Answer: Redd-it
Explanation:
The site that make use of both social bookmarking and visual sharing features and is also described as a virtual pinboard is Redd-it.
Reddit refers to a discussion webiste and a web content rating where the members submit their contents like images, links, text posts and videos. These are then either voted up or voted down by the members based on their perception on the post.
explain the verbal method of communication
Answer:
verbal method of communication means using kaomji, emojis gifs and stickers although you know how to use the keyboard.
Answer:
The Verbal Communication is a type of oral communication wherein the message is transmitted through the spoken words. Explanation: Here the sender gives words to his feelings, thoughts, ideas and opinions and expresses them in the form of speeches, discussions, presentations, and conversations.
Q3.What are the hardware requirement of the multimedia system?
Answer:
• The processing unit
• The memory
• Universal Serial Bus (USB) Device
• Graphics Card and Graphical Processing Unit (GPU)
• Hard drive
• Monitor
• External storage and optical device
*****HELP******
Most Favored Nation (MFN) status and national treatment are also included in the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). True or False
Answer:
True
Explanation:
The Most Favored Nation (MFN) status and national treatment are provided for in article 4 of the Trade Related Aspects of Intellectual Property Rights (TRIPS) Agreement and it is stated that when a member grants favor, advantage, immunity , or privilege to citizens of a country, the country shall grant similar favor, privileges and advantages to the citizens of the other members
Therefore;
True Most Favored Nation (MFN) status and national treatment are also included in the Agreement on Trade-Related Aspects of intellectual Property Rights (TRIPS).
Which term describes the part of a file name after the period that indicates which application can create or open it?
O CSV
O path
O extension
O delimiter
brain of the computer system is called
Answer:
central processing unit in short form CPU :)
Answer:
The Central Processing Unit(CPU)
Explanation:
The CPU is the brain of a computer, containing all the circuitry needed to process input, store data, and output results.
who invented the Bluetooth device
Answer:
The Bluetooth standard was originally conceived by Dr. Jaap Haartsen at Ericsson back in 1994.
Explanation:
according to this website www.androidauthority.com/history-bluetooth-explained-846345/
Answer:
alexander - edg 2022
Explanation:
Match each code snippet to its appropriate markup language name
Answer:
Please find the complete solution in the attached file.
Explanation:
Select the correct answer from each drop-down menu.
Complete the sentence about emphasizing data in a worksheet.
Formatting a cell can refer to _____ formatting and to ____ formatting.
First blank:
1. Unhiding
2. Inserting formulas in
3. Highlighting
Second blank:
1. Changing the font size in the cells that contain the data
2. Moving the data to a separate row or column
3. Creating a header for the row in which the data appears
Answer:
Highlighting
Changing the font size in the cells that contain the data
Explanation:
I got it right on the Edmentum test.
The complete sentence about emphasizing data in a worksheet is given below:
Formatting a cell can refer to highlighting formatting and to changing the font size in the cells that contain the data formatting.Thus, the correct options for blanks are C and A respectively.
What is data formatting?Data formatting may be defined as the process of organization of information according to preset specifications usually for computer processing in order to execute with respect to the instructions.
The concept of data processing deals with the sequential arrangement of sources and information on the basis of certain specifications. The formatting of a specific cell refers to highlighting them for easy identification.
The process of formatting must be done in order to alter the size of the font within the cells that significantly contain the data.
Therefore, the correct options for blanks are C and A respectively.
To learn more about Data formatting, refer to the link:
https://brainly.com/question/25051360
#SPJ2
In which of the following phases of filmmaking would a production team be focused on the process of casting?
(Select all that apply).
pre-production
post-production
development
distribution
Explanation:
There are five phases of film production and they include development, pre-production, production, post-production and distribution.
Answer:
pre-production
Explanation:
edg2021
Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.
The formula =average(B1:B2) displays the value____(see the picture down)
9514 1404 393
Answer:
(a) 10
Explanation:
The formula displays the average of the values 8 and 12. That average is ...
(8+12)/2 = 10
3. The art or technique of decorating wood or leather by burning a design on the surface
with a heated metallic point.
A. Pyrography
C. Wood Turning
B. Gilding
D. Hand Carving
4. Combines several techniques that involve inserting decorative pieces into a base
object to incorporate new designs on the original products.
A. Flocking Technique
C. Inlying
B.
Hand Carving
D. Gilding
5. Lines the interior of drawers and boxes with a soft velvety finish
A. Flocking Technique
C. Inlying
B. Hand Carving
D. Gilding
6. It is used to color wood to give an illusion of texture. This may come in two varieties.
A. Staining
C. Pigment-based
B. Dye-based
D. Inlaying
7. Stain will color small pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
8. Stain will color large pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
9. Decorative technique in which powder is applied on wood or other materials to give a
thin coating of gold from.
A. Inlaying
C. Gilding
B. Staining
D. Wood Carving
10. The simplest way of decorating wood since there are a variety of colors that you can choose from.
One may also add a lacquer finish to make, it shiny and glossy,
A. Flocking Technique
B. Staining
C. Gilding
D. Painting
due tomorrow pls help I'll make brainliest I promise unrelated answer will get reported
Answer:
The answer of number three is pyrography.
In the table below, identify the data type that would be most suitable for the second field.
Name Age Gender
Mary 22 female
Joe 24 male
Kate 21 female
Frank 20 male
A.
binary
B.
Boolean
C.
autonumber
D.
text
E.
number
Answer:
e num
Explanation:
Answer:
A
Explanation:
why do we use number calculations in programming
Answer:
Standard arithmetic is used in many functions of programming. Addition, subtraction, multiplication and division are used in almost every program. Algebra is used to solve simple problems that many computer programmers will encounter
eg:
Obtaining a computer science degree requires completing many math classes
We can draw crescent using ?
Answer:
I think it's B
hope this helps
have a good day :)
Explanation:
Which tool allows users to share code and also serves as a social networking
site for programmers?
A. Dropbox
B. Scratch
C. Kezmo
O D. GitHub
Answer:
D. GitHub
Explanation:
A P E X
The tool that allows users to share code and also serves as a social networking site for programmers is GitHub. Thus, option D is correct.
What is GitHub?A GitHub is a type of tool that has been used quickly fix an issue or bug in the main branch of a repository.
The main purpose of GitHub is to quickly fix an issue without disrupting the ongoing development work in the main branch. This has been allow for more efficient as well as streamlined workflow, as the main branch can continue to be updated while the hotfix branch has been used to address any urgent issues.
The hotfix branch has been created from the main branch and has used to make necessary changes to the code. Once the changes are made, the hotfix branch then merged back into the main branch to update the code and fix the issue.
Thus, option D is correct.
Learn more about GitHub on:
https://brainly.com/question/29316401
#SPJ7
639820- 2852478
425867- 369514
Answer:
639,820 - 2,852,478 = -2,212,658
425,867 - 369,514 = 56,353
Have a nice day!
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions
Answer:
privilege escalation.
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.
In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.
Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.
Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.
How can you make a search phrase more effective?
O A. by framing it as a question
O B. by using more specific search terms
C. by using a different search engine
OD. by using all the search terms you can think of
Let's solve this together.
To make a search term more accurate, you must keep it simple and you must be able to use more specific terms. The more specific you are with what you are asking the engine about, the more friendlier it will respond.
The answer is Option B. I hope this answer helped you!
Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
it crashed a lot
it could only run one application at a time
it didn't use a pointing device
it provided a shell for MS-DOS
Answer:
it providrd a shell for MS-DOS
Explanation:
It basically was a shell to make MS-DOS different. MS-DOS was still the underlying operating system.
Select the correct answer from each drop-down menu.
How does a function work?
A function takes values in the form of____, performs a calculation, and returns a ____.
First blank:
1. Keywords
2. Arguments
3. Math operators
Second blank:
1. Result
2. Cell reference
3. Formula
Answer:
Maths operators
cell reference
Answer:
Arguments
Result
Explanation:
I got it right on the Edmentum test.
What is a worm?
the process of using e-mail to trick a user to share personal information
a type of virus that targets programs and files, and duplicates itself like a biological virus
O a type of software designed to secretly capture personal information and track online activities
O a type of virus that spreads from computer to computer through a network connection
Answer:
Answer is a type of virus that spread from computer to computer through a network connection
Explanation:
What special signal is issued periodically from an Access Point and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP
Answer:
beacon frame
Explanation:
Beacon frame is a management frame In computer networks, known to be in IEEE 802.11 based WLANs. These frames are transmitted periodically and they contain all the information a station will require before it can rightly transmit a frame.
When it comes to announcing the presence of devices in a wireless computer network (WLAN), Beacon frames are used, and they can also be used in the synchronization of the devices and services
PLEASE HELP DUE IN 30 MINUTES NO LINKS PLEASE
Answer:
3
Explanation:
Answer:
Correct answer is C: Format Check
pls help
urgent questions please
Answer:
1 - CLI
2- GUI
3-CLI
4- CLI
what is the behavior of an element with static positioning in regard to the page layout?
Answer:
The element is positioned according to the normal flow of the document.
The top, right, bottom, left, and z-index properties have no effect. This is the default value.
The behavior of an element with static positioning in regard to the page layout is that it implies that one put the element in its original position in the aspect of document flow.
What does Static positioning implies?Static positioning is known to be the normal way that all element have or gets. It implies that one should "put the element into its original place in the document flow as there is nothing special that one needs to see here."
Hence, the behavior of an element with static positioning is known to be the same and thus If a person do save and refresh, there will be no changes except when there is an updated background color.
Learn more about page layout from
https://brainly.com/question/988590
What is the output of the sum of 1001011 and 100011 displayed in hexadecimal?
Answer:
[tex]1001011_2[/tex] [tex]+[/tex] [tex]100011_2[/tex] [tex]=[/tex] [tex]6E_{hex}[/tex]
Explanation:
Required
[tex]1001011_2 + 100011_2 = []_{16}[/tex]
First, carry out the addition in binary
[tex]1001011_2[/tex] [tex]+[/tex] [tex]100011_2[/tex] [tex]=[/tex] [tex]1101110_2[/tex]
The step is as follows (start adding from right to left):
[tex]1 + 1 = 10[/tex] --- Write 0 carry 1
[tex]1 + 1 + 1(carry) = 11[/tex] ---- Write 1 carry 1
[tex]0 + 0 + 1(carry) = 1[/tex] ---- Write 1
[tex]1 + 0 = 1[/tex] --- Write 1
[tex]0 + 0 = 0[/tex] ---- Write 0
[tex]0 + 0 = 0[/tex] ---- Write 0
[tex]1 + 1 = 10[/tex] --- Write 0 carry 1
No other number to add ; So, write 1 (the last carry)
So, we have:
[tex]1001011_2[/tex] [tex]+[/tex] [tex]100011_2[/tex] [tex]=[/tex] [tex]1101110_2[/tex]
Next, convert [tex]1101110_2[/tex] to base 10 using product rule
[tex]1101110_2 = 1 * 2^6 +1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0[/tex]
[tex]1101110_2 = 64 +32 + 0 + 8 + 4 + 2 + 0[/tex]
[tex]1101110_2 = 110_{10}[/tex]
Lastly, convert [tex]110_{10}[/tex] to hexadecimal using division and remainder rule
[tex]110/16 \to 6\ R\ 14[/tex]
[tex]6/16 \to 0\ R\ 6[/tex]
Write the remainder from bottom to top;
[tex]110_{10} = 6(14)_{hex}[/tex]
In hexadecimal
[tex]14 \to E[/tex]
So, we have:
[tex]110_{10} = 6E_{hex}[/tex]
Hence:
[tex]1001011_2[/tex] [tex]+[/tex] [tex]100011_2[/tex] [tex]=[/tex] [tex]6E_{hex}[/tex]
How can data be calculated?
Answer:
Data can be calculated by solving an equation
Explanation:
Express 42 as a product of its prime factor
Select the three careers in the creative side of digital media.
broadcasting
web designer
animators
filmmaker
project management
Answer:
I would pick A B and D to be my answer
Answer:
web designer, animators, and filmmaker.
The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag