Answer:
File
Explanation:
Click on the File ribbon and find the print option.
Answer:
File is your answer =)
Explanation:
When using the “rule of thirds,” where should focal points be placed?
Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.
Have a nice day!
[Plato] In A Soccer Game, You Want To Finish The First Half In Five Minutes. So, You Set The Match Duration To Ten Minutes. This Is An Example Of What Kind
Of Time Element?
A)Altered
B)Variable
C)Authentic
D)Player Adjusted
Answer: D. Player Adjusted
Explanation: The reason why the answer is player adjusted is because a player in the game is changing the time to 10 minutes.
Have a nice day!
Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and book loans. The relations are: • BOOK (BookID, Title, PublisherName) • BOOK_AUTHORS (BookID, AuthorName) • PUBLISHER (Name, Address, Phone) • BOOK_COPIES (BookID, BranchID, NumberOfCopies) • BOOK_LOANS (BookID, BranchID, CardNumber, DateOut, DueDate) • LIBRARY_BRANCH (BranchID, BranchName, Address) • BORROWER (CardNumber, Name, Address, Phone) 1. Consider the schema given above: (a) (5 points) Give a primary key for each relation. Are there any relations for which there is an alternate candidate key that you have not chosen as the primary key? If yes, mention the relations, candidate keys and the reason (if any) for your choice of the primary key. (b) (10 points) State all referential integrity constraints that should hold on these relations.
Answer:
1) Yes, Publisher relation should have a publisherID primary key.
2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.
Explanation:
The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.
Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression
feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends
drive
eN
n
Complete the following calculations in your workbook.
What mechanical advantage does a hydraulic press have when punching
holes in a metal sheet with a force of 800 N using only 200 N? Provide your
answer as a ratio.
(3)
06 2. A hydraulic press has an input piston radius of 0,5 mm. It is linked to
an output piston that is three times that size. What mechanical advantage
does this press have?
(9)
3. A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N,
what effort is required to lift the weight? Provide your answer in newtons. (4)
4. Your deodorant sprays with a force of 15 N. What mechanical advantage is
achieved if your finger presses the deodorant nozzle with a force of 60 N?
Explain your answer.
(4)
[TOTAL: 20
Answer:
uses goodgle
Explanation:
What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit
Answer:
it's D
Explanation: i had this question before and i got it right :)
Answer:
D. An initial deposit
Explanation: Hope this helps :)
A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?
Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”
How will future space flights be different for NASA?
Answer:
Explanation:
NASA's future will continue to be a story of human exploration, technology, and science. NASA will continue to be a global leader in scientific discovery, fostering opportunities to turn new knowledge into things that improve life here on Earth. ... Artist's concept, NASA's gateway in lunar orbit.
Answer:
NASA's future will continue to be a story of human exploration, technology, and ... changes on the global land surface at a scale where we can separate human ... Exploring deep space and three-year missions to Mars pose new challenges: ...
Explanation:
NASA's Artemis program aims to land another man and the first woman on the moon by 2024 and eventually establish sustainable space travel by 2028. The Artemis program is NASA's stepping stone to their ultimate goal of landing on Mars.
Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
a) Realiza un esquema en planta del mecanismo.
b) Calcula n2 n3, n4. y la relación de transmisión.
c) Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
Answer:
a. engranaje 1 → engranaje 2 → engranaje 3 → engranaje 4
z1 = 10 z2 = 20 z3 =10 z4 = 20
b. n2 = 600 rpm, n3 = 1200 rpm, n4 = 600 rpm
la relacion de transmision = 2
Explanation:
where z1 = 10, z2 = 20, z3 = 10, z4 = 20
and n1 = 1200 rpm
n2 = n1 * z1/z2 = (1200 * 10)/ 20 = 600 rpm
n3 = n2 * z2/z3 = (600 * 20)/ 10 = 1200 rpm
n4 = n3 * z3/z4 = (1200 * 10)/ 20 = 600 rpm
la relacion de transmision = z2/z1 * z3/z2 * z4/z3
= 20/10 * 10/20 * 20/10 = 2 * 0.5 * 2 = 2
write a program to calculate the area of rectangle
Answer:
program by LET statement
Explanation:
CLS
REM to find the area of rectangle
LET L=40
LET B=20
LET AOR=L*B
PRINT "AOR=";AOR
END
Press F5
output
AOR=800
What is the error in the following line: (1)
age=int(input("Enter your age:")
Answer:
14
Explanation:
When attaching a file or files in outlook 365 you select the attach command and then select the files location
Answer:
When you click the attachment button a window pops up allowing you to select the file/s you want to upload
You can also drag and drop file/s this is an alternative method
Explanation:
Microsoft Outlook is a personal information manager software system from Microsoft.
Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:
Answer:
Software piracy.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, softwares are categorized into two (2) main categories and these are;
I. Open-source software.
II. Proprietary software.
A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.
Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.
Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).
Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.
What is one similarity between compiled and interpreted programming languages? (5 points)
Both compiled and interpreted languages are translated one line of code at a time before moving to the next line.
Both compiled and interpreted languages can be shared with others while keeping the source code private.
Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.
There are no similarities between compiled and interpreted programming languages.
Answer:
Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.
Explanation:
The one similarity between compiled and interpreted languages is that they are both high-level languages.
A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.
A high-level language can either be interpreted or compiled.
An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.
So, the similarity between both languages is that they are high level languages and translate code for a computer to understand.
Match the elements used in web searches to their functions.
1. row
2. column
3. cell
4. worksheet
where data and formulas can be entered
a grid of rows and columns
a horizontal set of cells
a vertical set of cells
Answer:
where data and formulas can be entered - Cells
A grid of rows and columns - Worksheet
A horizontal set of cells - Row
A vertical set of cells - Column
Explanation:
I got it right on the Edmentum test.
When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices
Answer: implicit
Explanation:
When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.
Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.
A swimmer covers 180m in 20 seconds. How many metres does she swim in one second?
Answer:
9 meters per second
Explanation:
180/20= 9
Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to
Answer:
She is referring to composite primary key
Explanation:
Composite primary key comprises of several columns with each having column having its own individual uniqueness.
In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.
A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files
Answer:
A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files? The user's device is rooted or jailbroken.
Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.
Answer:
Parent
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.
In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).
The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register
Answer:
b. Memory-Management Unit
Explanation:
The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.
____ feet is used when the width of the material is not a factor. (6 letters)
Answer:
footin dhhdhdn bsbsbdb
What is the definition of WLAN
Explanation:
A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.
WLAN stands for wireless local area network. It is a wireless connection that connects two or more devices in LAN. WLAN uses access points and routers to make a connection between devices. Wi-Fi is an example of WLAN where devices are connected wirelessly within a limited range.
stay safe healthy and happy.Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest
Answer:
Motion sensor.
Explanation:
I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor
pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE
Answer:
?
Explanation:
________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.
Answer:
Premises
On-premise security refers to the hardware and software solutions that protect businesses data from outside and inside threats.
(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.
Answer:
a) SELECT No_of_copies
FROM ((book JOIN book_copies) JOIN library_branch)
WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';
b) SELECT branchname, No_of_copies
FROM ((book JOIN book_copies) JOIN library_branch)
WHERE title = 'The Lost Tribe'
GROUP BY branchname;
c) SELECT Name
FROM borrowers B
WHERE cardno NOT IN ( SELECT cardno FROM book_loan)
d) SELECT title, name, B.address
FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)
WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';
e) SELECT title, No_of_copies
FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)
WHERE authorname = 'Stephen King' AND branchname = 'Central';
g) SELECT DISTINCT title
FROM ((book JOIN book_copies) JOIN library_branch)
Explanation:
The SQL statements query's a book store database of seven relations using joins and subqueries to return results.
One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed over many units in the network.
Answer:
connectionist
Explanation:
One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.
What is a named bit of programming instructions?
Answer:
Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
What do you use the Pygame library for?
Answer:
Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.