Which of the following is the file type of Microsoft® Publisher files?

.txt

.doc

.pub

.xlsx

Answers

Answer 1

Answer:

Which of the following is the file type of Microsoft® Publisher files?:

.pub

Answer 2

.pub is the file type of Microsoft® Publisher files.

What is Publisher Files?

If an email contains a Publisher (.pub) file that you are unable to access, you can download the most recent Office trial, which includes Publisher 2013.

You may discover more about how Publisher can assist you in producing publications that appear professional with the trial version.

Although if you are no longer able to produce or modify publications, you can still use the trial version as a viewer for Publisher files once it expires.

Therefore, .pub is the file type of Microsoft® Publisher files.

To learn more about Publisher files, refer to the link:

https://brainly.com/question/17154296

#SPJ2


Related Questions

Match the organelles to their functions.
Golgi apparatus
lysosome
smooth endoplasmic reticulum
nucleus
produces lipids and fats
arrowRight
produces lysosomes
arrowRight
digests foreign material
arrowRight
commands other organelles
arrowRight

Answers

Answer:

I. Smooth endoplasmic reticulum.

II. Golgi apparatus.

III. Lysosomes.

IV. Nucleus.

Explanation:

A cell can be defined as the fundamental or basic functional, structural and smallest unit of life for all living organisms. Some living organisms are unicellular while others are multicellular in nature.

A unicellular organism refers to a living organism that possess a single-cell while a multicellular organism has many (multiple) cells.

Generally, cells have the ability to independently replicate themselves. In a cell, the "workers" that perform various functions or tasks for the survival of the living organism are referred to as organelles.

Some examples of cell organelles with their respective functions in all living organisms such as trees, birds, and bacteria include;

1. Nucleus : it controls all the activities taking place in the cell and the synthesis of proteins. Thus, it's the organelle that commands other organelles.

2. Mitochondria : it provides all the energy required in the cell by transforming energy forms.

3. Lysosomes : they are responsible for absorbing materials and breaking the materials taken in by the cells. Thus, it digests foreign material.

4. Chromosomes : they give sets of instructions for the synthesis of products.

5. Ribosomes : they are involved in the build up of proteins.

6. Smooth Endoplasmic Reticulum : this is where the ribosomes perform their tasks. Thus, it produces lipids and fats.

7. Cytoskeleton : they help to maintain and support the shape of the cells.

8. Vesicles : they ensure proteins are properly transported to the right and exact location.

9. Golgi apparatus : it prepares the protein for export by chemically tagging them. Also, this organelle produces lysosomes.

10. Cell membrane : is the wall of the cell and typically controls what leaves and enters the cell.

Answer:

Golgi Apparatus matched to lysosomes

Lysosomes matched to digesting foreign material

smooth endoplasmic reticulum matched to produces lipids and fats

Nucleus matched to commands other organelles

Explanation:

The golgi apparatus produces the lysosomes

the lysosomes are in the cell to digest things to smaller and more usable for the cell

the smooth endoplasmic reticulum produces the lipids and fats

the nucleus is the biggest organelle in a cell and commands every other organelle. It also has the DNA of the cell.

I hope I was helpful!

Have a good day.

Which statement best describes a database?

Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.

Answers

I think it's a. A collection of related tables

Select the correct answer.
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quality assurance?
O A.
billing
ОВ.
recruiting
OC.
testing
OD
installing
O E.
accounting

Answers

Answer:

E

Explanation:

edhesive assignment 2: room area?

Answers

Explanation:

a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ')

print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))

a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ') print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))

What is program?

The program is an illustration of functions. Functions are groups of code segments that are executed when called or evoked

The calendar program

The calendar program in Python, where comments are used to explain each line is as follows:

#This checks for leap year

def leap_year(y):

if y % 4 == 0:

return 1 else return 0

#This returns the number of days in the month

def number_of_days(m,y):

if m == 2:

return 28 + leap_year(y)

elif m == 1 or m == 3 or m == 5 or m == 7 or m == 8 or m ==10 or m == 12:

return 31

elif m == 4 or m == 6 or m == 9 or m == 11:

return 30

#This returns the number of days left in the month

def days(m,d):

dayList = [0,31,59,90,120,151,181,212,243,273,304,334]

return dayList[m-1] + d

#This returns the number of days left in the year

def days_left(d,m,y):

if days(m,d) <= 60:

return 365 - days(m,d) + leap_year(y) else:

return 365 - days(m,d)

#The main begins here

#This next three lines gets input for date

day=int(input("Day: "))

month=int(input("Month: "))

year=int(input("Year: "))

#This gets the choice from the user

menu=int(input("Press 1 to calculate the number of days in the given month.\nPress 2 to calculate the number of days left in the given year.\nChoice: "))

#This prints the number of days in the month

if menu == 1:

print(number_of_days(month, year))

#This prints the number of days left in the year

elif menu == 2:

print(days_left(day,month,year))

Read more about Python functions at:

brainly.com/question/14284563

#SPJ7

The complete part of the question will be:

Assignment 3: Chatbot

What the code for assignment 3: chatbot Edhesive.

You have assigned one administrator the task of conducting database backups only and another co-worker can only perform the restores. What is this security principal called

Answers

Answer:

Separation of Duties

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Separation of duties can be defined as a strategic process which typically involves assigning specific tasks or responsibilities to certain employees and no one is expected to take the role of another.

In this scenario, you assigned the task of conducting database backups only to an administrator while another co-worker is saddled with the responsibility of perform backup restores only. Thus, this security principle is called the separation of duties.

A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engineer utilize in an attempt to find the origin of the malware

Answers

Answer:

Analyze network traffic

Identify the method of execution

Explanation:

Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.

Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.

Hence, in this case, the system engineer should carry out the following steps:

1. Analyze network traffic

2. Identify the method of execution

Can someone plz help me answer my questions!!!!!!!!!!!

Answers

Answer:

what is your question

where is it at?

Que es hipermedia


porfavorrrrr

Answers

Explanation:

hipermedia sirve para designar al conjunto de métodos o procedimientos para escribir, diseñar o componer contenidos que integren soportes tales como: texto, imagen, video, audio, mapas y otros soportes de información emergentes, de tal modo que el resultado obtenido, además, tenga la posibilidad de ...

Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or activities that are not appropriate in the workplace?

Do not use computer access or the Internet for unprofessional or inappropriate purposes.

Protect system access of users.

Do no harm to a company when leaving.

Be fair and honest with customers.

Answers

Answer:

"Which of the following ethical guidelines is best described as preventing Social Security numbers, bank account numbers, addresses, and phone numbers from getting in the wrong person’s hands?"

A: Respect confidentiality of data

Explanation:

correct on Edg

Answer:

Respect confidentiality of data.

And

Do not use computer access or the Internet for unprofessional or inappropriate purposes.

Explanation:

Edwin owns a smart phone with a digital assistant. He frequently enquires on political, sports, and weather updates. The assistant recognizes the words and phrases and provides appropriate answers. What technology is used to make the assistant respond to Edwin

Answers

Answer:

Speech synthesis

Explanation:

Synthesized speech is the technology of production of the speech of humans artificially. The technology can be made use of in hardware and software products such as a speech computer which is used to perform speech synthesis

Another implementation of the synthesized speech technology is the text-to-speech (TTS) systems that are used for the conversion of speech into written text as the words are dictated.

Sanjay has 38 blue beads. And 26 red beads. He needs 8 beads to make 1 wrist band. How many wristbands can Sanjay make if he uses all of his beads?

Answers

Answer:

8

Explanation:

In total, Sanjay has 64 beads. if you divide the 64 beads by the amount of beads it takes to make one band (8) the answer would be 8.

Answer:

make the top answer brainly

Explanation:

Why are message board discussions moderated?

A.
to rectify spelling and grammar
B.
to delete irrelevant or offensive posts
C.
to facilitate communication between group members
D.
to ensure that discussions topics are interesting

Answers

A ibahg ninja idea a,c

In what way do graphs and charts help in decision-making? Select the most important point.

A.
They identify errors in the data.
B.
They can be included in slideshow presentations.
C.
They reveal patterns in data.
D.
They automate calculations.
E.
They can be inserted into documents.

Answers

I think c. They reveal patterns in data.

A scale drawing that uses standardized terms, abbreviations, symbols and practices to show an object precisely

Answers

Answer:

Detail drawing

Explanation:

Detail drawing is a form of technical drawing often used in architecture and engineering design. It is well scaled and uses standardized terms, abbreviations, symbols, and practices to show an object precisely. Both engineers and architects use it. It is also part of assembly drawings that are used during the actual construction of structures. Detail drawings are produced on standard paper sizes, and it contains the following:

2. Engineer or Architect's name

2. Part of the structure's name

3. Material type for the structure

4. Drawing scale

5. Date of the drawing

6. Structural views, such as front, back, or side elevations.

7. isometric view

8. The dimensions used, including sizes

9. All dimension tolerances applicable

APCS A: I'm reviewing an old ap test and can't get past this problem:

What is the difference between printing (n) and printing row[n]?

Answers

Answer:

The answer is "Option A"

Explanation:

Following are the complete code to these question:

public class Arr//defining a class-Arr

{

public static void main(String[] args)//main method  

{

        int [][] numbers={{1, 2, 3},{4,5,6}}; //defining 2D array numbers

for(int[] row : numbers) //use for loop that holds all array value into 1D  array

{

for (int n: row)//defining n variable that holds row array values  

{

System.out.print (n); //print n variable value

}

}

}

}

The code comment explains its functioning.

what is computer and its features

Answers

Answer:

A computer is a machine that can be programmed to manipulate symbols.

Explanation:

Following are the features of PC (computer)

Processor  

speed  

reliability  

accuracy  

automation  

diligence  

consistency    

Random access memory (RAM)  

Operating system  

Graphics adapter and video RAM  

Monitor

Answer:

Computer Is a Electronic Machine Used To Play Games and for school assigments

what are the answers for these question?

Answers

Answer:

tbh u gotta give more points in order for me to solve that:)

Explanation:

1. Which is not a cold sandwich?
a. Pinwheel sandwich
b. Tea sandwich
c. Wrap sandwich
d. Grilled sandwich

Answers

Answer:

D. Grilled sandwich

Explanation:

Grilled sandwich is a kind of hot sandwich.

Computers are able to think like human beings true or false?

Answers

Answer:

False. Cuz they work the way they are programmed, which can be like a human being, but is not exactly it. They are built this way so they work as what the user thinks. (e.g. being sure to delete a file/recommending what the user might like)

make me brainliestt :))

explain what the hexadecimal code in a MAC address represents

Answers

Answer:

An Ethernet MAC address consists of a 48-bit binary value. Hexadecimal is used to identify an Ethernet address because a single hexadecimal digit represents 4 binary bits. Therefore, a 48-bit Ethernet MAC address can be expressed using only 12 hexadecimal values.

Which one is not considered part of the cinematography team?

cinematographer
sound recorder
director of photography
camera operator

Answers

sound recorder

Explanation:

i hope it works

Sound recorder since it lists in the non living things and is a machine used

Match each of the following network types to its definition: I. HAN II. MAN III. LAN IV. PAN V. WAN A. confined to a small geographic location beyond the home B. services a residence C. used to communicate among devices near an individual D. covers a city E. a network that covers the greatest distance

Answers

Answer:

I. ===> B

II. ===> D.

III ===> A

IV ===>  C

V ===> E.

Explanation:

PAN is the smallest network. Then comes then HAN then LAN.

MAN covers a city and WAN covers the greatest distance.

Take a list of numbers that range in value from 0 to 9 and output how many occurrences of each number exist.

Answers

Answer:

The program in Python is as follows:

def count_occur(myList):

   freq = {}

   for item in myList:

       if item in freq:

           freq[item] += 1

       else:

           freq[item] = 1

       

   for item in freq:

       print(item," ",freq[item])

Explanation:

This gets the list from the main

def count_occur(myList):

This initializes an empty dictionary

   freq = {}

This iterates through the list and count the occurrence of each item

   for item in myList:

       if item in freq:

           freq[item] += 1

       else:

           freq[item] = 1

This iterates through the dictionary

   for item in freq:

This prints each dictionary item and the frequency separated by -

       print(item," ",freq[item])

Los organos de los sentidos perciben de la misma manera un estimulo?porque?

Answers

Espero que te ayude!!!!

Debug the following program.


REM "Program to generate 2 2 4 6 10. 16... up to 10th terms" CLS

A=2

B=3

For I=1 to 10

Display A; B;

A=A+B

B=A+B

NEXT X

END​

Answers

Answer:

The debugged program is as follows:

A=2

B=2

For I=1 to 10

PRINT A

TEMP = A

A=B

B=TEMP+A

NEXT I

END

Explanation:

First, the value of B should be changed to 4 (because the second term of the sequence is 2

Next, change Display to Print because Q-basic uses the print keyword to display output

The sequence is not properly generated. So, I update that part of the program to:

For I=1 to 10

PRINT A

TEMP = A

A=B

B=TEMP+A

NEXT I

Lastly, the loop is controlled by variable I (not X).

So change NEXT X to NEXT I

highlight the possible risks and problems that should be address during the implementation of information system process

Answers

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment

11.An Artificial Neural Network Is based on a) Strong Artificial Intelligence approach b) Weak Artificial Intelligence approach c) Cognitive Artificial Intelligence approach d) Applied Artificial Intelligence approach

Answers

Answer:

C.

Explanation:

The cognitive Artificial Intelligence Approach is an approach that helps to test theories concerning human minds. It is an artificial intelligence agent that is designed to think and act rationally like humans.

The artificial neural network is based on the cognitive artificial intelligence approach. With the help of this artificial intelligence, computers will be able to test theories of how humans recognize faces, for instance.

Therefore, option C is correct.

Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, including the LAN and WAN. Reesa routinely monitors network performance, and performs network maintenance. Reesa is employed as a __________.

Answers

Answer:

System Administrator

Explanation:

A System Administrator is the individual who specifically handles the administrative functions of the IT department in an organization. The personnel is also responsible to administer, maintain, configure and upkeep the security of the computers.  

In the given situation, Reesa is provided with the job responsibility of installing and maintaining the internet system in the company. The job specifications that are entitled to Reesa is of the System Administrator.

Why do people say badass

Answers

Answer:

ummm....

Explanation:

maybe they just think it sounds cool?

Badass is defined as something or someone cool or something or someone tough, rebellious or aggressive. Like for an example “yo look at my new motorcycle doesn’t it look badass (cool”

Question 6 [10 marks] a) How does a company's use of information systems affect its corporate strategies? (7 marks) b) Provide an example. (3 marks)

Answers

Answer:

following are the responses to the given question.

Explanation:

The capability to successfully utilize IT is mutually dependent on its ability to execute strategic strategy and set business goals. The ability to compete more and more relies on the capacity of an organization of using technology. In the future, what a company wants to do will rely on what its technologies can do. It may be an example of a company investing in information technology that allows a company to manufacture new products or improve the efficiency of the distribution system to the corporation's economic efficiency.

Other Questions
What is the meaning of the following word?peridicobooknewspapertelephoneradio Pi is a name given to the ratio of the circumference of a circle to the diameter. That means, for any circle, you can divide the circumference (the distance around the circle) by the diameter and always get exactly the same number. It doesn't matter how big or small the circle is, Pi remains the same. Pi is often written using the symbol and is pronounced "pie", just like the dessert.History | Pi web sites| Do it yourself Pi |The Digits| FormulasA Brief History of PiAncient civilizations knew that there was a fixed ratio of circumference to diameter that was approximately equal to three. The Greeks refined the process and Archimedes is credited with the first theoretical calculation of Pi.In 1761 Lambert proved that Pi was irrational, that is, that it can't be written as a ratio of integer numbers.In 1882 Lindeman proved that Pi was transcendental, that is, that Pi is not the root of any algebraic equation with rational coefficients. This discovery proved that you can't "square a circle", which was a problem that occupied many mathematicians up to that time. (More information on squaring the circle.)How many digits are there? Does it ever end?Because Pi is known to be an irrational number it means that the digits never end or repeat in any known way. But calculating the digits of Pi has proven to be an fascination for mathematicians throughout history. Some spent their lives calculating the digits of Pi, but until computers, less than 1,000 digits had been calculated. In 1949, a computer calculated 2,000 digits and the race was on. Millions of digits have been calculated, with the record held (as of September 1999) by a supercomputer at the University of Tokyo that calculated 206,158,430,000 digits. (first 1,000 digits) Summarize it very simple PLEASE HELP ME mhanifa The Dred Scott Decision was called "The worst decision the Supreme Court has ever made?" Why do you think this case was called that? A) -198+(-32) ayuda portaB)-99+(-12) What are some life lessons you have learned from the start of quarantine to now? PLEASE HELP ASAP!!!!!! WILL MARK!!!Which of the following is an example of work.O A pencil laying on top of a desk.O A dog wagging its tail.O A box sitting on the floor.O A car that is parked. which type of fingerprint is shown below? (attachment) Does anyone what to talk. I need someone to talk to pls. Drag each tile to the correct box.Tickets for all of the described charity raffles cost $2 per ticket. Arrange the raffles in ascending order of their expected values to the player,The player picks a single letter from A to Janda single digit from 0 to 9. If both the letterandthe digit match the letter and the digitpickedon that day, the player wins $150. Which expression is equivalent to 2(3 - x) - 12 + 4x?2x - 63 - 63x-72x - 7 Is f(x)=2x^(3)+6x even, odd, or neither? How did Woodrow Wilson's Fourteen Points compare with the eventualoutcome of the Paris Peace Conference? Point A is located at (1,10) and point B is located at (20,18). What point partitions the directed line segment AB into a 2 : 5 ratio? 11.An Artificial Neural Network Is based on a) Strong Artificial Intelligence approach b) Weak Artificial Intelligence approach c) Cognitive Artificial Intelligence approach d) Applied Artificial Intelligence approach Caesar Augustus brought a peace to the Roman Empire that endured long after his death. Caesar Augustus was one of ancient Romes most successful leaders who led the transformation of Rome from a republic to an empire. During his reign, Augustus restored peace and prosperity to the Roman state and changed nearly every aspect of Roman life. An OpenCL Device is composed of: Group of answer choices Command Queues Platforms Processing Elements Compute Units solve these equations, show all your work x/2=20 A day without Rules(Speech) what shapes have 2 pairs of parallel sides? Choose all that arw correct.