Answer:
scan for viruses
remove unwanted files
back up her data
Choose the best function for the purpose.
___ You need a collection to grow. Once you have all the data values, you will pass the collection to a function for
processing.
___ You will store a set of data that will not change.
Answer:
LIST: You need a collection to grow. Once you have all the data values, you will pass the collection to a function for processing.
TUPLE: You will store a set of data that will not change.
Explanation:
EDGE 2021 answers came from the actual reading. Here's the definition Edge provides for a list: "Lists are probably the most commonly used type of collection. A list can grow as you add values to it. You could use a list to quickly save those values and then pass the list to a function for processing."
With all those bolded words, you see list is the answer for that first blank.
Here's the definition Edge provides for tuple and how it proves deque is the WRONG answer: "Lists and deques are mutable—you can change them. "Tuples are immutable (can't change). Tuples are a good choice when you know that, once created, you will not need to change the values in a tuple. The only way to change the values in a tuple is to create a new tuple with the new values. "
Use the drop-down menus to complete the steps for filtering records in a form.
1. Open the (1) tab.
3. In the Sort & Filter group, click (2), and click Filter by Form.
4. Enter or select a value to set the filter.
5. On the Home tab, in the Sort & Filter group, click the (3) button to toggle the filter.
1= create, database tools, file, home
2= advanced, filtering, find, new
3= ascending, descending, apply filter, toggle filter
Answer:
Home, advanced, apply filter
Explanation:
edge 2021
In the completion of the steps for filtering records, one can:
Open the Home tab.click (advanced), and click Filter by Form.click the (apply filter ) button to toggle the filter. What is filtering of records?Filtering is know to be a very vital methods that is used to see only the data that a person want to be shown in Access databases.
Conclusively, By following the steps above, one can achieving the filtering of the records that they desires.
Learn more about filtering records from
https://brainly.com/question/22238933
#SPJ1
A collection of entries posted on a web site and displayed in reverse chronological order (from newest to oldest entries), is known as: А social collaboration. B media sharing. С a blog D a tweet.
what is the goal of keyboardding technique
Answer:
to get faster at typing
Explanation:
How does HTTP rely on other layers of the internet?
DNS -
TCP-
IP-
Physical Internet -
Please help !!!
Answer:
All of your communications are being sent over the Internet so these requests are being sent inside TCP/IP packets and over the physical wires of the Internet. ... It uniquely identifies the location of each computer or device connected to the Internet.
The __________ gear is the input gear.
A. Drive
B. Driven
Answer:
A) Drive
Explanation:
Driven is past tense
Driven is usually used more in sentences with out a car like "It had driven her crazy"
Write the function greeting that takes a string as input. That string will be formatted as Name Age Hobby, without any punctuation. greeting should split their response into list elements, then use index values to greet them by name and respond that you enjoy that hobby as well, with the format: ‘Hello, ! I also enjoy !' Make sure your output matches this format! For example, greeting('Jose 17 hockey') # => 'Hello, Jose! I also enjoy hockey!' greeting('Cindy 14 robotics') # => 'Hello, Cindy! I also enjoy robotics!'
Answer:
The function in Python is as follows:
def greetings(details):
details = details.split(' ')
print('Hello, '+details[0]+'!, I also enjoy '+details[2])
Explanation:
This defines the function
def greetings(details):
This splits the input string by space
details = details.split(' ')
This prints the required output
print('Hello, '+details[0]+'!, I also enjoy '+details[2])
After splitting, the string at index 0 represents the name while the string at index 2 represents the hobby
Which wizard is a tool provided by Access that is used to scan the table’s structure for duplicate data?
Query Design Wizard
Table Design Wizard
Table Analyzer Wizard
Performance Analyzer Wizard
Answer:
Table Analyzer Wizard
Explanation:
System where energy is used to move people is a what system
Sometimes it is necessary to_ after installing a new software program and before using it the first time.
Answer:
The answer is "restart your computer".
Explanation:
Installing the new software programs with system drivers and plug-ins would be the ready-to-execute software. It refers to a particular installation of a device or hardware to enable its computer functional. Since downloading a new software program and using it first, you often have to restart your computer.
Answer: restart your computer
Explanation: took the quiz
Hello anyone to speak?
Answer:
hey hope you have a good day or night :)
Which symbol should you use for entering a formula in a cell?
А.+
B.=
C. $
D.%
E#
Answer:
ITS + AND =
Explanation:
Answer:
Explanation: The equals operator is used in the Microsoft excel for the indication of formula in a cell .
Explanation:
Jason would like to add visual representations to a table that will be used to easily show comparison data. Which option should he use?
conditional formatting
data bars
expression builder
field criteria
Answer:
a. conditional formatting
Explanation:
Codehs 9.4.5 Phone Book. Anyone have the answers?
Answer:
The program is as follows:
phonebook = {}
while True:
entry_name = input("Name: ")
if entry_name == " ":
break
elif entry_name in phonebook:
print(entry_name+" exists with the phone number "+str(phonebook[entry_name]))
else:
entry_number = input("Number: ")
phonebook[entry_name] = entry_number
print(phonebook)
Explanation:
This creates an empty dictionary for phonebook
phonebook = {}
This loop is repeated until it is exited by the user
while True:
Prompt for name
entry_name = input("Name: ")
If name is empty
if entry_name == " ":
Exit the loop
break
Else if name exists in the phonebook
elif entry_name in phonebook:
Notify the user with the name and the phone number
print(entry_name+" exists with the phone number "+str(phonebook[entry_name]))
If otherwise,
else:
Prompt the user for phone number
entry_number = input("Number: ")
Save in the dictionary
phonebook[entry_name] = entry_number
Print the phonebook
print(phonebook)
Answer:
my_dictionary = {}
while True:
name = str(input("Enter a name: "))
if name == "":
break
elif name in my_dictionary:
print("Phone Number: " + my_dictionary[name])
else:
phone_number = input("Enter this person's number: ")
my_dictionary[name] = phone_number
print(my_dictionary)
Explanation: code hs
This describes what is charted. It can be placed above or below the chart.
a. Chart area
b. Chart title
C. Bar chart
d.Pie chart
Answer:
a . chart area
This describes what is charted. It can be placed above or below the chart.
Explanation:
The answer choice which describes what is charted and can be placed above or below the chart is:
A. Chart areaAccording to the given question, we are asked to show the answer choice which describes what is charted and can be placed above or below the chart
As a result of this, we can see that a chart area is an area in a graph which shows the quantitative data in a graphical form and it is based on the concept of line chart and can be placed either above or below the chart.
Therefore, the correct answer is option A
Read more here:
https://brainly.com/question/18524966
What can help you take better animal photographs?
Use a lower ISO.
Focus on the animal's nose.
Be ready to catch the shot.
All of the above
Answer:
All of the above
Explanation:
i think i may be wrong.
Answer:
be ready to take the shot
Explanation:
How would I tell Tracy to move forward 100 pixels?
Answer:
Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.
Explanation:
Answer:Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.
Explanation:
An archaeologist is dating several recently uncovered sites. She estimates that the site featuring a post-and-lintel design is older than the site featuring corbelled arches. Why might she have reached this conclusion?
The corbelled arch did not become common until the first century C.E.
The post-and-lintel design was discontinued at the end of the Neolithic Era.
The corbelled arch required more advanced knowledge to create than the post-and-lintel design.
The post-and-lintel design did not require slave labor, unlike the corbelled arch.
Answer:
Its b
Explanation:
just took the test
Which three phrases describe a wireframe?
Tracy uses a pictorial summary of an entire website in her team meeting. It is a two-dimensional illustration of how each web page on a website will look. Known as a workflow diagram, this explains how pages in a website connect to one another. It is a design tool, and it shows the overall framework of a website. It is a visual representation of how much space each element on a page should take.
Answer:
A wireframe is best described by the phrase;
It is a design tool, and it shows the overall framework of a website
Explanation:
A wireframe is meant to provide a visualization for a page in a form of blue print that defines a websites structure thereby aiding the communication and thought process among those concerned in the website development process, including the programmers, developers and website designers
The wireframe is a depiction of the website, that points out the intended location of content, the layout and how navigation and functions that are to be included on a page in a way that is easily adjustable
The wireframe is therefore a representation of the skeletal framework of the website
Answer:
i only know two and they are design tool and shows the overall frame work of a website
Explanation:
plato
Use the drop-down tool to select the correct answer.
Government agencies work to catch people who engage in software piracy, and can also help to stop them by filing lawsuits.
Answer:
Software producers
Explanation:
Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.
Generally, patents are used on innovation for products that are manufactured through the application of various technologies.
Basically, the three (3) main ways to protect an intellectual property is to employ the use of
I. Trademarks.
II. Patents.
III. Copyright.
Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.
Hence, government agencies work to catch people who engage in software piracy, and software producers can also help to stop them by filing lawsuits. Software producers or developers are saddled with the responsibility of filing lawsuits against pirates or intellectual property theft who engages in the illegal use of patents or licensed software applications.
I bought RP-HF410B Pannasonic Bluetooth wireless headphones. They work perfectly well on my iPhone, but my windows 10 won't detect it.
Bluetooth works perfectly fine as it shows my phone (and other Bluetooth devices), but not my headphones.
I tried both the "connect" in Action Center and "Bluetooth & other devices" in settings; same result.
What am I to do?
Here's a summary:
Phone-laptop✔️
Phone-headphones ✔️
Headphones-laptop ❌
Answer:
In my opinion,
Explanation:
I would go to your local phone store of something like that and ask what is going on because that happened to me and they said to power to laptop and power it on.
Where can
а a
radio be found and how
they used
Answer:
I don't know if I'm the only one who doesn't understand I'm sorry.
Explanation:
What are your initial thoughts regarding copyright and fair use after watching the clip?
(The clip is The Clock by Christian Marclay, just a 3-minute clip 2010-2011 you can find on YT)
A person who is good with numbers and problem solving has which type of learning preference?
a) hands-on
b) verbal
c) logical
d) visual
Answer:
I believe it is logical.
Answer: c) logical
Explanation:
:)
Emma won a laptop at her high school science fair. The laptop does not have antivirus software installed on it so Emma must purchase one. She'll be using the laptop for college applications, schoolwork, and hopefully next year as a college freshman.
if the question is if she should..
Explanation:
Yes, she should if she plans to use it for a couple years she should get the best anti virus software :)
I made a fish emoji what do you think >{'_'}< should I change anything
Answer: It is beautiful
Explanation:
☁️ Answer ☁️
666/69 I like it. : )
A salesman has been traveling to different businesses all day to give a sales presentation. Each time, he was starts up his laptop and logs into Windows to show his PowerPoint presentation to the customer. During his second appointment, his laptop lost power and shut itself off abruptly. He arrives at his third appointment and plugs in his laptop to recharge it. When he powers on his laptop, he sees a very low resolution version of his normal desktop. He attempts to change the resolution from 800 x 600 to 1920 x 1080 (his normal resolution), but cannot find it in the Display Settings options inside of Windows. Which of the following could be the cause of this error?
A. Corrupted or missing display driver
B. Graphic card failure
C. Corrupted motherboard firmware
D. Corrupted memory module
Answer:
A. Corrupted or missing display driver
Explanation:
The most likely reason for this problem would be a corrupted or missing display driver. The display driver is in charge of grabbing the information from the graphic card and adjusting all the necessary settings so that all of the graphic card's power is able to be utilized. Missing or corrupt drivers can cause errors such as laggy display, wrong resolution/minimum resolution, missing display settings, etc. A graphic card failure on the other hand would show no image on the screen whatsoever when turning on the computer.
What is the output?
class car:
model = "
age = 0
myCar = car()
myCar.age= myCar.age + 10
print(myCar.age)
Output: ___
Answer:
10
Explanation:
# A class named car is created
# There are two variables in the class, model and age.
# model is a string holding value for the model of the car.
# age is an integer holding value for the age of the car.
class car:
model = '' # model is initialized as empty string
age = 0 # age is initialized as 0
myCar = car() # creating a car object named myCar
myCar.age= myCar.age + 10 # the value of the age is updated by adding 10. (Note that myCar was our object. If we want to access any properties of the object, we type the object name, . , and the property name. Initially, age was 0, we added 10 to it and it becomes 10)
print(myCar.age) #prints the age of the myCar object, 10
Manuel owns a small business. He needs to calculate the amount each employee owes in Federal taxes. Manuel should
use an)
O e-mail
O printer
O database
O spreadsheet
Answer:
The answer is spreadsheet
Explanation:
I just took the test too
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options.
people make unintentional mistakes
people do not know about cybersecurity protocols
workplaces tend to have too strict cybersecurity protocols
cybersecurity specialists do not really help
people deliberately try to hack into the network
Answer:
people make unintentional mistakes
people do not know about cybersecurity protocols
people deliberately try to hack into the network
Explanation:
Cyber security breaches are the compromise to the data integrity of a computer system or network. There are several reasons why this can happen in the network f an organization. Some of them include;
1. People make unintentional mistakes: Human error has been attributed to be the leading cause of cybersecurity breaches. When people unknowingly expose passwords and sensitive data to those who should not have access to them, they commit a breach of security.
2. People do not know about cybersecurity protocols: When people are not educated on the right security measures to adhere to, they are prone to unknowingly engage in acts that will lead to a security breach.
3. People deliberately try to hack into the network: People within and outside the organization can decide to compromise the network especially if they believe that they will have some financial benefits.