You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically

Answers

Answer 1

Answer:

Task Scheduler

Explanation:

Task Scheduler allows you to automate tasks in Windows 10


Related Questions

who likes video games

Answers

i wish i could play but my strict mom would never let me :’(

Fill _________ skips the Saturday and Sunday dates in a date fill.
A. Weekends
B. Weekdays
C. Skip Weekends
D. Skip Saturday and Sunday

Answers

A. Weekends is the correct answer

Arrange the code so that the numbers are swapped.

Second part

savec

First part

C=D

Third part

D= save

Answers

Answer:

Following are the correct code for swapping:

save=C

C=D

D=save

Explanation:

Please find the attached file of the program with output.

In the above, we let that the three integer variable "save, C, and D" is declared that in which the variable "C and D" holds a value and "save" variable is used to hold "C" variable value.

At this the "C" variable is empty. so, it holds a "D" variable value and when it is empty it holds a save value. At this, we perform the swapping.

in python write a code to find power (2 & -2)

Answers

Explanation:

b) (c) ... Want to see the step-by-step answer ? ... Q: Write a python program with comments

pls help me pass my finals!!​

Answers

Answer:

(a): power(2&-2)

The code is as follows:

power = 2**-2

print(power)

(b): Largest and smallest in a list

The code is as follows:

num = [33,6,11,100,456,109,-4,366]

smallest= min(num)

largest= max(num)

print(smallest)

print(largest)

(c): Loop in Python

(i) Loop are instructions that are repeated until a certain condition is met;

(ii) For loop, in python are used to iterate over a sequence or through a certain range;

The syntax is:

for loop_element in range(iterating_range):

The following is an illustration of for loop that iterates 5 times

for i in range(5):

Explanation:

(a): power(2&-2)

The ** is used to calculate power.

So, 2**-2 represents 2 raise to power -2

power = 2**-2

This prints the calculated power

print(power)

(b): Largest and smallest in a list

This initializes the list

num = [33,6,11,100,456,109,-4,366]

This calculates the smallest using min() function

smallest= min(num)

This calculates the largest using max() function

largest= max(num)

This prints the smallest and the largest

print(smallest)

print(largest)

(c): See answer section

My pc is not reproducing sound

Answers

Answer:

check your settings try to seek your audio settingfix it

RELIGION QUESTION

What is the meaning of prayers of adoration and thanksgiving:

Answers

Answer:

prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration

Explanation:

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard

Answers

maybe a sketchbook:))))

Answer:

Your answer is D Storyboard

Explanation:

Storyboarding is a process where you plan how things will look on your website just as described.

what is the correct way to write h1 tag

Answers

Answer:

[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

What will the computer do in response to a line of code reading # name = input("What is your name?")

Answers

Answer:

it would show What is your name? on the screen and you would be able to input your name

Explanation:

A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices

Answers

Answer:

Private.

Explanation:

The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.

Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.

Thus, a private cloud is a correct answer.

3. The art or technique of decorating wood or leather by burning a design on the surface
with a heated metallic point.
A. Pyrography
C. Wood Turning
B. Gilding
D. Hand Carving
4. Combines several techniques that involve inserting decorative pieces into a base
object to incorporate new designs on the original products.
A. Flocking Technique
C. Inlying
B.
Hand Carving
D. Gilding
5. Lines the interior of drawers and boxes with a soft velvety finish
A. Flocking Technique
C. Inlying
B. Hand Carving
D. Gilding
6. It is used to color wood to give an illusion of texture. This may come in two varieties.
A. Staining
C. Pigment-based
B. Dye-based
D. Inlaying
7. Stain will color small pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
8. Stain will color large pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
9. Decorative technique in which powder is applied on wood or other materials to give a
thin coating of gold from.
A. Inlaying
C. Gilding
B. Staining
D. Wood Carving
10. The simplest way of decorating wood since there are a variety of colors that you can choose from.
One may also add a lacquer finish to make, it shiny and glossy,
A. Flocking Technique
B. Staining
C. Gilding
D. Painting


due tomorrow pls help I'll make brainliest I promise unrelated answer will get reported​

Answers

Answer:

The answer of number three is pyrography.

Jack regularly uses a wireless connection to access various networks as he travels around the world running his fashion line. Jack is able to access these Wi-Fi networks by using what?

Answers

Answer:

A Virtual Private Network, VPN connection

Explanation:

Virtual Private Network, VPN, is connection from a device to the internet which is encrypted and protected whenever such networks is established including on public networks. When a VPN is used third parties will not easily track or eavesdrop on the network or traffic data from the connection

Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?

Answers

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems

2. Cloud9 Analytics - manages the warehouse separately from the solutions

3. CVM Solutions - Enables  users to "clean" supplier information and  to centralize and standardize information

4. Exoprise Systems - It avoid use of complex database and Web servers

5. GageIn - It uses Networking and social tools to connect users and facilitate communications

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

639820- 2852478

425867- 369514​

Answers

Answer:

639,820 - 2,852,478 = -2,212,658

425,867 - 369,514 = 56,353

Have a nice day!

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.

Answers

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she is only running part of the computer program. Which is she using

Answers

Answer:

breakpoints.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Debugging and maintenance.

In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.

Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.

At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.

Answer:

C for Edge

Explanation:

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

Which tab on the Ribbon contains the command to print a publication?

File

Home

Insert

Page Design

Answers

Answer:

File

Explanation:

Click on the File ribbon and find the print option.

Answer:

File is your answer =)

Explanation:

which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive

Answers

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

A microphone is not a storage medium.

drive
eN
n
Complete the following calculations in your workbook.
What mechanical advantage does a hydraulic press have when punching
holes in a metal sheet with a force of 800 N using only 200 N? Provide your
answer as a ratio.
(3)
06 2. A hydraulic press has an input piston radius of 0,5 mm. It is linked to
an output piston that is three times that size. What mechanical advantage
does this press have?
(9)
3. A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N,
what effort is required to lift the weight? Provide your answer in newtons. (4)
4. Your deodorant sprays with a force of 15 N. What mechanical advantage is
achieved if your finger presses the deodorant nozzle with a force of 60 N?
Explain your answer.
(4)
[TOTAL: 20​

Answers

Answer:

uses goodgle

Explanation:

It 25 for 3 and 350n it 21n I hope this is the answer

One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed over many units in the network.

Answers

Answer:

connectionist

Explanation:

One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.

Fruits, stones and other organic pigments are examples of what?
O Natural materials
O Synthetic materials
O Cultural materials
O Modern art supplies

Answers

Natural materials
Hope this helps

which site uses both social bookmarking as well as visual sharing features and is described as a virtual pinboard?

Answers

Answer: Redd-it

Explanation:

The site that make use of both social bookmarking and visual sharing features and is also described as a virtual pinboard is Redd-it.

Reddit refers to a discussion webiste and a web content rating where the members submit their contents like images, links, text posts and videos. These are then either voted up or voted down by the members based on their perception on the post.

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!

Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?

budgeting
scientific analysis
creating presentations
number formatting
computer programming

Answers

Answer:

number formatting,

scientific analysis computer programming

Answer number formatting,

scientific analysis computer programming

Explanation: its right

explain the verbal method of communication​

Answers

Answer:

verbal method of communication means using kaomji, emojis gifs and stickers although you know how to use the keyboard.

Answer:

The Verbal Communication is a type of oral communication wherein the message is transmitted through the spoken words. Explanation: Here the sender gives words to his feelings, thoughts, ideas and opinions and expresses them in the form of speeches, discussions, presentations, and conversations.

Other Questions
Substitute 3x -4 for y in the equation 7x - 5y = 4. Pls help 10 pnt X=63.752 why doesnt tsotsi kill the woman and baby in bluegum tree Multiplying and dividing rational expressions MODELEMaman n'a pas de vitements propres (coun)Elle doit faire la lessive.1. Salim ne trouve pas ses affaires dans sa chambre.2. Papa voit trois poubelles dans la cuisine.3. Ton lit n'est pas fait4. Tes freres disent que la pelouse est trop grande.5. Je choisis une chemise pas repasse.6. Toi et moi, nous voulons manger, mais la vaisselle est dans l'evier.7. To attends tes amis mais il y a du popcorn sur la moguette (caret)& Les plantes de maman ne sont pas belles. As part of the greenhouse effect, Earths surface radiates heat back into the atmosphere and the atmosphere absorbs this heat. Why do areas near the equator generally radiate more energy back into the atmosphere than areas near the poles?Areas near the equator have more clouds in the atmosphere than areas near the poles.Areas near the equator receive more incoming solar energy than areas near the poles.The greenhouse effect only occurs near the equator.The greenhouse effect only occurs near the poles. When closing a direct request, youa. indicate the consequences of a failure to reply.b. mention your own qualifications or status.c. request a specific response and mention the time limits.d. thank the reader in advance for helping you. The area of a circle is increasing at a constant rate of 279 square feet per minute. At the instant when the radius of the circle is 66 feet, what is the rate of change of the radius? Round your answer to three decimal places. Which of the following can result in the formation of acids in the atmosphere? a line passes through the point (-10,9) and has a slope of -1/2 write an equation in slope-intercept form for this line. PLEASE do this fast. I will mark the correct answer brainliest. Also, please only answer with the right answer not stuff unrelated or not answering the question. Please hurry. Thank you so so so much. which phrase best completes the diagram I need help ASAP PLEASEWhat is the sum of the first 47 terms of the sequence?-215,-201,-187,-173,... Situation:Carla is in charge of planning a professional conference. The hotel where the conference willbe held has written her a letter announcing a cost increase, effective immediately, for some oftheir services. The increase will affect the budget for the conference. Carla has written a replyto the hotel manager.American Association of Carpet Weavers2305 Threadbare WayCharlottesville, VA 22902July 26th, 2018Robert Rodriguez, ManagerFour Star HotelDallas, Texas 78208Dear Mr. Rodriguez:I am writing to respond to your letter announcing the price increase for hotelservices. The professional association that I represent is planning a nationalconference at your hotel that we are scheduled four months from now. Howcan we plan a conference of this size if you up and change your prices without What is the value of(5x2)3 + 16y + 4y for x = 2 and y = 3? Help me with this please hey! ill give brainliest please help For most firms, the cost of capital decreases to a low point as the firm ________ debt financing. At some point beyond this optimal level, the cost of capital increases as the amount of debt ________. If your end product is 1.5 moles of KMnO4, how many moles of manganese oxide were used in the reaction? The equation for the production of potassium permanganate is as follows: 2 MnO2 + 4 KOH + O2 2 KMnO4 + 2 KOH + H2 You must show all work Teresa has listened attentively all semester to the various psychological theories presented in her psychology classes. Her views have now come to resemble those of _____, because she believes that mental expectations of reinforcement that affect the performance of what has been learned. Answer for brainlest