software to test and improve its efficiency
C. using a limited access public computer to watch movies
D. deleting other user’s files from a public computer
Answer:
answer is c. using a limited access public computer to watch movies
Answer:
using a limited access public computer to watch movies
Explanation:
It is the only one that will not get you in big trouble
how does air conditioner work
please short answer please
A user left a comment. Which best describes where will it be seen?
Answer:
IN the comment section usually at the bottom
Explanation:
Answer:
The comments section, usually left under the question answered, or being asked.
Explanation:
Which is the best description of the laws governing IT professionals?
Answer: D, Most laws are directed at the information, data, or intellectual property rather than the IT professional.
Explanation:i just took the test
What is the differences between Google Slides and MS Powerpoint?
HOPE IT HELPS
PLEASE MARK ME BRAINLIEST ☺️
What is the result when you run the following program?
print(“2 + 7”)
print(3 + 1)
Answer:
line 1 = 2+7 (you added quote marks)
line 2 = 4 (you did not add quote marks, which adds both nums together)
Explanation:
Which statement best illustrates the relationship between three different
elements of the circular flow of products?
O A. Households pay wages to businesses, which can then set up
product markets.
O B. Product markets offer labor to businesses, which creates jobs for
households.
O C. Businesses create goods for product markets, which sell them
directly to households.
O D. Resource markets sell goods to product markets, which sell the
goods to businesses
Answer:
C
Explanation:
GDP can be represented by the circular flow diagram as a flow of income going in one direction and expenditures on goods, services, and resources going in the opposite direction. In this diagram, households buy goods and services from businesses and businesses buy resources from households.
A laptop computer is smaller than desktop computer. True or false
Answer:
true
Explanation:
Answer:
true
Explanation:
laptop... sits on ya lap
desktop... sits on the desk
________ were developed to allow computers to communicate using networking standards.
A. Nodes B. Sound cards C. network interface cards
A ______ is an interconnection of computers sharing data and peripherals.
A. Node B. Network C. peripheral
A ______ is any computer or digital device (wired or wireless) using the network to exchange data between other computers.
A. Nodes B. Network C. Analog
Walking the data to someone else is called ______.
A. Network B Sneaker-Net C. peripherals
_______ transformed computing by they providing fast, easy access to messages or data and to other users.
A. Digitals B. Peripherals C. Networks
1.) Network interface cards
2.) Network
3.) Nodes
4.) Sneaker-net
5.) Networks
Answer: Trust the person up top
Explanation:
To simply the task of creating a heading for a science report, a student can create a _____ to run when a specific button is pressed on the quick access toolbar.
i need answer asap
citation
caption
macro
template
Answer:
macro
Explanation:
n what sense is it now possible for a country to be ""occupied"" by an invisible invader that arrives through airwaves and wireless networks? A. It is almost impossible to block foreign countries’ satellite broadcasts and Internet transmissions. B. Spy satellites and other communications technology are increasingly advanced. C. Global positioning systems have allowed detailed mapping of previously inaccessible places. D. The U.S. government can eavesdrop on almost any form of modern communication.
Answer:
Option A. is correct
Explanation:
It now not possible for a country to be "occupied" by an invisible invader that arrives through airwaves and wireless networks. It is almost impossible to block foreign countries’ satellite broadcasts and Internet transmissions inspite of Spy satellites and other communications technology and Global positioning systems.
Option A. is correct
Reflect on the questions below.
1.) Why do some people resist help from others?
2.) Is it useful to work separately at some point in time during pair programming?
3.) How is pair programming beneficial?
4.) In pair programming, how can we better work together?
Answer:
Why do some people resist help from others? Because they fear that their ideas might be rejected.
Is it useful to work separately at some point in time during pair programming? Yes, it is helpful because one can do coding while the other one is navigating or doing something else, it allows the pair to work faster and more efficient.
How is pair programming beneficial? It is beneficial because you can cover more stuff with the help of other people that what you would cover by yourself.
In pair programming, how can we better work together? By communicating with each other, discovering our strengths and working on our weaknesses.
Explanation:
In what situations should you show enthusiasm at work? Check all of the boxes that apply.
when you are congratulated on a job well done
when you are offered a new project
when you know that gossip is occurring among colleagues
when you are running a team meeting
when you are offered a promotion
Answer: A, B, D, E
Explanation: edge 2022
describe oxfird cleric
Answer:
Explanation:
The Oxford Cleric, or otherwise just known as the Cleric, is from a series of tales called the Canterbury Tales. He had a rather simple life as a cleric and was more commonly seen as a philosopher. The Cleric was just a student who used all of his money on books instead of on clothes and was considered poor.
What are some internet hardware components? What is used to make the internet work?
Answer:
Internet Connection Components and Functions
DSL Modem–
DSL/Broadband Filter.
Firewall and NAT Router.
Computer Firewalls –
ICS (Internet Connection Sharing)-
Network Hub.
Network Switch.
Wireless Access Point.
My notifications keep glitching and saying i got messages
But they dry
Answer: just reset the phone
Explanation: if it keeps doing that then you have some app that's not supposed to be there
When determining the cost of an item, the seller will often analyze the demand as well as the supply before setting the price of the blank
.
Answer:
The price of a commodity is determined by supply and demand. therefore the answer is COMMODITY. that other person is wrong
Answer: The correct answer is Commodity
Explanation: This answer is confirmed correct.
Commodity pricing is established based on supply and demand.