Answer:
"Fade In is a Class Act" Macworld says: "Fade In makes it easy to just write...It has all the features you'd find in the more expensive apps, such as Final Draft and Movie Magic Screenwriter, and there's even free and paid iPhone, iPad, and Android apps available
Explanation:
if your computer is gliching what do you do to stop it and some times it turnes off what do you do
Answer:
You can take it to the shop to fix it since it happens often ig
Explanation:
I Hope This Helps bro
You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge
Answer:
The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".
Explanation:
The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.
In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?a. /23b. /24c. /27d. /28
Answer:
The answer is "Option c"
Explanation:
In the given question only option c is correct because "/27" is the IP "255.255.255.224" is the same as "/27" in the terminology in CIDR, in which it uses the compact IP address as well as corresponding prefix expression and it terminology consists of an IP with a slash ('/') or a decimal number. Its count of 1-bit proceeding to the mask traditionally referred to it as the network mask.
Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!
Answer:
Software Program Reinstallation
Use the following steps to reinstall factory installed software programs:
Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.
Figure : Recovery Manager
Recovery Manager main screen
Under I need help immediately, click Software Program Reinstallation.
On the Software Program Reinstallation welcome screen, click Next.
Look in the Factory installed programs list for the software program you want to reinstall.
If your software program is listed, select the title.
If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.
Figure : Select program to reinstall
Software Program Reinstallation window
Click Next.
If you are not prompted to uninstall the program before reinstalling it, continue to the next step.
If you are prompted to uninstall the program before reinstalling it, follow these steps.
Click Start (), and then Control Panel.
Under Programs, Uninstall a program.
The Uninstall or change a program window opens.
Figure : Uninstall or change a program
Uninstall or change a program screen
Select the program you want to remove.
Click Uninstall or Uninstall/Change at the top of the program list.
Read and respond to any messages that appear while the software is being removed from your computer.
Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.
When the reinstallation is complete, select Yes, and then Finish to restart the computer.
Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!
Gently type on the keyboard.
Download software from the Internet without permission.
Turn the power off on the computer before shutting down.
Wash your hands thoroughly before using the computer.
Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.
Gently type on the keyboard.
Download software from the Internet without permission.
Turn the power off on the computer before shutting down.
Wash your hands thoroughly before using the computer.
Set your water bottle on a table that is away from hardware.
Answer
Wash your hands thoroughly before using the computer.
Gently type on the keyboard.
Set your water bottle on a table that is away from hardware.
Explanation:
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as
Answer:
Reconnaissance
Explanation:
You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network
You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network?
(Select two).
a. Use shared secret authentication
b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE
c. Configure devices to run in ad hoc mode
d. Use open authentication with MAC address filtering
e. INSTALL A RADIUS SERVER AND USE 802.1X authentication.
fullform of mips plz
Million instructions per second (MIPS) is an approximate measure of a computer's raw processing power.
Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing
Answer:
Testing
Explanation:
From the question, we understand that Carlos just finished the coding of the app.
In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;
This stage is an integral part of the implementation process and according to the question, the coding has been completed;
The next phase or stage after the implementation phase is testing.
Hence, Carlos is getting ready to test the app.
Answer:
Testing I took the test I definetly testing <3
The attacker sent data that was able to manipulate the return address that is reserved to store expected data
Complete Question:
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?
Answer:
A buffer overflow.
Explanation:
In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).
In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.
For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.
In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.
Does anyone know what happened to Cole Morgen, the actor?
I looked on the internet about him and it turned out that he was 24 years old, but it is the only thing that appears about him.
Answer:
Cole Morgen has been on stage acting in theatre and dance since the age of 4.He has been a part of many local theatre productions. His first professional play was "Dead End" starring Jeremy Sisto and directed by Nicholas Martin at the Ahmanson Theatre followed by and a part in the Arthur Miller's play "All My Sons" directed by Randall Arney at the famous Geffen Playhouse.
Cole was cast in his first feature film as Kevin James's son Eric in the current Adam Sandler film "I Now Pronounce You Chuck and Larry" directed by Dennis Dugan.Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.Besides acting, Cole loves tap dancing and is always looking to improve his skills. He won the national tap competition last summer taking the title of Mr. Junior Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.
What is computer Network?
Answer:
[tex]\boxed{\sf {view \: explanation}}[/tex]
Explanation:
A computer network is a network of computers that can share data among the computers.
Website reputation is an important part of page quality (PQ) rating. Reputation can justify the Highest rating and the Lowest rating.
Answer:
The given statement is false.
Explanation:
A Website reputation seems to be a built-in feature or tool. It retains knowledge about users, through visiting pages. The committed resources for this site depending on either the website as well as the basic details about its design. The reputation including its Website has been used to strengthen the safety of phishing attacks or malicious content.Therefore the solution given above is the right one.
what are the disadvantageous of emails
Answer:
it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.
Need internet connection.without it can't use.
it can be hacked.and also lack the personal touch..
Answer:
they can cause misunderstandings and people read with diffrent
moods
Explanation:
Which statement is true about teams?
Answer:
Which is true of jet streams
A The subtropical jet stream flows to the east while the polar jet stream flows to the west
B The subtropical jet stream lies between the westerlies and polar easterlies
C The polar jet stream is generally stronger than the subtropical jet stream
D The polar jet stream lies between the polar easterlies and trade winds
The subtropical jet stream lies between the westerlies and trade winds.
Jet stream is defined as "a narrow, variable band of very strong, predominantly westerly air currents encircling the globe several miles above the earth." Each hemisphere has 2 or 3 primary jet streams that follow their same basic courses.
Explanation:
A team is a more collaborative and joint organization of individuals that function to perform similar set of tasks. The team all members work in accords with each other and complete the tasks on time.
The team is formed by a like minded people and has all characteristics of cooperation, coordination and friendliness. Thus the option D is correct . A Teams is more productive than with fewer individuals.Learn more about the true about teams.
brainly.com/question/12078417.
Can someone please tell me how I can hack WiFi with a raspberry pi in Kali Linux do I need a wireless adapter for raspberry pi if so please tell me and me ASAP please thanks appreciate it
Well honestly i dont know how to. i personally don't own one but there is YT videos. Go on YT and look up network chuck. hehas what your looking for.
c) Explain GIGO briefly.
Answer:
Is is also a computer science acronym that implies bad input will result in bad output. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.
IT'S FORMULA IS GIGO: GARBAGE IN GARBAGE OUT...
HOPE IT'S HELPFUL FOR U!!
AND PLZ MARK ME AS BRAINLIEST IF U LIKE THIS ANSWER!!!!
15 points please help!!!!
David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive platforms can David use for this presentation?
David can use an interactive or a for his presentation.
Answer:
Powerpoint presentation
Explanation:
Powerpoint presentation is a part of Microsoft office that is established by Microsoft. PowerPoint. It is used to present the company visions, missions, key points in a short and in an attractive way by using the various designs, pictures, audio clips, etc
Here David wants to create an interactive presentation so he should use the powerpoint presentations so that he could present the company visions, objectives, etc
All of the following are challenges presented by changing technology as it relates to the special events field EXCEPT: A. the ability to manage much of the coordination of an event from a smartphone B. the static nature of technology C. the need to continually master new software programs and applications D. the ease of facilitating events provided by technology
Answer:
The answer is "option C".
Explanation:
The change in technology can be characterized as that of an increase in the production feasible thru the innovations, new technologies, and dispersion procedures at a specified amount of production. This technology concerns the Excluding area of special events, even if it needs the new master software and applications continuously, and the wrong choices can be defined as follows:
In choice A, it is a part of event management that's why it is wrong. In choice B it is wrong because it is used in learning. In choice D, it is wrong because it is used to make progress.All of the options given are challenges to technology except D. the ease of facilitating events provided by technology.
It should be noted that changing technology can be challenging. It can bring about the ability to manage much of the coordination of an event from a smartphone.
It also leads to the static nature of technology and the need to continually master new software programs and applications. The ease of facilitating events provided by technology isn't a challenge.
Learn more about technology on:
https://brainly.com/question/8184227
Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions
Answer:
To enable VI editor automatically display lines as numbered, the following steps must be taken:
Step 1: Press the Escape key to exit the insert or append mode.
Step 2. Press the colon key to trigger the cursor. The cursor will appear at the lower-left position of the screen next to a : prompt.
The Next step is to type the following command: set no number hit the enter button to execute the command. This will trigger a column of sequential line numbers will appear at the left side of the display. Each line number references the text located directly to the right of it.
Step 3: To enable this to happen automatically, the appropriate set statement as a line in must be inserted a file in your home directory named .exrc
Cheers!
if you want to refine your google search by date, which option should you use?
Answer:
If you want to refine your Google search results by date, you should use Advanced search.
Explanation:
Answer:
Advanced Search.
Explanation:
Just go down to settings at the bottom of google and choose advanced search and fill in the boxes so your search comes up more specific.
pls help help me is good help me helping is very good
Answer:
-56 negative
Explanation:
Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. She wants to use a stationary print medium that commuters can see from a distance. Which print medium should Felicity choose?
(Correct answer only)
A. magazine
B. newspaper
C. flier
D. billboard
E. brochure
Answer:
D. billboard
Explanation:
Commuters can most likely see billboards from a distance.
The print medium to be chosen by the felicity should be Billboard. Thus, option (D) is correct.
What is billboard?Billboard is a HORDING and huge outdoor advertisement board That can be seen by many people. In order to be seen by the most automobiles and pedestrians, billboards are frequently erected in busy places like highways and urban areas.
Many of the company publish their brands and products on the billboard for spreading brand awareness and spreading the word of their company to as many people can know about the product.
According to the above scenario, Felicity can capture the attention of the regular subway commuters in her area through billboard advertisement. From a distance, commuters can see the advertisement.
Therefore, it can be print medium to be chosen by the felicity should be Billboard. Hence, option (D) is correct.
Learn more about Billboard here:
https://brainly.com/question/8494411
#SPJ2
As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she checked last week. This surprises her, since she didn't make any changes to her TCP/IP configuration. The user has had no problems running her web browser. You immediately know that:
Answer:
D. Her computer is a DHCP client.
Explanation:
Since in the question it is mentioned that IP address is different as compared in the previous week also the user did not make any changes with respect to the TCP/IP configuration and the system is working well
So this situation represents that the user computer is a client of DHCP as it deals with the client-server protocol in which it automatically generates the IP i.e Internet protocol along with the IP address
Hence, the correct option is d.
You administer computers on a Microsoft Windows 2003 TCP/IP network. On the network, you want to use a domain name-to-Internet Protocol (IP) address name resolution system that provides a central database on a server to resolve domain names to IP addresses. Which options should you implement on your network
Answer:
The answer is "Using the Domain Name System(DNS)".
Explanation:
It is the name database whereby web domain names were located or converted into their IP addresses. Its domain name maps its username used by users and finds a site at a user's IP range for the location of a site.
It includes the internet and also has DNS for any time search on the internet if they know this or not. It should recall the IP address of every device to access on the specific web site which you needed, that's why we can say that the DNS is used to implements on the internet.What is the key function of a sales team?
A. to maintain customer-retailer interaction
B. to create appealing advertisements
C. to maintain fan–developer communication
D. to develop customer–fan relationships
Answer:
A. to maintain customer-retailer interaction
Explanation:
A sales team is a subdivision in a company that is dedicated to making sales for the company and they are responsible for meeting the growth goals of that company.
The key function of a sales team is to maintain a healthy customer-retailer relationship or interaction because it is from this good relationship that goods and services are sold.
for what remot control help
Answer:
?
Explanation:
Answer:
to control other things
Explanation:
hope this helps
which of the following is not a selection tool in Adobe photoshop
a) Rectangular marquee tool
b) Single row marquee tool
c) Double row marquee tool
d) Single column marquee tool
The one that is not a selection tool in Adobe Photoshop is the single-row marquee tool. The correct option is b.
What is Adobe Photoshop?When working with pixel-based graphics created for print, the web, and mobile apps, Photoshop is your go-to program. With the help of robust editing tools, you can adjust exposure and color balance, crop and align photographs, change the colors in your shot, erase imperfections from a portrait, and integrate numerous images into a single scene.
Photoshop is still one of the greatest photo editing programs for beginners to learn, despite the fact that you can feel intimidated by it as a novice photographer. Adobe Photoshop is an editing program that works with layers, which can take some getting accustomed to but is worthwhile.
Therefore, the correct option is b) Single row marquee tool.
To learn more about Adobe Photoshop, refer to the link:
https://brainly.com/question/17356292
#SPJ6
can we draw a formula triangle for velocity?
Answer:
Yes we can actually draw a formula triangle for velocity
Explanation:
I can't explain why but if u wanna calculate the velocity of something using a diagram then you will draw a trapezium and in that trapezium there are two triangles and a rectangle so you will split it into two triangles and trapezium so I think we can actually draw a formula triangle for velocity
What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders
What are responsibilities of employees? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders.
Answer:
The correct options are;
1) To own businesses
To be responsible to employees
2) To work for companies
To be responsible to stakeholders
Explanation:
The entrepreneur is responsible for setting up and managing the establishment as well as provision of motivation for the employees. The entrepreneur gives direction and vision to the business which the employees follow, and as such the entrepreneur is responsible for being laudable and dependable and consistent
The employees are responsible for the work they do for the companies is done in a safety and healthful to them
The employees are responsible for the health and safety of other stakeholders for their actions and in-actions and to cooperate with the safety efforts of the employer
Answer:
to own business, to be responsible for employees, to work for companies.
Explanation: