Emma opened a new document on Microsoft Word and typed her assignment. She is now planning to save the document for the first time. Which function key can she use to save the document

Answers

Answer 1

Answer:

ctrl+s

Explanation:

By hitting the ctrl key at the same time as the s key on the keyboard she can save the document


Related Questions

What is one advantage of storing numeric data in variables?

Answers

Answer:

B. The programmer can go back and make changes to the data later

Explanation:

What are the types of data that are on headers and footers?

Answers

Answer:

Explanation: Headers and footers generally contain document information, such as the file name, author, date created, page numbering and the like. This information is repeated on each page and thus enables the reader to easily navigate the document.

Answer:

Headers and footers generally contain document information, such as the file name, author, date created, page numbering and the like. This information is repeated on each page and thus enables the reader to easily navigate the document.

what does bLINK mean?​

Answers

Answer:

people who stan blackpink are known as blinks.

another meaning is blinking your eyes.

It's generally best to use what types of sites for factual internet research? Select all that apply from the choices below.

A. internet addresses that have.edu such as, si.edu (Smithsonian Institute)

B. internet addresses that have.gov extensions such as, kids.gov (US government)

C. internet addresses that have.com extensions, like wikis and blogs

D. any internet search results are appropriate

Answers

Answer:

I would go with A and B.

Explanation:

The .edu extension means that the information has been verified by educational institutions and most of the time even run by them. This is why it's good to trust sites with the .edu extension.

Similarly, .gov is run by government organizations so not just anyone can upload or edit content. Governments surely fact-check their information before uploading it to their website so they are trustworthy sources.

I would do A and B as well

Hope this helps!!

What is printed as a result of executing the code segment if the code segment is the first use of a SomeClass object

Answers

Code segments are codes taken out from a more complete code or program

The result of executing the code segment would print 14

How to determine the result

To determine the result, we simply run the program as follows:

public class SomeClass{

private int x = 0;

private static int y = 0;

public SomeClass (int pX){

x = pX;y++;

}

public void incrementY (){

y++;

}

public void incrementY (int inc){

y+= inc;

}

public int getY(){

return y;

}

public static void main (String [] args){

SomeClass first = new SomeClass (10);

SomeClass second = new SomeClass (20);

SomeClass third = new SomeClass (30);

first.incrementY();

second.incrementY(10);

System.out.println(third.getY());

}

}

The result of running the above program is 14

Hence, the result of executing the code segment would print 14

Read more about code segments at:

https://brainly.com/question/25781514

Examine the following declarations:


int area;
Point pt;


How many objects are created?

a. One---there is one object reference variable so there must be one object.

b. Two---one for each variable.

c. None---there is one object reference variable, but no objects yet.


d. Two---one for each type.

Answers

Answer:

I think the answer is gonna be A

The devices that can read, write, and erase data are called _________. Select your answer, then click Done.

Answers

The devices that can read, write, and erase data are called drives

Match the terms related to the web with their explanations.

Answers

Answer:

1.) SMTP

2.) HTTP

3.) FTP

4.) AND

Explanation:

YOU'RE WELCOME :)

A condition-controlled loop uses a while loop.

true

false

Answers

Answer:

true

Explanation:

a while loop is a condition-controlled loop. While loops continue no matter what under a certain condition, unless you insert the keyword break.

One example in python is this:

while x > y:

      pass

The keyword to break a while loop may vary depending on the coding language you are using.

Tip The pass keyword allows a no error contact between loop and the terminal. Pass in a nutshell is almost as if saying nothing at all, but just leaving the condition blank. We only use pass because it prevents errors instead of no value.

what is computer graphics ? ​

Answers

Answer:

Computer graphics deals with generating images with the aid of computers. Today, computer graphics is a core technology in digital photography, film, video games, cell phone and computer displays, and many specialized applications.

Hope This Helps!!!

Answer :

Graphics are visual presentations on a surface, such as a computer screen. Examples are photographs, drawing, graphics designs, maps, engineering drawings, or other images.

The major carriers of network traffic are known collectively as the internet ______.

Answers

Answer:

Backbone.

Explanation:

The major carriers of network traffic are known collectively as the internet backbone.

Niall is revising a history assignment using a word processor on a Windows computer. He wants to copy a section from an earlier draft and paste it in his current document. Which keyboard shortcut can he use to copy the section?

Answers

Answer:Ctrl + V

Explanation:

Answer:

CTRL+C

Explanation:

Which type of conditional formatting rule would you create to add a horizontal bar to a cell background, where the length of the bar reflects the value in the cell

Answers

The conditional formatting that you would use to add a horizontal bar is the data bar.

What is conditional formatting?

This is a feature that is found in  a lot of work spreadsheets such as MS Excel.

These kinds of formatting usually helps the user to certain types of formatting to certain cells using a given criteria.

The formatting may be a color based one.

Read more on conditional formatting here: https://brainly.com/question/25051360

When the computer translates digital information to information humans can use, it is called.

Answers

Machine Translation (MT) is the process of using Artificial Intelligence (AI) to translate computer language to human visual interfaces.

Or you may be looking for the term User Interface or (UI)

It is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring can deter risk. To serve this goal, a ________________can be used to assemble logs from platforms throughout the network.

Answers

Log server can be used to assemble logs from platforms throughout the network.

Log server

A server log is a log file (or several files) automatically created and maintained by a server consisting of a list of activities it performed.

It maintains a huge server requests, information about the request, including client IP address, request date/time, the page requested, HTTP code, bytes served, user agent, and referrer are typically added to the log server format.

Server logs typically do not collect user-specific information.

Find out more on Log server at: https://brainly.com/question/19057393

________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propagation worms

Answers

Answer:

Worms

Explanation:

"Worms" other known as viruses, take advantage of vulnerabilities in software.

____ is an example of a set of prewritten classes that allows you to access data stored in a database.

Answers

Answer:

ADO.net

Explanation:

The objectivity of a site relates to its a. Appearance c. Graphics b. Biases d. Quotes from other Internet authors Please select the best answer from the choices provided A B C D.

Answers

The objectivity of any site is related to the biases present in the content of the site because it creates an imbalance of information and it is unfair.

What is the objectivity of a site?

The content in a site represents the thoughts of a specific author. Objectivity comes to the role when there is an imbalance in the data or information available on the site.

The information available on the site represents the opinion that helps readers to understand or decide on anything. When the information is fair completely balanced then it becomes fair for the users to refer to that content. But when the data is biased or unbalanced then it becomes a problem.

Therefore, the objectivity of any site is related to the biases present in the content of the site because it creates an imbalance of information and it is unfair.

Learn more about objectivity of a site here:

https://brainly.com/question/2018782

Answer:

B. bias

Explanation:

What security design principle states that secrecy itself cannot be relied upon as a means of protection

Answers

The principle of open design holds that the protection of an object should rely upon secrecy of the protection mechanism itself.

Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as ________. All of the answer choices are correct. editor reader subject matter expert

Answers

People or web do wants their privacy. Large wikis do protect the quality and accuracy of their information by assigning users roles such as Reader, Subject Expert and editor.

What is website quality?

Website quality is one that is said to be based on the quality of the software and output. Website Quality or say the Quality of Websites are said to be often measured from two views.

That is the Programmers, and End-users. The various aspects of website quality ranges from programmers who are based on the extent of Maintainability, Security, Functionality and others.

learn more about protection of quality  from

https://brainly.com/question/13171394

Describe some things that this person might say that might cause you to NOT hire them. Explain.

Answers

Answer:

If they don't sound positive or give an attitude towards me, then I would not hire them.

Wap to print sum of N - number​

Answers

Answer:

CLS

Input " Enter any number";N

for i = 1 to N

S = s + t

Next i

Print " sum is ";

End

If a numeric column is being used for comparison against the search condition, the search condition is enclosed in single quotation marks. _________________________

Answers

comparison operator can be used to specify a range of values as a search condition. When two conditions are joined by the AND logical operator, both of the conditions must be evaluated as TRUE to be included in the query results. In a WHERE clause, logical operators are evaluated before comparison operators.

On the worksheet, make cell a1 the active cell and then simultaneously replace all occurrences of the value 0. 05 with the value. 1. Close any open dialog boxes.

Answers

Excel formulas are expressions used to perform computations.

How to make cell A1 the active cell

To do this, we simply place the cursor on the cell (i.e. cell A1), and then select cell A1.

In other words, you make cell A1 the active cell by selecting cell A1

How to replace all occurrences of 0.05

There are several ways to do this, but the best way is by using the find and replace tool of Microsoft Office Excel.

To replace 0.05 with 1, follow the steps below

Goto Home Click Find & SelectSelect Find or ReplaceEnter 0.05 in the find box, and 1 in the replace box.Lastly, click Replace All to simultaneously replace all occurrences of the value 0. 05 with the value. 1

Read more about Excel formulas at:

https://brainly.com/question/14820723

Configuration rules are instruction a system administrator codes into a security device to specify how it operates.Group of answer choicesTrueFalse

Answers

Configuration rules are instructions a system administrator codes into a security device to specify how it operates.True

Configuration rules

Network configuration rules are first done by assigning the preferred network settings, policies, flows, and controls. This changes the design of the device according to administrator or user specifications.

The two phases or steps of Configuration involves

Configuration phase Execution phase

Read more on Configuration rules in Network Systems here: https://brainly.com/question/13164289

Toll gates have different fees based on the time of day, weekdays/weekends. Write a function that has three parameters: the current hour of time (int), time is morning (boolean) and whether the day is a weekend(boolean). The function returns the correct toll fee (float), based on the chart below.Weekday TollsBefore 7:00 am ($1.15) 7:00 am to 9:59 am ($2.95)10:00 am to 2:59 pm ($1.90) 3:00 pm to 7:59 pm ($3.95)Starting 8:00 pm ($1.40)Weekend TollsBefore 7:00 am ($1.05) 7:00 am to 7:59 pm ($2.15)Starting 8:00 pm ($1.10)input : toll_fee(8, True, False) Output : $ 2.95

Answers

The program is an illustration of functions

What are functions?

Functions are named program statements that are executed when called

The actual program

The program written in Python, where comments are used to explain each line is as follows:

#This defines the function

def toll_fee(time,weekday,weekend):

   #This determines the toll fee for weekdays

   if(weekday):

       if time < 7:

           return 1.15

       elif time>=7 and time <10:

           return 2.95

       elif time>=10 and time <15:

           return 1.90

       elif time>=15 and time <20:

           return 3.95

       else:

           return 1.40

   #This determines the toll fee for weekends

   elif(weekend):

       if time < 7:

           return 1.05

       elif time>=7 and time <20:

           return 2.15

       else:

           return 1.10

#This calls the toll fee function        

print(toll_fee(8, True, False))

Read more about functions at:

https://brainly.com/question/16397886

A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization.
a) untrusted; trusted
b) trusted; trusted untrusted;
c) untrusted trusted; untrusted

Answers

Answer:

b trusted,untrusted

Explanation:

Vulnerability scanners make use of common identifiers to facilitate sharing of intelligence data across different platforms. Currently, a security engineer has an interest in Common Weakness Enumeration (CWE) items. Which area does the engineer study

Answers

Answer: The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs are publicly distributed or sold.

Explanation:

Currently, a security engineer has an interest in Common Weakness Enumeration (CWE) items. The engineer study computer software and programs.

What is CWE?

The Common Weakness Enumeration is a classification scheme for flaws and vulnerabilities in both software as well as hardware.  This is supported by a community effort whose objectives are to comprehend hardware and software defects and develop bots that may be used to find, correct, and eliminate those problems.

The goal of CWE is to make it easier in using methods that could also locate, discover, and fix flaws, exploits, and exposes in computer code even before applications are made available to the general population or sold.

Common identities are used by penetration tests to enable the dissemination of intelligence information throughout many networks.

Learn more about CWE, here:

https://brainly.com/question/24469282

#SPJ5

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication

Answers

Answer:A RADIUS server provides authentication through a user name and password encrypted with EAP.

Explanation:

The passwords can be configured on RADIUS server for authentication.

What is a password?

A password, sometimes known as a passcode (on Apple devices, for instance), is private information that is typically a long string of characters and is used to verify a user's identity. According to the NIST Digital Identity Guidelines, the party holding the secret is referred to as the claimant, and the party confirming the claimant's identity is referred to as the verifier.

The term "Remote Authentication Dial-In User Service" is abbreviated as RADIUS. AAA, which stands for "Authentication, Authorization, and Accounting," is another name for it that is frequently used.

Users can access a variety of services, such as Wi-Fi, VPNs, and applications, depending on the authentication protocol that is being used by the server.

When a user tries to access a protected source, RADIUS first verifies that they are authorized to do so by examining their credentials or certificate. After that, RADIUS decides whether to accept or deny the user.

Hence, RADIUS server can be used for the configuring the password.

To know more about passwords click on,

https://brainly.com/question/14882324

#SPJ12

Can someone please help me with this question

Answers

Answer:

being careful when you open attachments

Other Questions
Is triangle EJH congruent to triangle EIH? 1. What is the measure of Please answer I will mark brainliest! It is for RSM.. identify three effects of physical activity on the respiratory system hurdlenounDefinition: something that makes progress challengingSynonyms: barrier, problem, dragAntonyms: incentive, advantage, aid, assistanceBased on the thesaurus entry and the context of the sentence, use the drop-down menus to choose the best synonym for "hurdle" in each sentence. Use the online dictionary to check the definitions of the synonyms.The runners passed over each hurdle in a flash.The largest hurdle in my plan to buy a car was lack of money. What is the area of this parallelogram?A=1912 ftA = 42 ftA=6112 ftA=7134 ft Why would it have it taken years for the Florida keys to recover from the Labor Day hurricane?pls tell right answer :) or this is me :) Alonzo Dwork will not buy stock in a company that sells bottled water because more than 1.5 million barrels of oil are used annually to make the plastic bottles used for water, and nearly 90 percent of these bottles are disposed of after one use. Dwork is a strong believer in environmental protectionism, and this _____ is his way of expressing that belief. A penguin swims underwater at a rate of 5.5 miles per hour. How long does it take the penguin to swim 44 miles? what is 8 3/4 ? and 11 2/5? please answer the questions in the photo :)) Helpp geometry and tell me how you solved it please PLEASE HELP Me!!!! What was the main advantage of carracks over caravels?ACarracks had a larger cargo capacity than caravels.BCarracks were faster than caravels.Carracks were much cheaper to build than caravels.DCarracks could tack against the wind. The soccer team collected $800 at a car wash fundraiser. They charged $5. 00 for small vehicles and $10. 00 for larger vehicles. The amount collected can be modeled by the equation , where x represents the number of small vehicles and y represents the number of larger vehicles. If the number of larger vehicles washed was 50, how many small vehicles were washed in total?. If angle 4 has a measure of 42 in the given diagram, what is the measure of angle 6? What is the period of a sound wave having a frequency of 340. Hertz?. Researchers estimate that 21.5% of men and 17% of women smoke cigarettes.1The rate of new cases in 2008 showed that men develop lung cancer more often than women (70.2 and 50.5 cases per 100,000 persons, respectively).2Smoking, a main cause of small cell and non-small cell lung cancer, correlates to 90% and 80% of lung cancer deaths in men and women, respectively.3 That is, 90% of men who are diagnosed with lung cancer are active smokers, and 80% of women who are diagnosed with lung cancer are active smokers.1. What answer do you predict? Why? (2 points)2. Given what you know about probability, how can you determine if smoking and lung cancer are related? (2 points)Analyze the Data:3. What is the probability that a randomly chosen man is a smoker? (1 point)4. What is the probability that a randomly chosen man will be diagnosed with lung cancer? (1 point)5. Given that a man has lung cancer, what is the probability that he is a smoker? Write this event with the correct conditional notation. (2 points)6. What is the probability that a randomly selected man will be a smoker and be diagnosed with lung cancer? (2 points)7. For a randomly selected man, are the events diagnosed with lung cancer and smoker independent events? Support your answer with probabilities. (2 points)Consider the Case for Women:8. For a randomly selected woman, are the events diagnosed with lung cancer and smoker independent or conditional? Support your answer with probabilities. (4 points)Making a Decision:9. What can you conclude about smoking and lung cancer? Are they conditional or independent events? (2 point)10. Some people who have never smoked develop lung cancer. Does this disprove the evidence? (1 point) what does degree celsius mean Match the example in column 1 with the term in column 2. Newcomers help others migrate to new country ? Push factors Good climate, jobs, and low cost of living 2 Pull factors Crime, high cost of living, and pollution Forced migration Military drives people out of homes Chain migration after 18 years, Rajesh will be 4 times as old as he is now. His present age is.....