Answer:
Table Analyzer Wizard
Explanation:
snoopdog is 420 in dog years
lol are yhu good????
Answer:
really wow that’s cool
youre content and design should be influenced by the _______ of your users
a. age
b. goals
c. mood
d. attitude
i already know the answer 90%
im just making sure
An electrician uses a device called a volt meter. The volt meter is an example of
O hardware
software
Answer:
hardware
Explanation:
A voltmeter can be defined as an electrical device used for measure voltage level or the amount of voltage present in a circuit.
In this scenario, an electrician uses a device called a volt meter. The volt meter is an example of hardware.
A hardware refers to any device, machine or equipment that can be handled physically (touched) and seen with the naked eyes. Other hardware components of a computer includes monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
On the other hand, software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.
HOW DO YOU RUN YOUR SCRATCH PROGRAM?
Answer:
By clicking on the green flag, it starts up the program and if you want to stop it use the stop sign.
To run your scratch program you have to click the green flag, and it will run your program.
Hope that helps.
Use the drop-down menus to complete the steps for filtering records in a form.
1. Open the (1) tab.
3. In the Sort & Filter group, click (2), and click Filter by Form.
4. Enter or select a value to set the filter.
5. On the Home tab, in the Sort & Filter group, click the (3) button to toggle the filter.
1= create, database tools, file, home
2= advanced, filtering, find, new
3= ascending, descending, apply filter, toggle filter
Answer:
Home, advanced, apply filter
Explanation:
edge 2021
In the completion of the steps for filtering records, one can:
Open the Home tab.click (advanced), and click Filter by Form.click the (apply filter ) button to toggle the filter. What is filtering of records?Filtering is know to be a very vital methods that is used to see only the data that a person want to be shown in Access databases.
Conclusively, By following the steps above, one can achieving the filtering of the records that they desires.
Learn more about filtering records from
https://brainly.com/question/22238933
#SPJ1
What classes should I take in high-school for majoring in computer science?
Answer:
Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.
Explanation:
HELP mE PLZ
Gabby needs to perform regular computer maintenance. What should she do? Check all that apply.
Remove unwanted files.
Reboot the computer.
Back up her data.
Scan for viruses.
Delete the browsing history.
Answer:
scan for viruses
remove unwanted files
back up her data
Create a function called biggestNum that returns the largest number in an array of integers. The function is passed only one parameter, an array. In main, ask the user the input eight integers. Each integer should be added to an array called nums. Then, call the function and output the largest number in the array.
This is for Python
def biggestNum():
array = []
for i in range(8):
number = int(input('Enter number: '))
array.append(number)
return max(array)
print(biggestNum())
A person who is good with numbers and problem solving has which type of learning preference?
a) hands-on
b) verbal
c) logical
d) visual
Answer:
I believe it is logical.
Answer: c) logical
Explanation:
:)
How does HTTP rely on other layers of the internet?
DNS -
TCP-
IP-
Physical Internet -
Please help !!!
Answer:
All of your communications are being sent over the Internet so these requests are being sent inside TCP/IP packets and over the physical wires of the Internet. ... It uniquely identifies the location of each computer or device connected to the Internet.
In a single paragraph, write about the connections between web servers and web pages. Select and differentiate between their various characteristics and how they work together.
Edge please don't copy paste, 20 points
Answer:
web servers hold all the info that the website has on it, most servers hold multiple websites
Explanation:
Answer:
web servers hold all the info that the website has on it, most servers hold multiple websites
Explanation:
Which of the following is a distraction that you find when photographing animals at the zoo?
Fences
Enclosure glass
Other people
All of the above
Answer:
D all of the above
Explanation:
because fences, enclosure glass, and other people are all distracting from the real focus which is the animal.
Please Mark brainliest and give 5 star.
Answer:
All of the above (I did the test and got it right)
Explanation:
Using the information below, answer the question to the right. Which function should you use to extract shipping values from the Lookup Table?
Answer: HLookup
Explanation:
HLookup is a function in Microsoft Excel that is part of the Lookup functions, that is, it is used to lookup a value from another table or cell so that it reflects in the desired table.
The “H” in the HLookup stands for Horizontal, that is Horizontal Lookup.
The HLookup function works by looking for a value in the top row of a table or array of values and returning the value in the same column from a row that is specified.
The function is;
=HLOOKUP(lookup_value, table_array, row_index_num, [range_lookup])
So, to extract our shipping value from the lookup table, we use the formula;
=HLOOKUP(C2,$B$11:$E$12,2)
is this right or not???????????
Answer:
yes you are correct
Explanation:
Pie charts are best used for
Answer:B
Explanation:Showing parts of a whole.
What is a method that deletes an item from a list using the item’s value?
Remove
Delete
Erase
PopWhat is a method that deletes an item from a list using the item’s value?
Remove
Delete
Erase
Pop
Answer:
Remove
Explanation:
A method that deletes an item from a list using the item’s value is "Remove"
The "remove () function in python language indicates the specific element or character to be that needs to be removed.
For example
myList = ["Jane",16,34,52,"Lamar",13,27,20]
myList.remove(34)
myList
OUTPUT : ["Jane",16,52,"Lamar", 13,27,20]
Therefore, by printing the list using the print(), we can observe that the element 34 has been removed from myList.
Hence, the correct answer, in this case, is " Remove."
It is used between two or more computers. One computer sends data to or receives data from another computer directly.
Answer:
File transfer protocol (FTP)
Explanation:
An information can be defined as an organized data which typically sent from a sender to a receiver. When a data is decoded or processed by its recipient it is known as information.
Generally, there are several channels or medium through which an information can be transmitted from the sender to a receiver and vice-versa. One of the widely used media is the internet, a global system of interconnected computer networks.
There's a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport later, into small chunks called packets rather than as a whole.
The three (3) main types of TCP/IP protocol are;
I. HTTP.
II. HTTPS.
III. FTP.
File transfer protocol (FTP) is used between two or more computers. One computer sends data to or receives data from another computer directly through the use of network port 20 and 21.
Which of the following is the ONE most important thing to be done before working on any electrical device? a Remove each source of electricity b Ground yourself c Shut Down d Turn it off
Answer:
b
Explanation:
because evven tho it can turn of doesnt mean the eletricity will stop
Hello anyone to speak?
Answer:
hey hope you have a good day or night :)
What is the use of Ellipse Tool in photoshop
What type of hacker would a company hire to check for vulnerabilities in their web page?
Answer:
a hacker who can infiltrate a highly protected file but cant protect themselves against anime web site ads cant tell if this was a real question if so sorry
Explanation:
Which import option is not supported in Access 2016?
from Access
from Excel
from PDF
from Text file
Answer: from PDF(C)
Explanation:
Took it on edg
Answer:
C
Explanation:
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options.
people make unintentional mistakes
people do not know about cybersecurity protocols
workplaces tend to have too strict cybersecurity protocols
cybersecurity specialists do not really help
people deliberately try to hack into the network
Answer:
people make unintentional mistakes
people do not know about cybersecurity protocols
people deliberately try to hack into the network
Explanation:
Cyber security breaches are the compromise to the data integrity of a computer system or network. There are several reasons why this can happen in the network f an organization. Some of them include;
1. People make unintentional mistakes: Human error has been attributed to be the leading cause of cybersecurity breaches. When people unknowingly expose passwords and sensitive data to those who should not have access to them, they commit a breach of security.
2. People do not know about cybersecurity protocols: When people are not educated on the right security measures to adhere to, they are prone to unknowingly engage in acts that will lead to a security breach.
3. People deliberately try to hack into the network: People within and outside the organization can decide to compromise the network especially if they believe that they will have some financial benefits.
Use the drop-down tool to select the correct answer.
Government agencies work to catch people who engage in software piracy, and can also help to stop them by filing lawsuits.
Answer:
Software producers
Explanation:
Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.
Generally, patents are used on innovation for products that are manufactured through the application of various technologies.
Basically, the three (3) main ways to protect an intellectual property is to employ the use of
I. Trademarks.
II. Patents.
III. Copyright.
Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.
Hence, government agencies work to catch people who engage in software piracy, and software producers can also help to stop them by filing lawsuits. Software producers or developers are saddled with the responsibility of filing lawsuits against pirates or intellectual property theft who engages in the illegal use of patents or licensed software applications.
What is Qbasic programming language?
Answer:
QBASIC is a high level programming language that allows us to write programs. BASIC uses English like words and mathematical symbols to write programs. The programs written in QBASIC need to be converted into machine codes. QBASIC provides working area to write programs and QBASIC has its own Interpreter
Explanation:
What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digital cameras C. A game like Marco Polo on the Internet D. A way of tracking criminals using GPS
Answer:
C. A game like Marco Polo on the Internet
Explanation:
A digital scavenger hunt is a name for a scavenger hunt game originally made for mobile phones and works on any operating system or mobile platforms such as Android or iOS.
The game comprises of different missions in which players are expected to complete one after the other.
Hence, in this case, the correct answer is "A game like Marco Polo on the Internet."
How would I tell Tracy to move forward 100 pixels?
Answer:
Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.
Explanation:
Answer:Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.
Explanation:
Write IF() function for student 3, If total mark is greater than 10 then print
the text “you have scored good" else print“ you need to improve" *
Answer:
Explanation:
The following code is written in Java. The if() function is actually called an if statement. The following code can be copied and pasted where you need as long as it is within the scope of the mark variable in order to call it and compare it to 10
if (mark > 10){
System.out.println("you have scored good");
} else {
System.out.println("you need to improve ");
}
Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA came to her work and inspected the issue, then gave her employer a citation. The day after Tina's employer received the citation, Tina was given new jobs which were menial and difficult. Which of Tina's rights under OSHA was violated in this situation?
A) Freedom from retaliation for exercising safety and health rights
B) Knowledge of hazardous workplace conditions
C) Obtaining training as provided in the OSHA standards
D) Access to hazard exposure and medical records
Answer:A freedom from retaliation for exercising safety and health rights
Explanation:
I made a fish emoji what do you think >{'_'}< should I change anything
Answer: It is beautiful
Explanation:
☁️ Answer ☁️
666/69 I like it. : )