If you ship bakudeku. I swear.
*RANTS*

Answers

Answer 1

cries in bakudeku shipper


Related Questions

A chain of coffee servers is sending a spreadsheet of projected costs and profits to some of its investors. When, Kyle, the administrator making the spreadsheet, adds an image of his company’s logo, he realizes it would fit and look best if turned to read sideways.

How can Kyle change the image to make it fit in such a way?

He can select the image and hold down on the green handle above it while sliding the mouse.
He can select the image and hold down Control while sliding the scroll bar to the right.
He can press the PivotTable button and select “Rotate 90 degrees” and then click OK.
He can click on the Pictures Tool tab and select press Artistic Effects to access the rotate option

Answers

Answer:

On a spreadsheet application including MS Excel;

He can select the image and hold down the rotation handle above it while sliding the mouse

Explanation:

Manual rotation of a picture or a text box can be performed by selecting the image or text box in MS Word or a spreadsheet application such as MS Excel. With the mouse select the rotation handle of the picture and drag in the direction desired, left or right.

So as to limit the rotation to 15 degrees hold down the shift button while dragging the rotation handle by clicking on it with a mouse and dragging in the desired direction

(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?

Answers

Answer:

a trade mark is something where someone owns the rights to something in a specific country

what are the outputs of these please help

Answers

Answer:

monkey know monkey not tell

Explanation:

Answer:

it will ask for a number.

if that number < or = to 0

then

it will add three to that number.

if that is not true

and that number > 0 and that number < 5

than

it will add one to that number.

if none of those are true

than

it will subtract 5 to that number.

Explanation:

what os the full form of cpu​

Answers

Answer:

central processing unit

Central processing unit

What browser do you use?
Brave
Chrome
Firefox
Opera
Edge
Tor


Answers

Answer:

Explanation:

Which file type is best for saving line art and animated images?

DOC
GIF
JPG
MP3

Answers

Answer: GIF


Hope this helps!!!

Answer:

GlF =Graphic interchange format is best for saving line art and animated images.

stay safe healthy and happy.

You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group

Answers

Answer: Add the Managers group to the GPO's discretionary access control list (DACL).

Deny the apply Group Policy and read permissions to the Managers group.

Explanation:

To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).

Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.

does anyone know what's wrong with this code

Answers

hmmm- I don’t see anything right now, I’m at the end of a semester in Computer technology.

What is a bounding box

Answers

Answer:

bounding or enclosing box for a point set in N dimensions is the box with the smallest measure within which all the points lie.

Construct :
4 input NOR Gate Truth Table.

Answers

9514 1404 393

Answer:

  see attached

Explanation:

The output is always 0, except for the case where all 4 inputs are 0.

Janet is working on a highly confidential company budget spreadsheet, and she needs to prevent anyone, including administrators in the IT department, from being able to open the file and view its contents.
What should she do?

A) Use the Home tab, select Protect Sheet, and enter a password to prevent access to the sheet.
B) Click the Info tab in the Backstage view, select Protect Workbook, select Encrypt with Password, and enter a password.
C) Click the Review tab, select Protect Workbook, and enter a password for protecting the sheet.
D) Click the View tab and customize the view to protect the sheet from unauthorized users.

Answers

It has to be I took it

I NEED THIS NOW!! :((

Which feature of a database allows a user to locate a specific record using keywords?

Chart
Filter
Search
Sort

Answers

which feature of a database allows a user to locate a specific record using keywords?

search

pls help!! which of the following is not a step required to view a web page?

Answers

The first one! It’s not required to view web pages

write examples of hacking in internet?​

Answers

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

the advantages and disadvantages of internet​

Answers

Advantages : a lot of useful information from all around the world
Disadvantage:, cyberbullying, stalking, hacking

The _____________ command is used to stop the FOR...NEXT loop prematurely.​

Answers

Answer:

The exit command is used to stop the FOR...NEXT loop prematurely

What defines employability

Answers

is this multiple choice or are you looking for the definition?

A small computer on a smart card has 4 page frames. At the first clock tick, the R bits are 1000 (page 0 is 1 and the rest are 0). At subsequent ticks, the values are 0110, 0101, 1010, 1101, 0101, 0011, and 1100. If the aging algorithm is used with a 16-bit counter, give the values of the four counters after the last tick. If page fault occurs, which page should be swapped out

Answers

Answer and Explanation:

Aging algorithm Aging algorithms are the NFU algorithm with modification to know the time of span and increment the page referenced. The ageing method sort customer invoices by date in four columns. By using the ageing algorithm, counters are shifted by 1 bit, and the R bit is added to the leftmost bit. The values of counters are

Page 0:  01101110

Page 1:   01001001

Page 2:  00110111

Page 3:  10001011

The system clock is 2ns and interval is 2ms for that one bit per interval is the ability to analyze the references in a tick. Counters have a finite number and have two pages, where counter value 0 have two pages. The page fault appears, and pick just one of them randomly.

You defined a class as follows.

def __init__(self, style, color):
self.style = style
self.color = color
This portion is the _____.


creator

instantiator

constructor

initiator

Answers

Answer:

instantiator

Explanation:

MRK ME BRAINLIEST PLZZZZZZZZZZZZZZZ

Answer:

instantiator

Explanation:

HELPPPP KOKICHI IS OUT TO KILL ME

Answers

Oh my- good luck with that-

Answer:

rest in piece :(

Explanation:



…..is the smallest size in audio files

Answers

Answer:

Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.

Explanation:

Answer:

Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.

1. why is manufacturing considered the biggest contributor to progress

Answers

Answer:

A vibrant manufacturing base leads to more research and development, innovation, productivity, exports, and middle-class jobs. Manufacturing helps raise living standards more than any other sector. Manufacturing generates more economic activity than other sectors.

adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf

Answers

Answer:

this belongs on r/ihadastroke

Explanation:

Answer: ok

Explanation:

Complete the sentence.
A beta version of software is released during the _______ phase of software development.

Teseting

Release

Coding

Design

Answers

Hi Bro... , You Have A Wonderful Questions.

IF WE DIRECTLY JUMP RIGHT ON THE ANSWER , THEN THE SENTENCE WILL BE :

A Beta Version Of Software Is Released During The "Testing" Phase Of Software Development.

Explaination :

A Version Of A Piece Of Software That Is Made Available For Testing, Typically By A Limited Number Of Users Outside The Company That Is Developing It, Before Its General Release Is Called Beta Version.

As Mentioned Here , We Can See That Beta Version Is Made For Testing Purpose, To Test Whether It Working Properly Or Not.

Hope This Answer Satisfied You ^_^

And Thanks For The Points ;-)

A beta version of software is released during the Testing phase of software development.

What does having a beta version mean?

A pre-release of software that is given out to a large group of users to try under real conditions. Beta versions have gone through alpha testing in-house and are generally fairly close in look, feel and function to the final product; however, design changes often occur as a result.

What is alpha and beta version?

A beta test is carried out following acceptance testing at the supplier's site (alpha test) and immediately before the general release of the software as a product. In general an alpha version or release of a software package intends to do something particular, mostly does so, yet isn't guaranteed to do so fully.

To learn more about A beta version, refer

https://brainly.com/question/23441836

#SPJ2

What is the name of the User-defined function that is mentioned in the code?

Answers

The name of the user defined function is: footballMatch

Which file organisation has the quickest access to data files? *

1 point

a)Direct

b)Serial

c)Sequential

d)Transaction​

Answers

A direct have the quickest access to data files

.....is used to save project in Visual basic .net from file menu

Answers

Explanation:

I don't really understand what you're trying to get at, maybe try to abbreviate a little more?

When creating a storyboard, in which section do you mention how you move from one shot to the next?
A.
synopsis
B.
sketch
C.
transitions
D.
shot description
E.
shot sequence number

Answers

Answer: C

Explanation:

Answer:

E. shot sequence number

Explanation:

An array is mirrored if one half of the array is a reflection of the other. For example, these are mirrored arrays:

int[] a = {5, 4, 3, 4, 5};
int[] b = {9, 2, 2, 9};

The intent of the following methods is to determine whether an array is mirrored or not.

public boolean isMirrored(int[] array) {
// Add code here
}

private boolean isMirrored(int[] array, int leftIndex, int rightIndex) {
if (leftIndex > rightIndex) return true;
if (array[leftIndex] != array[rightIndex]) return false;
return isMirrored(array, leftIndex + 1, rightIndex - 1);
}

Which of the following statements, when inserted at the comment, “Add code here”, would complete the first isMirrored() method, call the second isMirrored() method, and produce the correct results?
A. return isMirrored(array)
B. return isMirrored(array, 0, 0)
C. return isMirrored(array, 0, array.length - 1);
D. return isMirrored(array, array[leftIndex], array[rightIndex]);


Which of the following is a method of the File class that can return an array of Files in a directory?
A. listFiles()
B. files()
C. getFiles()
D. directory()



Consider the following code.

public static int fileMethod(File dir) {
File[] files = dir.listFiles();
if (files == null) return 0;

int count = 0;
for (File f : files) {
if (f.isFile()) count++;
else count += fileMethod(f);
}
return count;
}

If dir represents a starting directory, which of the following statements best describes the operation of fileMethod()?
A. It counts and returns the number of files and directories inside dir and all subdirectories of dir.
B. It counts and returns the number of files, not counting directories, inside dir and all subdirectories of dir.
C. It counts and returns the number of files and directories only inside dir and inside only the first subdirectory found inside dir.
D. It counts and returns the number of files, not counting directories, but only those found inside dir and not its subdirectories.



Which of the following methods will correctly calculate the factorial of a positive number using iteration?
A.
public static long factorial(int n) {
if (n == 0) return 1;
else return n * factorial(n);
}
B.
public static long factorial(int n) {
if (n == 0) return 1;
else return n * factorial(n - 1);
}
C.
public static long factorial(int n) {
int product = n;
while (n > 0) {
n--;
product *= n;
}
return product;
}
D.
public static long factorial(int n) {
int product = n;
while (n > 1) {
n--;
product *= n;
}
return product;
}

Consider the following code.

public static String display(String s, int c) {
if (c == 0) return s;
else {
if (c > 3) return "-" + display(s, c - 1) + "-";
else return "=" + display(s, c - 1) + "=";
}
}

Which of the following methods most accurately reproduces the behavior of the display() method without using recursion?
A.
public static String d1(String s, int c) {
String retVal = "";
for (int i = 0; i < c; i++) {
if (i > 3) retVal += "-" + s + "-";
else retVal += "=" + s + "=";
}
return retVal;
}
B.
public static String d2(String s, int c) {
String retVal = "";
for (int i = 0; i < c - 3; i++) {
retVal += "-";
}
for (int i = 0; i < Math.min(3,c); i++) {
retVal += "=";
}
retVal += s;
for (int i = 0; i < Math.min(3,c); i++) {
retVal += "=";
}
for (int i = 0; i < c - 3; i++) {
retVal += "-";
}
return retVal;
}
C.
public static String d3(String s, int c) {
String retVal = "";
for (int j = 0; j < c - 3; j++) {
retVal += "-";
}
for (int j = 0; j < 3; j++) {
retVal += "=" + s + "=";
}
for (int j = 0; j < c - 3; j++) {
retVal += "-";
}
return retVal;
}
D.
public static String d4(String s, int c) {
String retVal = "";
for (int i = 0; i < c; i++) {
for (int j = 0; j < c - 3; j++) {
retVal += "-";
}
retVal += "===" + s + "===";
for (int j = 0; j < c - 3; j++) {
retVal += "-";
}
}
return retVal;
}

Answers

Answer:

Sierra Madre Oceandental rangeHURRY

Dr. Khan works for the marketing department of a company that manufactures mechanical toy dogs. Dr. Khan has been asked to assess the effectiveness of a new advertising campaign that is designed to be most persuasive to people with a certain personality profile. She brought four groups of participants to the lab to watch the video advertisements and to measure the likelihood that they would purchase the toy, both before and after watching the ad. The results of Dr. Khan’s study are presented below.

Part A

Explain how each of the following concepts applies to Dr. Khan’s research.

Survey

Dependent variable

Big Five theory of personality

Part B

Explain the limitations of Dr. Khan’s study based on the research method used.

Explain what Dr. Khan’s research hypothesis most likely was.

Part C

Use the graph to answer the following questions.

How did the trait of agreeableness affect how people responded to the new ad campaign?

How did the trait of conscientiousness affect how people responded to the new ad campaign?What's the output of a system modeled by the function ƒ(x) = x5 – x4 + 9 at x = 2?

Please Help

A)

24

This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info

Answers

Answer:

contact their support

Explanation:

Other Questions
if you had the option or have the option of taking french or spanish, which one did you or would you do? i have to pick and im more towards spanish but i dont know ead the following extract from the text and provide the word class (part of speech) forach word underlined.(10)this (a) article explores the advantages (b) of virtual libraries for student leaming, the types ofearning that can (c) be supported in (d)virtual library environments, the importance of designenable different types of learning, and the concerns posed by virtual (e) libraries Althoughit is important for information-seekers to continue the information-search (g) process untilhey are successful in locating (h) information, they () also need to know when they havenough information to begin (k) presenting it A circle has a diameter of 12cm. Find the arc length if the central angle is 37.Round to the nearest tenth. I need answer not links 1 and 2 are complementary angles. The measure of 1 is 54 . The measure of 2 is 6(x +1). Find the value of x. In personality traits such as outgoingness, people who have been adopted are a. more similar to their adoptive parents than to their biological parents. b. very similar to their biologically related non-twin siblings who grew up in the same home. c. more similar to their biological parents than to their adoptive parents. d. very similar to their biologically unrelated siblings who grew up in the same home. Minutes No. of HomeworkProblems2 or Less3-45-67-89 or more 84203What is the number of homework problems that took less than 5 minutes in the given table? A. 4 B. 14 C. 12 D. 8 this is solid figure has six equal faces 12 edges and 8 verticesA.rectangular prismB.cubeC.coneD.cylinder A 3.20-mol sample of gas occupies a volume of 350. mL at 300.0 K. Determine thepressure of the gas. Choose the best answer. Dnde ponemos la gasolina? O La ponemos en la calle. O La ponemos en el tanque. O La ponemos en el espejo. O La ponemos en la llanta. HELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAPHELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAPIn the following image, how did he make the poster board bend on a curved line? A. He cut it B. He ironed it C. He scored itD. He engrave it You are buying decorations for a birthday party. Six rolls of crepe paper and 20 balloons cost $11.90. After you start decorating, you need more supplies. You buy 2 more rolls of crepe paper and 15 more balloons for $6.05. Was it possible for the US to definitively win the Vietnam war? What is the midline equation of y = -4sin (2x - 7) + 3? Crusades were military Expeditions undertaken by How do you think the USA and the USSR felt about the developmentof such powerful weapons? A painting is 103 centimeters long.How long would the painting measure in meters?Enter your answer in the box. m 3. Calculate the value of x in the figure to the right: (2 Points) The first Adrick agricultural species to be altered by genetic modification words though soybean be right Shaka was Select one: a. an Afrikaner who waged war on Dutch settlers. b. the British-appointed ruler of the Cape Colony. c. the leader of Ethiopia's successful resistance to Italian imperialism. d. a Zulu leader and organizer of a violent, militaristic empire. e. the leader of a protest against working the DeBeers' diamond mines.