documents or download
It depends where you install it to
Answer:
numbers are stored as characters
Explanation:
currently saved in if another folder
Alex needs to create a function capable of counting item reference numbers that he is inserting into a spread sheet. The purpose of this function will be to keep track of inventory. How would Alex go about finding a function to do this? Click the Home tab and use the Find.
Alex can find a function to do this by entering the item reference numbers into the worksheet, and click the Sort button to count the items.
A spreadsheet can be defined as a document or file which comprises cells in a tabulated format (rows and columns), that are typically used for formatting, arranging, analyzing, storing, calculating, counting, and sorting data on computer systems through the use of a spreadsheet application such as Microsoft Excel.
In this scenario, Alex wants to keep track of inventory by creating a function that is capable of counting item reference numbers as he is inserting into a spread sheet. Thus, he should enter the reference numbers of each item into the worksheet, and click the Sort button to count the items.
Read more: https://brainly.com/question/14299634
Answer:
It’s C
Explanation:
edge
An IT security threat is anything that might cause serious harm to a computer system.
Question 16 options:
True
False
Answer:
True
Explanation:
this is true because a threat can endanger the computer and its system
the windows logon process has unexpectedly terminated
Answer
Windows corrupted
Explanation:
Try buying a new windows or resetting your laptop/pc
or your service failed to register/start
Windows login allows user accounts to log on to the system by opening the subscriber notification database and initiating user-level operations. The system may start with reduced functionality if the system resources required for Windows logon are insufficient.
What windows logon process has unexpectedly terminated?In order to read the list of user accounts that are set up for the machine, the Windows operating system reads the registry at logon.
The Windows logon page won't appear if the data can't be read, making it impossible for users to sign in to Windows. The level of registry damage determines whether Windows can finish the startup procedure or not.
You will need to boot the computer into the Recovery Console rather than Windows in this circumstance. Use the Startup Repair tool after entering the Recovery Console. For Windows installations that won't boot, Startup Repair automates frequent diagnostic and repair activities.
Therefore, All logon attempts, however, will be blocked if the Windows registry is seriously damaged. Windows crashes when you try to log on, and it restarts after that.
Learn more about Windows here:
https://brainly.com/question/6969788
#SPJ5
Time management is the ability to use time effectively.
Question 23 options:
True
False
Answer:
True
Explanation:
if you are able to manage time well, then that means you have good time management skills
Why are graphs and charts important to analyze data?
Answer:
Graphs and chart provide the GUI representation they provide the analysis in form of summary that is easy to understand and they provide good comparision.
Explanation:
Summary
Comparision
Quick to understand
Lori wants to set up a SOHO network in her apartment. The apartment comes with a Gigabit Ethernet network already installed. Lori's notebook computer has an integrated wireless network adapter. Her printer has an Ethernet card, but is not wireless enabled. Your task is to select the appropriate devices and cables (without spending more than necessary) to set up a network that provides wireless access for Lori's laptop and wired access for her printer.
Match the labels for the components on the left to the locations where they need to be installed in Lori's home office on the right.
hi there!
Answer:
1. cat6 cable
2. wireless ethernet router
3. cat5e cable
Explanation:
1. you need a cat6 cable to be capable to deliver the gigabyte ethernet data to the network device.
2. you need a wireless device to provide wireless connection to her notebook.
3. for a printer no cat6 is necessary you can use cat5e cable and it will be enough.
hope this helps.
Connection to the gigabit ethernet network must be done with Cat6 Cable. Using the wireless ethernet router as the network device and connecting the cable to the printer must be done with Cat5e Cable.
We can arrive at this answer because:
The Cat6 Cable will be responsible for establishing a bridge between the gigabyte Ethernet and the network device, allowing data delivery to be made between the two systems.This connection must be made with a wireless device, to keep it more stabilized and it needs, mainly, for the notebook to receive the internet signal. This will be done using the wireless ethernet router.The printer needs a softer, less rigid connection, so a Cat5e cable will be a convenient option.In this case, we can see that using these devices will allow Lori to have a more stable and efficient connection to meet her needs.
More information on network connection at the link:
https://brainly.com/question/8118353
Within a master slide template, you can create a custom slide layout. Place the steps to complete this task in the correct order.
Answer: yes the above is correct
1. In the slide master tab, select insert layout.
2. Click rename, and name the new layout.
3. Choose new elements with Insert Placeholder.
4. Save the Changes.
5. Confirm by selecting Home, then Layout.
When a custom slide layout is created, the steps to complete this task in the correct order are as follows:
What do you mean by layout?A layout refers to the parts of something that are arranged or laid out.
The steps to complete this task are as follows:
In the slide master tab, select insert layout.Click rename and name the new layout.Choose new elements with an Insert placeholder.Save the changes.Confirm by selecting home and then the layout.Learn more about Layout here:
https://brainly.com/question/1327497
#SPJ2
Help!!
So I think that someone is tracking my truck with an apple airtag but I don't know for sure. The only apple product I have is an iPad and I don't know how to check if an airtag is near by!!
Answer:
Explanation:
In iOS 13 or iPadOS 14 or later go to Settings > account name > Find My > Find My iPhone/iPad, and disable Find My network.
In macOS 10.15 Catalina or later, go to the Apple ID preference pane, select the iCloud link at left, click the Options button to the right of the Find My Mac item, and uncheck Offline Finding or Find My network (the text varies by macOS version).
Ethan is afraid that his poor grades will get him kicked out of his university at the end of the semester. He decided to remotely access the dean's computer and change his grades in the school system. If caught, Ethan will have to confess to committing what?
A.
virtual education
B.
grade hacking
C.
a computer crime
D.
educational fraud
Answer:
Computer Crime
Explanation:
You're evading someones privacy and gaining access to their computer or device without consent. Therefore, it is a computer crime.
Answer:
Educational fraud
Explanation:
Ethan changed his grades in the school system claiming to have better grades then he really does.
Are theese speeds considered slow? (I used Ookla Speedtest)
PING ms
5
DOWNLOAD Mbps
86.54
UPLOAD Mbps
98.21
Answer:
No
Explanation:
They are pretty solid speeds and 5ms for ping is relativley low. If youre planning a large download (100+ gigs) I still recomend giving it a few
hours
in ____ orientation, a page is taller than it is wide.
Answer:
portrait
Explanation:
What is an electrical conductor? Name five electrical conductors
Answer:
Explanation:
silver.
copper.
gold.
Steel
Seawater.
Explanation:
Electrical conductors are those which allows the electrons to flow easily. Examples of five conductors are :-
Gold Silver CopperAluminium Iron.PLEASE HELP!!! NO LINKS PLEASE!!!! 50 POINTS!!!!!
Select any theater production that is in the public domain and that has also been made into a film, such as Romeo and Juliet. Search for the film script and the play script online. Write a few paragraphs comparing the film and live production, and write about the genre of the production. Then, compare the scripts of the theater production and the film, and write about the differences and similarities that you find. You can find film scripts and drama scripts at websites such as Simply Scripts:
Answer:
ang hirap naman plss answee
What is the missing line of code?
22
>>> books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}
>>>
dict_keys([294, 931, 731])
O books allo
O books.values()
O books
O books.keys()
Answer:
books.keys()
Explanation:
I ran the code and the awncers though python and books.keys() is the one that came up with the awncer
books.keys() is the missing line of code with respect to the books with the help of Python language. Thus, option D is correct.
What is a code?In a certain programming language, a collection of commands or a collection of rules are referred to as computer code. It's also the name given to the source code just after the translator has prepared it for computer execution.
Code is a developing company that focuses on producing aesthetically pleasing, code-correct internet, application forms, and phone application.
The correct code will be according to the Python language will be in addition to books.keys():
books.keys()
books = {294: 'War and Peace', 931:'Heidi', 731:'Flicka'}
books.keys()
dict_keys([294, 931, 731])
Therefore, option D (books.keys()) is the correct option.
Learn more about code, here:
https://brainly.com/question/17204194
#SPJ2
what does reporter failure mean on adt alarm system
On ADT alarm system, Failure trouble basically means that the monitoring service isn't working properly because of a communication issue with the system. As a result, the home or business is vulnerable.
How does the ADT alarm system function?ADT will strategically place sensors throughout the home to ensure that each zone is covered. The motion then activates a reaction, such as a security light or a camera that begins recording, all through the wireless connection. The movement can also be reported to the ADT monitoring team.
ADT indoor security cameras come with phone security alerts, infrared night vision, a slim design, and secure WiFi. They provide a variety of views for live and recorded feeds and include professional installation.
Failure trouble on an ADT alarm system basically means that the monitoring service isn't working properly due to a communication issue with the system.
Learn more about the ADT alarm system, refer to:
https://brainly.com/question/28199257
#SPJ5
In the context of an ADT alarm system, "reporter failure" typically refers to a communication issue between the alarm panel and the monitoring center.
ADT alarm systems are designed to send signals or reports to a central monitoring station when an alarm event occurs, such as a break-in or a fire. The monitoring center then takes appropriate actions, such as contacting the homeowner or dispatching emergency services.
When the alarm system displays a "reporter failure" message, it indicates that the panel is unable to establish communication with the monitoring center. This can happen due to various reasons, including but not limited to:
Network or internet connectivity issues: If the alarm system relies on an internet or cellular connection to communicate with the monitoring center, any disruptions in the connection can result in a reporter failure.
Learn more about network on:
https://brainly.com/question/29350844
#SPJ6
Write a program Election that computes the tally in a write-in election, and announces the winner. Since the votes are write-in, there is no pre-determined set of candidates. Whoever appears the most in the votes is the winner. The user enters the individual votes, one vote per line, and ends entering with typing -1 or an empty line. To compute the tally, the program uses two arrays, a String [ ] variable (names), and an int [ ] variable (count). Upon receiving a single vote, the program checks if the name on the vote appears in names, and if it does, the program adds 1 to the value of the element in count. If the name does not appear in names, the program extends both arrays by one element, stores the name in names at the last position and store 1 in count at the last position. In this manner, the two arrays will have the same lengths. The initial length is 0 for both arrays. Below is an example of how the program may runplease I need to demonstrate the code,I need some comments next to every single line
The election program illustrates the use of ArrayLists, loops and conditional statements.
ArrayLists are resizable arrays, while loops and conditional statements are used to perform repetitions and make decisions, respectively.
The election program written in Java, where comments are used to explain each line is as follows:
import java.util.*;
public class Main {
public static void main(String[] args) {
//This creates a Scanner object
Scanner input = new Scanner(System.in);
//This creates a string ArrayList for the names of the candidates
ArrayList<String> names = new ArrayList<String>();
//This creates an Integer ArrayList for the vote count of the candidates
ArrayList<Integer> votes = new ArrayList<Integer>();
//This declares name as string
String name;
//This gets input for the name of the candidates
name = input.nextLine();
//This is repeated until the user enters "-1"
while (!"-1".equals(name)){
//If name is in the list,
if(names.contains(name)){
//This gets the index of the name
int pos =names.indexOf(name);
//This calculates the number of votes
Integer value = votes.get(pos)+1;
//This adds the vote to the vote ArrayList
votes.set(pos, value);
}
//If otherwise
else{
//This adds the candidate name to the name ArrayList
names.add(name);
//This adds 1 as the vote of the candidate to the vote ArrayList
votes.add(1);
}
//This gets input for the name of another candidates
name = input.nextLine();
}
//This prints the name of the election winner
System.out.println("Winner : " +names.get(votes.indexOf(Collections.max(votes))));
}
}
Read more about ArrayLists, loops and conditional statements at:
https://brainly.com/question/19504703
Which of these is an off-site metric for social media marketing?
a. the amount of return you get on the investment made
b. customer engagement
c. the number of followers on Twitter
d. bounce rates for your web page
It should be noted that the off-site metric for social media marketing is the number of followers on Twitter.
According to this question, we are to to discuss off-site metric for social media marketing and how this affect social marketing.
As a result if this we can see that off-site metric serves as any means of social marketing outside the site of that organization which makes followers on Twitter the right answer
Therefore, off-site metric for social media marketing is the number of followers on Twitter..
Learn more about social media marketing at:
https://brainly.com/question/14457086
What is my mistake in this case?
Answer:
I think it suppose to be #print out house
Answer:
i guess take the hint, bro.
Explanation:
A computer has __ IP address(es).
A. Many
B. One
Answer:
A computer has one IP address(es).
One
Explanation:
Have a great day!
What's the technique of drawing a 3D object with one vanishing point?
How many things can a computer compare at one time?
Answer: billion of items at one time
Explanation: The computer is very capable of comparing items bulk at one time
john wants to draw a letter L. The turtle is pointing towards the top of the screen. Which series of commands will draw the shape? *
BACK 100 LEFT 90 FORWARD 50
BACK 100 RIGHT 90 FORWARD 50
BACK 200 RIGHT 90 BACKWARD 50
RIGHT 180 FORWARD 100 RIGHT 90 FORWARD 50
Explanation:
BACK 100 RIGHT 90 FORWARD 50
A means of giving credit to a source when their information is used.
Question 15 options:
Citation
Wi-Fi
Asynchronous Communication
Malware
list ten features of word processing packages
Answer:
Entering text.
Editing text.
Formatting paragraph.
Formatting page style.
Importing text, graphics and images.
Entering mathematical symbols.
Checking spelling and grammar.
Header and footer and other.
what is the full form of Blog
A network of computers that provides access to information on the web.
Question 13 options:
Phishing
Internet
Antivirus Application
Modem
Answer:
Internet
Explanation:
Linear gameplay is sometimes also known as “campaign mode” or what mode?
A. skirmish mode
B. battle mode
C. story mode
D. cyclical mode
Answer:
Story Mode
Explanation:
The game has a clearly-defined beginning, middle, and end, also known as campaign or story mode.
Answer:
C
Explanation:
A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.
Question 22 options:
True
False
A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.
A portfolio is a living and changing collection of records that reflect your accomplishments, skills, experiences, and attributes. It highlights and showcases samples of some of your best work, along with life experiences, values and achievements. A portfolio does not take the place of a resume, but it can accentuate your abilities and what you can offer in the chosen field.
Find out more about portfolio at: https://brainly.com/question/24811520
Oil refining is an example of:
Construction Production
Extractive Production
Domestic Production
Traditional Production
Answer:
i think the answer is B but i could be wrong...
Answer:
Extractive production
Explanation:
See
Oil refining denotes to after oil extraction situationFirst oil is extracted then gets refinedSo it's extractive productiona client has requested adjustments to the arrangement and placement of elements on an image. what does the client want changed?
Considering the situation described above, the client wants the image's recipe to be changed.
What is the Image Recipe?Image Recipes are characteristics of an image or picture. It includes features like shape, size, form, pattern, line, shadow, tone, color, contrast, positive space and negative space, etc.
Given that the client needs adjustments to the arrangement and placement of elements on an image, this is a request for a change in the image recipe.
Hence, in this case, it is concluded that the correct answer is "the client wants the recipe of the image changed."
Learn more about the Image Recipe here: https://brainly.com/question/1605430