Which software programs should students avoid using to create and submit course work? (Choose all that apply.

Answers

Answer 1

Answer:

The answer to this question is given below in the explanation section.

Explanation:

You can submit your course work most often in a Word document. Because in the word document, you can insert text, numbers, images, charts, shapes whatever you want such as required for writing a course assignment or course work- easily.  Because your final work should be in a complete document.

The correct options to this question, that you should need to avoid using to create and submit course work are pages, numbers, and keynote.

Because while submitting the course work, you need to submit a complete word document, it is not required to you that you have to submit numbers, pages, or keynotes along with the course assignment. You can create a course assignment or project document in word and submit to your respective teacher. However, you can not create your course work using keynotes or pages, etc as given in the question.

Answer 2

The software programs that students should avoid using to create and submit coursework include pages, numbers, and keynotes.

It should be noted that it's vital that while submitting a course work, one needs to submit a complete word document.

It is not required that the person submits pages, numbers, and keynotes. The most important thing is the word document that'll be submitted. Therefore, the software programs that students should avoid using to create and submit course work include pages, numbers, and keynotes.

Read related link on:

https://brainly.com/question/19788811


Related Questions

describe PROM, EPROM and EEPROM memories​

Answers

Answer:

Explanation:

PROM is a Read Only Memory (ROM) that can be modified only once by a user while EPROM is a programmable ROM that can be erased and reused. EEPROM, on the other hand, is a user-modifiable ROM that can be erased and reprogrammed repeatedly through a normal electrical voltage.

need help asap
Which statement is true of emerging technologies?

Advancements in communication technologies played a minor part in the rise of globalization.
Developments in communication helped remote locations connect with the world.
Malicious entities can misuse emerging technologies.
There are few disadvantages to the widespread growth of the internet.
The complexity of wireless communication prohibits it from being provided in remote locations

Answers

Answer:

Advancements on communication technologies played a minor part in the rise of globalization.

Explanation:

Answer:

Developments in communication helped remote locations connect with the world.

Explanation:

I took the test, plato/edemetuimedemetuim

What is an example of an absolute cell reference? 52% D2 $B$5 !90!

Answers

Answer:

$B$5 is an example of absolute cell reference

Explanation:

There are two types of referencing in MS Excel.

1. Relative

2. Absolute

Relative cell referencing changes according to the corresponding new cells when it is copied in other cells. MS Excel uses relative cell referencing by default.

Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.

From the given choices in question,

$B$5 is an example of absolute cell reference

An example of an absolute cell reference is "$B$5".

Thus, option (C) is correct.

Cell references can be either relative or absolute.

A relative cell reference changes when it is copied to another cell.

For example, if you have a formula in cell C2 that references cell A2 as "=A2+1", and you copy this formula to cell C3, it will automatically adjust to "=A3+1".

An absolute cell reference remains constant, regardless of where it is copied. When a cell reference is made absolute, the dollar sign ($) is used to indicate this.

For example, if you have a formula in cell C2 that references cell B5 as "=B$5+1", and you copy this formula to cell D3, it will still refer to cell B5 as "=B$5+1". The row and column references remain fixed.

Therefore, "$B$5" is an absolute cell reference.

Thus, option (C) is correct.

Learn more about Cell Reference here:

https://brainly.com/question/30714866

#SPJ6

so i am on a Chromebook with headphones , and I am wondering if you can make it that a tab only play sound on one side of the headphones and other tabs to the other side of the headphones

Answers

No you cannot do that with a single pair of headphones. If you had an dual aux split... you could plug in two pairs of headphones... even if you had two bluetooth pairs I don't think it'd be possible... What do you need to do that for? Maybe I can help find an alternative solution

What is the benefit of encapsulation?

A. To rename variables
B. To reuse code
C. To make all members public
D. To make all members protected

Answers

Answer:

B. To reuse code

A network the size of the Internet requires DNS services in order to function. Discuss the advantages and disadvantages of implementing DNS relative to the size of the network.

Answers

Answer:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

Explanation:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

Compute the weakest precondition for each of the following assignment statements and postconditions:

a = 2 * (b - 1) - 1 {a > 0}
b = (c + 10) / 3 {b > 6}
a = a + 2 * b - 1 {a > 1}
x = 2 * y + x - 1 {x > 11}

Answers

Answer:

a) b > 3/2

b) c > 8

c) b > 1 - a/2

d) y > 6 - x/2

Explanation:

a)

a = 2 × (b - 1) - 1   {a > 0}

2 × (b - 1) - 1 > 0

2b - 2 - 1 > 0

2b - 3 > 0

2b > 3

b > 3/2

b)

b = (c + 10) / 3 {b > 6}

(c + 10) / 3 > 6

multiply both side by 3

((c + 10) / 3) × 3 > 6 × 3

c + 10 > 18

c > 18 - 10

c > 8

c)

a = a + 2 × b - 1 {a > 1}

a + 2 × b - 1 > 1

a + 2b - 1 > 1

a + 2b > 1 + 1

2b > 2 - a

divide both sides by 2

2b/2 > 2/2 - a/2

b > 1 - a/2

d)

x = 2 × y + x - 1 {x > 11}

2 × y + x - 1 > 11

2y + x - 1 > 11

2y + x > 11 + 1

2y + x > 12

2y > 12 - x

divide both sides by 2

2y/2 > 12/2 - x/2

y > 6 - x/2

What causes them to catch your attention in advertisements?

Answers

Answer:

advertisement should be nice and attractive to get attention of people

The Mac’s GUI set it apart from earlier operating systems.
True or False

Answers

Answer:

Its true

Explanation:

Just took the test.

Which of the following server types is in the form of a single circuit board?
a. blade
b. tower
O c. rack
O d. dedicated
o

Answers

Answer:

A. Blade

Explanation:

Server Blade means a complete computer system on a single board which includes one or more CPUs, memory, operating system, network connections, and typically includes access to hard drives or other mass storage devices. A Server Blade is designed to be inserted into a space-saving rack, and each rack may contain a number of Server Blades served by one or more power supplies.

If this is multiple choice, a dedicated server can be too.

Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs will be most helpful?

A. counter module

B. while loop

C. for loop

D. mean module

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is A: counter module.

Counter module in python or Python counter is a container that holds the count of each of the elements present in the container. It is a sub-class available in the dictionary class. Jamal can use this module in Python to write a program that will find the 10 most common words in Romeo and Juliet.

Other options are not correct because:

While loop: while loop only iterates its body until a specific condition is met. For loop is used to iterate to a pre-specified condition and iterate until the condition is reached. While the mean module of Python is used to calculate mean and average.

The coding system that has just two characters is called:

a
binary
b
dual.
c
basic.
d
double.

Answers

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

Answer:

a binary

Explanation:

ascii. an agreed method for paring the alpanumeric characther set with binary repersenations used in computers. binary. Pertaining to a number system that has just two unique digits 0 and 1. binary code.

What game is this? helpppppp

Answers

Answer:

the sims lol

Explanation:

Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).

Answers

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

Discuss the advantages and disadvantages of artificial intelligence ?
50word

Answers

Answer:

it'll be in points okay.

Explanation:

1. It's a blessing as well as a curse.

2. It changed lives.

3. Helped understand things better.

4. Development.

5. Free knowledge e.g. Brainly

;)

Explanation:

Kxkxkdkeeksldowowowkscoviforkeooododosowkwmdndmdmrnrnrmrmfododoo ododosososxkxkdldldldllwlwwlel ododoeldl ldldldlxl odododo oodoxxoo

A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?

Answers

Answer:

3 Volts.

Explanation:

Answer:

3 Volts

Explanation:

Because Power = Voltage x Current, so if you substitute the values into the equation, it would be :

2.4 W = Voltage x 0.8 A

Then if you rearrange the equation, it would be :

2.4 W / 0.8 A = Voltage

Which is :

3 V = Voltage

Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75). You should use input to read a string and float() to convert the string to a number. Do not worry about error checking the user input - assume the user types numbers properly.​

Answers

I've included my code in the picture below. Best of luck.

Let f(w) = 2w^3 - 5. Let z = 2. What is f(z)?​

Answers

Answer:

Hence f(z)=11

*This is what i think*

how do you keep word from trying to capitalize every isolated letter "i"

Answers

Write "i" the write random words then delete it and add the lowercase i
Answer: It’s best to write the letter “i” then on the word suggestions, click “i” and repeat it a few times to let the phone register that you only want your individual “i” to be lowercase.

Select the items that can be measured.
capacity
smoothness
nationality
thickness
distance
scent
income

Answers

Answer:

distance

capacity

smoothness

thickness

capacity, smoothness, thickness, distance, income

Write a program with 2 separate functions which compute the GCD (Greatest Common Denominator) and the LCM (Lowest Common Multiple) of two input integers.

Answers

Answer:

The program written in Python is as follows

def GCD(num1, num2):

    small = num1

    if num1 > num2:

         small = num2

    for i in range(1, small+1):

         if((num1 % i == 0) and (num2 % i == 0)):

              gcd = i

    print("The GCD is "+ str(gcd))

def LCM(num1,num2):

    big = num2  

    if num1 > num2:

         big = num1

    while(True):

         if((big % num1 == 0) and (big % num2 == 0)):

              lcm = big

              break

         big = big+1

     print("The LCM is "+ str(lcm))

 print("Enter two numbers: ")

num1 = int(input(": "))

num2 = int(input(": "))

GCD(num1, num2)

LCM(num1, num2)

Explanation:

This line defines the GCD function

def GCD(num1, num2):

This line initializes variable small to num1

    small = num1

This line checks if num2 is less than num1, if yes: num2 is assigned to variable small

    if num1 > num2:

         small = num2

The following iteration determines the GCD of num1 and num2

    for i in range(1, small+1):

         if((num1 % i == 0) and (num2 % i == 0)):

              gcd = i

This line prints the GCD

    print("The GCD is "+ str(gcd))

   

This line defines the LCM function

def LCM(num1,num2):

This line initializes variable big to num2

    big = num2  

This line checks if num1 is greater than num2, if yes: num1 is assigned to variable big

    if num1 > num2:

         big = num1

The following iteration continues while the LCM has not been gotten.

    while(True):

This if statement determines the LCM using modulo operator

         if((big % num1 == 0) and (big % num2 == 0)):

              lcm = big

              break

         big = big+1

This line prints the LCM of the two numbers

     print("The LCM is "+ str(lcm))

The main starts here

This line prompts user for two numbers

print("Enter two numbers: ")

The next two lines get user inputs

num1 = int(input(": "))

num2 = int(input(": "))

This calls the GCD function

GCD(num1, num2)

This calls the LCM function

LCM(num1, num2)

See attachment for more structured program

Consider an instruction within a certain instruction-set architecture (ISA): ADD R1, R2, R3. This instruction adds the value in Register R1 with the value in Register R2, and stores the result in Register R3. What is the maximum number of physical memory accesses that may be caused by this single instruction?
a) 1
b) 2
c) 3
d) 4

Answers

Answer:

C = 3

Explanation:

The maximum number of physical memory accesses that may be caused by this single instruction is ; 3

This is because In the case of loading two values into R2 and R3 there is need for their memories to be accessed and after execution R1 value there will be a write back into memory hence another memory is also accessed and that makes the number of Physical memories accessed to be three(3) in Total

Write a command that will list the names of all link files in the working directory, sorted by inode number.

Answers

Answer:

The answer is "Is command".

Explanation:

This command can be used to display the directory lists via input data throughout the command-line tool. It is a standard result of this report are described, that would be redirected to the command to display the directory information in alphabetical order. This command is part of its GNU core tool package, which is required on all Linux distributions.

We can create tables in MS. Word from *
2 points
Insert Tab
Home Tab
Mailings Tab

Answers

Answer:

insert tab

Explanation:

hope it helps

Answer:

we can create tables in ms word from Insert table

Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.

What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?

Answers

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

explain mechanical computer ,electromechanical and electronic computer with example

Answers

Answer:

A mechanical computer uses moving parts to do it’s calculations. Think old style adding machines.Electronic computers use electronic oscillators to generate a clock. The oscillator might include a mechanical element such as a crystal, but the majority of the clock signal is processed in the electrical domain.

Explanation:

An example of a mechanical computer clock is a Swiss watch movement, which needs no electronics. Movement is based upon springs coupled to other mechanical pieces. Swiss watches are high precision mechanical computers that do counting. There are other types of more sophisticated mechanical computers. Research the works of Konrad Zuse and his Z1 mechanical computer.

How can we use variables to store information in our programs?

Answers

Computer programs use variables to store information.
...
To make a simple program that displays your name, you could program the computer to:
Ask for your name.
Store that answer as a variable called 'YourName'.
Display “Hello” and the string stored in the variable called 'YourName'

Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote

Answers

Answer:

tyafana

Explan

ation:n umbers

Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B

Answers

Answer:

The answer is D. A and B

Explanation:

I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.

Answer: The answer is D. A and B

Explanation: I took this test 5 mins ago and it was right.

Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores

Answers

Answer:

Explanation:

The following is written in Java. It is a method/function that takes the oldScore as an int input. It turns it into a String, separates all the digits, puts them into an array. Then adds the first digit to the end and removes it from the beginning, thus shifting the entire score one to the left. Then it turns the String variable back into an Integer called finalScore and prints it out.

public static void newScore(int oldScore) {

       ArrayList<Integer> newScore = new ArrayList<>();

       String stringOldScore = String.valueOf(oldScore);

       for (int x = 0; x < stringOldScore.length(); x++) {

           newScore.add(Integer.parseInt(String.valueOf(stringOldScore.charAt(x))));

       }

       newScore.add(newScore.get(0));

       newScore.remove(0);

       String newScoreString = "";

       for (int x:newScore) {

           newScoreString += String.valueOf(x);

       }

       int finalScore = Integer.parseInt(newScoreString);

       System.out.println(finalScore);

   }

Other Questions
Determine if the following argument always applies, sometimes applies, or never applies. Provide at least 2 examples in your explanation."The sum of a number and its opposite is always 1." Glenrosa Company bought inventory from Monterosa Company, FOB destination. On December 31, the last day of the accounting year, the goods were on a truck owned by Common Carrier, Inc., and not expected to arrive until January 2. Which company should include these goods in its December 31 inventory? A. Common Carrier B. Monterosa C. Glenrosa D. None of them should include these goods in inventory. Which of these is not a reason graphic organizers are helpful when learningnew words?A. They help you look at the definition and a picture of the meaning.B. They help you look at the word in many different ways.C. They help you look at examples of the new word.D. They give you summaries of the text you found the new word in. Because prices serve as signals, increases indicate that producers should do which of the following:A) Lay off workersB) Produce less of a particular itemC) Produce more of a particular itemD) Redirect resources to produce a different item The mean temperature for the first 4 days in January was -3C. The mean temperature for the first 5 days in January was -2C. What was the temperature on the 5th day? How many moles of H are present in 3 moles of carbon trihydride? please help! ASAP!! ILL GIVE BRAINIEST What type of anaerobic respiration do humans go through? The consumer price index was 200 in 2008 and 190 in 2009. The nominal interest rate during this period was 4.5 percent. What was the real interest rate during this period Explain Section 21. Patentable Inventions which statement is true of the particles that make up a substance? a. particles in a liquid have more energy than particles in a gas. b. particles in a liquid and particles in a solid have the same amount of energy. c. particles in a gas have more energy than particles in liquid. d. particles in a solid have moe energy than particles in a gas. where did meditation originate Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network? Which the best description of the Georgia Department of Education? It is headed by a superintendent who is appointed by the governor. It allows the attorney general to enforce education laws.It allows the department of revenue to allocate education funds.It manages all public schools in Georgia, including colleges.please answer right and quick ill give you brainlist if you do no cap who discover car first time Can someone help plzzzzzzz I need it ASAP thank you A student measures the length of two pieces of paper as 8.21 inand 8.0 in. What is the total length? Be sure to use sig. figs. inyour answer. Do not include the unit. What happens if you overmix muffins? What would an equation be for a line with a slope of 3 and a y-intercept of 7? 1. On a given day, Tyler runs twice as fast as his brother Ian on the local track. In one race, Ian gets a 330 meter head start, and they start running at the same time. After 21 seconds, Tyler catches up to Ian. Let x represent Ians rate (in meters/second). Write and solve an equation to find the rate that Ian runs. (Remember that distance = rate x time.) If you get a decimal answer, round to the nearest tenth.Write the equation (2pts):Solve the equation to find Ians rate (x) (2 pts):