Answer:
False
Explanation:
A marker merely indicates that a certain operation is possible, but doesn't offer the methods itself.
for what work photoshop is used?
Permissions granted from an individual for the use of a likeness is known as a
- likeness release
- location release
- model release
- media release
likeness release is the term known when a person grants you the ability to use a picture of them
Answer all the questions correcty and the first answer get to be marked brainliest!!!!!!
1. ___________________ is a sort of advertisement that disturbs your Web browser by
appearing in a separate window on the top of your current window.
2. The ____________________ is a quick and easy way to create new objects in MS
Access.
3. _________________ present data from tables and queries in an attractive format.
4. . A __________________ is a column in a table that contains a specific piece of
information within a record.
5. What is the storage capacity of a free Picasa account?
6. What displays the current record number and navigate to other records?
7. Name any five tools present in MS Access Window.
Need it now!!!
allowed public advertisement
opening a new database
column format
database record
1gb
the navigation button will show the current record and the correct no.
table,querie,relatinship,macros,forms
Which of the following is an example of a JavaScript property?
A. window
B. border
C. document
D. table
Which of the following is an example of a JavaScript object?
A. background color
B. border
C. color
D. window
D. Window
Explanation:
Its because everything is an object in Java script
A crime involving digital media, computer technology, or related components is best called an act of
Answer:
digital malfeasance
Explanation:
if an individual does a crime with digital media is doing digital malfeasance
Explain why not having a driver for the old printer is a problem
Answer:
Because you won't be able to print anything without it, because there would be no connection to the printer
Sonia is buying a new phone for her grandmother so she can communicate with her on a daily basis. However, because her grandmother is not tech-savvy, Sonia needs to find a phone that has a simple user interface. Which type of operating system will work best for Sonia's grandmother
The type of operating system that will work best for Sonia's grandmother is an Apple ios.
What is an Operating System?An operating system (OS), is a system software program that help a computer to manage its resources in terms of allocation of functions among programs. The common Operating system includes
Microsoft WindowsApple mac OSLinuxAndroid Apple iOS.Apple ios is proffered for the elderly because it is the with the simplest learning curve and a simple user interface.
Some of its features includes that :
its font size can be increased for better readabilityit has the app Siri that obeys voice commands Emergency SOS can be set up in case of emergency.Therefore Sonia should consider buying her grandmother a device with an Apple ios.
Learn more on Operating systems: https://brainly.com/question/2126669
A _________________ is a framework defining tasks performed at each step in the software development process
Answer:
Workflow?
Explanation:
I don't really know this is just my best guess.
If you intercept a message that has been encrypted using a Caesar Cipher, what is the maximum number of times you would need to guess-and-check different keys for the cipher before cracking it
The maximum number of times you would need to guess-and-check different keys for the cipher before cracking it is; 25 times
Encryption and Decryption of Caesar CipherThe Caesar Cipher is a type of shift cipher. Shift Ciphers work by using the modulo operator to encrypt and decrypt messages. The Shift Cipher has a key K, which is an integer from 0 to 25.
To encrypt a message, you just enter the message in the Plaintext textbox, specify the shift, and click Encrypt. However, to decrypt a message, enter the message in the Ciphertext textbox, specify the shift, and click Decrypt.
Now, For Caesar's Cipher there are only 25 possible ways to shift the alphabet and as such that is the maximum number of times you can guess and check.
Read more about Caesar Cipher at; https://brainly.com/question/14298787
A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol
Answer:
What kind of question is this?! It's likely that every answer is technically right.
Explanation:
Signals being sent take place over everything. The answer you're looking for is most likely the Transport Layer though. TCP is connection-orientated.
Knowledge of some sorts is likely to be represented by a broad pattern of activation spread across a network. This reflects
An subject of distributed representation relates to when some knowledge of some sorts is likely to be represented by a broad pattern of activation spread across a network.
What is distributed representation?In technology, distributed representation refers to similar data features across multiple interdependent layers.
In conclusion, the subject of distributed representation relates to when some knowledge of some sorts is likely to be represented by a broad pattern of activation spread across a network.
Read more about distributed representation
brainly.com/question/17673062
HELP URGENT
When programming, which of the following is true of the editor? A. It is a person who checks your work for spelling errors. B. It is where you write your program and run it. C. It is a coding language. D. It is a program that checks for grammatical errors.
Answer:
D. It is a program that checks for grammatical errors.
Choose the comparison operator that will create a true statement. 30 = 50 27 > 50 48 < 50 45 > 50
Answer:
48 < 50
Explanation:
Basically, with the greater than or less than symbols (< & >) there's a way I think about it that makes it easier.
think of the symbol as a crocodile. The crocodile always eats the bigger number.
Assuming each operating system installed requires 2GB of RAM, what is the minimum amount of physical RAM that will need to be installed in the host system to meet the requirements of this scenario
Answer:
3gb i believe
You have a coworker who frequently sends rude and inappropriate comments to the group instant
message platform. Which of these topics should your supervisor address with this coworker?
O collaboration
O resource management
O netiquette
O globalization
Answer: globalization
Explanation: because telling the boss will tell them why they shouldn’t do that because how it would it effect them later in life and how it would infect people too
What is the primary tool that retrieves data and helps users graphically design the answer to a question
Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.
What is Query by Example?It is a database query language where the first results presented are those that the search engine considers the most relevant for the search carried out.
It is characterized by having a system for ranking and ordering search results that allows the user to return more relevant results.
Therefore, we can conclude that Query by Example (QBE) is the primary database query tool in which the user sets conditions for search selection.
Learn more about Query by Example (QBE) here: brainly.com/question/7479160
Which of the following can be used to enter or display one complete row of information in a range or table
without scrolling horizontally?
End users can use database tools to enter or display one complete row of information in a range or table on Microsoft Excel without scrolling horizontally.
What is Microsoft Excel?Microsoft Excel can be defined as a software application that was designed and developed by Microsoft Inc., for analyzing and displaying (visualizing) spreadsheet documents by using rows and columns in a tabulated format.
In Microsoft Excel, end users can use database tools to enter or display one complete row of information in a range or table on Microsoft Excel without scrolling horizontally. Some examples of these database tools include:
PivotTablesExcel TablesRead more on database here: brainly.com/question/26053797
What information most likely presents a security risk on your personal social networking profile?.
Answer:
Your personal social networking profile may pose security risks if you post certain information publicly. Individuals' Personally Identifiable Information (PII) or Protected Health Information (PHI) is considered to be PHI.
Explanation:
hope this helps!!!!!
The information that is most likely presents a security risk on your personal social networking profile is birthday and hometown. The correct option is B.
Your birthday and hometown are the two pieces of information on your personal social networking page that most likely pose a security issue. Malicious persons may use this information to pose as you or obtain unauthorised access to your accounts.
Through identity theft or phishing scams, attackers may try to use your birthdate to access sensitive information about you, like your social security number or account passwords.
Your online accounts could be compromised if someone uses information about your hometown to crack passwords or figure out security questions.
To safeguard your privacy and improve your online security, you should exercise caution while disclosing such sensitive personal information on social media networks.
Thus, the correct option is B.
For more details regarding social networking, visit:
https://brainly.com/question/29708102
#SPJ6
Your question seems incomplete, the probable complete question is:
What information most likely presents a security risk on your personal social networking profile?.
A) Status
B) Birthday and hometown
C) List of favorite movies and music
D) Number of friends and followers
instead of selecting a _________ and destination, I just click on the area.
url is the answer
hope this helps
scav
what is the salary for an average software dev?
Answer:
$73,213
Explanation:
Answer:
500
Explanation:
maybe ldk I'm not a electronic seller
Which of the following can be used to enter or display one complete row of information in a range or table
without scrolling horizontally?
Answer:
A. Create
Explanation:
I just took the test for Microsoft Access the answer to Which of the following can be used to enter or display one complete row of information in a range or table without scrolling horizontally? is Create
The one that can be employed to show an entire row containing information in a table would:
Data Form
What is Data Form?
The data form is described as the source in Microsoft Excel that offers the user an option to either enter or show a whole row having details or information without even scrolling the cursor west to east or horizontally.
This option has made the data editing very convenient and quick for the users and made the process more effective and efficient.
This is very useful with this option as one can continue data entry more easily as it helps in keeping records more quickly.
Thus, the above response is correct.
Learn more about "Table" here:
brainly.com/question/14231889
Etna works on many projects. As she creates a new project file, she goes to the File tab, selects Options, and then goes to the advanced category for the General section to check a box. What is she trying to do
What Etna is trying to do by going to the file tab and the general section is to Create a new file with a set of parameters.
Steps to creating a new file.In order to create a new file you have to do the following:
You have to go to the file tab.Then you go to click optionsThe next is the advanced categorythe checkbox is located in the general section.Following all of the steps that are listed above would help Etna as she works on her project.
Read more on ways to create files here:
https://brainly.com/question/25554117
Brainy users come back and answer some questions some of us really need help get your ponits today and you will feel good mean while you answer questions other people might have.!
Answer:
of course we will answer any question at any time
Explain the importance of electronics on our daily lives”? 5 sentences minimum
Answer:
through electronics we have a electrified lighted world. our homes,are lit with light using electricity. the stereo we listen to, electricity makes it happen. tv,computers, and record turntables all need electricity. electricity makes things possible that would otherwise be either impossible or very arduous. we see sounds and enjoy them. we watch entertaining movies. we read books and do our homework with the appreciated help of electricity.
While you are using some files on a workstation running Linux, you determine that a few of the files seem to be corrupted. What should you do
The best thing to do is to close all files and applications and run fsck.
What is an Application?This is defined as a computer program designed to carry out a specific task and is used by end-users.
When few files seem to be corrupted, it is best to close all applications and run fsck command as it helps to check and interactively repairs inconsistent file systems.
Read more about Corrupted files here https://brainly.com/question/2596545
Legends are titles given to three-axis X, Y, and Z-axis. True or false?
Answer:
true the legends are the names on each side of the chart that show what the chart shows
true
Hope This Helps!!!
In a 100m sprint, identify some of the phases that you would see the athlete complete?
Answer:
in a 100m sprint identify some of the phases
Which type of shape allows you to add text that can be moved around.
Answer:
Move a text box, WordArt, or shape forward or backward in a stack. Click the WordArt, shape, or text box that you want to move up or down in the stack. On the Drawing Tools Format tab, click either Bring Forward or Send Backward.
Create a list that will contain 14 elements, with the first 12 elements having the value “badger” and the last two elements having the value “mushroom”.
A list that contains 14 elements, with the first 12 elements having the value “badger” and the last two elements having the value “mushroom” is as follows:
list1 = ["badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "mushroom" "mushroom"]
Code explanationList are used to store multiple items in a variable. The items stored accommodate different datatype. List are represented with a square bracket "[]". The elements stored are placed inside the square brackets.
The python list is stored in the variable list1The python list has the first 12 elements as "badger" and the last two elements as "mushroom".learn more on list here: https://brainly.com/question/24941798
Why are volt guards necessary to connect with the computer? .: