what is the path you have to follow in order to change the font of a selected text?​

Answers

Answer 1

Answer:

Go to font dialogue box then select another font.

Explanation:

You can choose another font by going to the dialogue box and choose a different font.

Answer 2
First you I would say type a word like Apple

Then use your cursor and highlight over it it should turn blue

Then go to the top and find font or it would say style

Then click whatever font you would like to change it to

There is fonts like Sans script, Times new Roman , Comic Sans, Arial etc…

Related Questions

How does augmented reality relate to the Unity platform? What concept/skill that you have learned thus far in Unity is similar to or could be useful when creating an augmented reality experience?

Answers

Answer:

augmented reality games are often made in unity

Explanation:

Answer: You have to provide the monocules for the yowvalid

Explanation: just got this

Question 2 of 10 When a business is using methods that help it use its time and resources the best they can, what are they exercising? O A. Data analysis OB. Efficiency O C. Cost-benefit analysis OD. Sales tracking SUBMIT​

Answers

Answer:

B. Efficiency

Explanation:

Complete the following tasks in order on the Bench:
1. Add a cable modem with a firewall to
the workspace.
o Connect the power to the surge protector or wall outlet.
Connect the cable modem to the wall outlet.
2. Add an Ethernet router with 4 LAN ports and no firewall to the workspace.

Connect the power to the surge protector or wall outlet.
Connect the router to the cable modem using the WAN ports.
3. Connect Home-PC and Home-PC2 to the Ethernet router.
4. Open Internet and Network Settings on both computers and verify they are
connected to the internet. Do not just view the network icon status.

Answers

The different steps to Complete the tasks in order on the Bench is given below

1. The workspace should have a cable modem with a firewall.

2. Connect the power to the wall outlet or surge protector.

3. The cable modem should be connected to a wall outlet.

4. The workspace should include an Ethernet router with 4 LAN ports and no firewall.

5. Connect the power to the wall outlet or surge protector.

6. Utilizing the WAN ports, join the router to the cable modem.

7. Connect Home-PC and Home-PC2 to the Ethernet router

8. Open the Internet and Network settings on both computers and verify they are connected to the internet (do not just view the network icon status).

What are firewalls on cable modems?

The thing between your home network and the Internet, a firewall adds an additional degree of security. Since a router serves as a home network's primary conduit to the Internet, it also serves as a firewall. For privacy protection, a firewall should be installed on every home network.

Therefore, your local network is safeguarded by the firewall on your modem/router. Even though both are necessary and crucial, they are not nearly enough to safeguard you; you also require a number of additional protective variables.

Learn more about Lab task from

https://brainly.com/question/21938411


#SPJ1

Which of the following terms is the encrypted form of a message that is unreadable except to its intended recipient?
a. plain text
b. encryption algorithm
c. ciphertext
d. steganography

Answers

c)Ciphertext is the encrypted form of a message that is unreadable except to its intended recipient.

What is encryption?

Encoding data is the process of encryption in cryptography. This technique transforms the information's initial plaintext representation into an alternate version known as ciphertext. Only parties with the proper authorization should be able to convert ciphertext to plaintext and gain access to the original data. Although encryption does not by itself stop interference, it does hinder a potential interceptor from understanding the material.

An encryption technique typically employs a pseudo-random encryption key produced by an algorithm for technical reasons. Without the key, it is feasible to decrypt the message, but doing so requires a lot of computer power and expertise for a well-designed encryption scheme. With the key provided by the sender to recipients but not to unauthorized users, an authorized recipient can quickly decrypt the communication.

To know more about encryption visit:

https://brainly.com/question/29351801

#SPJ1

the alignment group on the layout tab in powerpoint includes features that allow you to change which of the following? select all that apply.

Answers

Choose the slide for which you wish to alter the arrangement. Click on Home > Layout. Decide the layout you like. The layouts have spaces where text, movies, images, charts, shapes, clip art, a background, and other elements can be placed.

What alignment group the layout tab in PowerPoint includes?

On slide layouts, placeholders are the dotted-line containers that contain the titles, body text, tables, charts, Smart Art visuals, photos, clip art, movies, and sounds, among other contents.

Therefore, All the content that appears on a slide is formatted, positioned, and placed in placeholder boxes using slide layouts.

Learn more about PowerPoint here:

https://brainly.com/question/17215825

#SPJ1

Forms structure data input to help ensure data ___ meaning the information entered is accurate, timely, and useful.

Answers

Forms structure data input to help ensure data integrity meaning the information entered is accurate, timely, and useful.

Which of the following database features suggests data integrity? A relational database that holds data in a tabular format that can be connected to and utilized in a variety of ways must have entity integrity.It refers to a set of processes that guarantee appropriate and reliable data use and storage.Two different types of restrictions can be applied to SQL Server tables to ensure data integrity: primary keys and foreign keys.Data integrity refers to the total consistency, completeness, and accuracy of data across its entire existence.When data is secure, processes are in place to ensure that it cannot be altered by an unauthorized person or program while it is in use, in transit, or while it is at rest.

To learn more about structure data refer

https://brainly.com/question/24268720

#SPJ4

For a given real-world problem like the one below, which algorithm will you use to solve it? How would you map the input information into the input required by the algorithm? What computational complexity the chosen algorithm has? Blizzard has come over the whole state, covering all highways with 40 inches of snow. To keep the distribution of food, roads between major cities need to be cleared, so that each major city can be reached from each other. But getting rid of the snow from a highway is expensive - $1000 per mile. You, member of the Emergency Services, need to devise a plan that keeps all major cities connected through cleared roads, with the cost of clearing as small as possible. You are given the list of distances (in miles) of direct connections (i.e. not going through any other major city) between the major cities. You have to do the math, and choose which of those connections should be cleared.

Answers

An algorithm is a written formula that is part of software that, when triggered, tells the tech what to do to solve a problem. Computer algorithms work with input and output.

What is an algorithm's most basic definition?

An algorithm is a method for doing calculations or locating issues. Algorithms function as a precise set of instructions that carry out preset tasks consecutively in either machine or development tools programs. Algorithms play a significant role in every role of information technology.

What kind of algorithm would that be?

The approach we use to answer a long division problem, the process of doing laundry, and the functioning of a search engine are all examples of common examples of an

Briefing:

Minimal Spanning Tree(MST):

We also called this as a minimum weight spanning tree. It is the subset of the edges of connected vertices.

What is a spanning tree?

A graph is a sub graph that contains all the vertices and is a tree. Graph might have many spanning trees.

   o---o

   |\ /|

   | X |

   |/ \|

   o---o

So the above graph has below spanning trees.

    o---o    o---o    o   o    o---o

    |   |    |        |   |        |

    |   |    |        |   |        |

    |   |    |        |   |        |

    o   o    o---o    o---o    o---o

   

    o---o    o   o    o   o    o   o

     \ /     |\ /      \ /      \ /|

      X      | X        X        X |

     / \     |/ \      / \      / \|

    o   o    o   o    o---o    o   o

   

    o   o    o---o    o   o    o---o

    |\  |       /     |  /|     \

    | \ |      /      | / |      \

    |  \|     /       |/  |       \

    o   o    o---o    o   o    o---o

   

    o---o    o   o    o   o    o---o

    |\       |  /      \  |       /|

    | \      | /        \ |      / |

    |  \     |/          \|     /  |

    o   o    o---o    o---o    o   o

So these are possible spanning trees from the given graph.

Now what is Minimum Spanning Tree?

Now take your graph you have weights or length are given in it.

The Weight of the whole trees is:  Sum of the weight of the edges.

Now, we have to find the minimum length spanning tree in the given graph.

To know more about algorithm visit:

https://brainly.com/question/22984934

#SPJ4

Among the multitude of ways technology is inculcating itself in culture and civilization, cite and discuss one such arena where technology will have impact. Speculate such changes and back them with past or current trends.

Answers

It altered how, where, and how people worked as well as how and how they lived is one of the way of technology.

What is technology?

Technology is defined as the process of applying scientific knowledge to improve the quality of human existence, or, as it is frequently referred to, to modify and manipulate the environment in which humans live. In essence, technology is used whenever we apply our scientific understanding to accomplish a certain goal.

Through the introduction of new weapons and counter-weapons, it altered the way conflicts were conducted. Numerous ways in which technology has altered civilization and history.

Thus, it altered how, where, and how people worked as well as how and how they lived is one of the way of technology.

To learn more about technology, refer to the link below:

https://brainly.com/question/9171028

#SPJ1

The National Science Foundation funded the creation of a new high-speed, cross-country network backbone called the ____.a.) MILNET b.) NSFnet c.) CampusNET d.) DoDNET

Answers

The correct answer is b.) NSFnet.

What was NSFnet?

The NSFnet was a high-speed, cross-country network backbone funded by the National Science Foundation (NSF) in the 1980s. It was created to connect research institutions and universities across the United States and was a key part of the early development of the internet.

The NSFnet played a crucial role in the development of the internet as we know it today.

It helped to popularize the use of the TCP/IP protocol, which is the foundation of modern internet communication, and it provided a platform for the growth and expansion of the internet beyond its initial research and academic roots.

The NSFnet was eventually succeeded by the more commercialized and advanced internet of today.

To Know More About Internet, Check Out

https://brainly.com/question/14823958

#SPJ1

T/F the purpose of both hardwired control units and microprogrammed control units is to raise a series of signals that carry out operations inside a computer system

Answers

Both hardwired control units as well as microprogrammed control units have the same objective: to generate a series of signals that execute commands inside a computer system.

The given statement is True.

What are a microprogrammed control unit and a hardwired control unit?

Logic circuits in the hardwired control unit produce the control signals required by the CPU. With the aid of microinstructions stored in the control memory, the microprogrammed control system generates the control signals.

What benefits do microprogrammed controls have over hardwired controls? What function does the operating system serve?

Microprogramming offers benefits. It is quite versatile (compared to hard-wiring). The instruction sets might be highly complex or very straightforward while still being quite effective. You can generate what you need if your hardware isn't providing it, such as a complex instruction set.

To know more about operating system visit:

https://brainly.com/question/6689423

#SPJ4

The origins of the IOT-based security breach at Target was related to which of the following dimensions of the IT/IOT converged security model?

Answers

Note that the origins of the IOT-based security breach at Target was related to the dimensions of the IT/IOT converged security model called "Identity Services".

What are identity services called?

Identity management, often known as identity and access management (IAM), is a framework for authenticating and authorizing user access to resources such as applications, data, systems, and cloud platforms.

One of the primary functions of identity management is to limit user access and maintain their digital identity by preventing data breaches, identity theft, and unauthorized access to critical organizational data.

IDaaS makes critical access management and identity verification capabilities available to almost any enterprise. These solutions are critical because they enable enterprises to incorporate security features into a variety of on-premises and cloud-based tools and applications.

Learn mroe about identity services:
https://brainly.com/question/29671361
#SPJ1

Write three functions, float getNum(), float add(float, float), void outSum(float); that asks user for two numbers, finds the sum of two numbers, and displays the sum repeatly in a main program until the user enter “0” for either one of the numbers. For example, in the main, user enter 2, 4, output sum is 6. Then, 3,7, sum is 10, then 8, 7, sum is 15. When user enter one 0, the repeating process stops.C++ language only. No points will be given if other languages are used.


********************************
I have already written some code but I do not know where I am going wrong.
#include
using namespace std;
float getNum (float& x, float& y);
float add (float& x, float& y, float& z);
void outSum (float& z);



int main ()
{

float NumberOne = 0;
float NumberTwo = 0;
float Total = 0;


float getNum[2] = (NumberOne)(NumberTwo);
float add (NumberOne, NumberTwo, Total);
void outSum (Total);





}




float getNum (float& x, float& y)

{
cout << "Enter number one " << endl;
cin >> x;
cout << "Enter number two " << endl;
cin >> y;




}


float add (float& x, float& y, float& z) {
z = x + y;

}

void outSum (float& z) {

cout << "The total is " << z << endl << endl;

}

Answers

Answer:

#include <iostream>

using namespace std;

float getNum()

{

   float num;

   cout << "Enter a number: ";

   cin >> num;

   return num;

}

float add(float num1, float num2)

{

   return num1 + num2;

}

void outSum(float sum)

{

   cout << "Sum is " << sum << endl;

}

int main()

{

   float num1, num2, sum;

   num1 = getNum();

   num2 = getNum();

   while (num1 != 0 && num2 != 0)

   {

       sum = add(num1, num2);

       outSum(sum);

       num1 = getNum();

       num2 = getNum();

   }

   return 0;

}

Answer:

#include <iostream>

float getNum()

{

 float num;

 std::cout << "Enter a number: ";

 std::cin >> num;

 return num;

}

float add(float num1, float num2)

{

 return num1 + num2;

}

void outSum(float sum)

{

 std::cout << "The sum of the two numbers is: " << sum << std::endl;

}

int main()

{

 float num1, num2, sum;

 while (true)

 {

   num1 = getNum();

   num2 = getNum();

   if (num1 == 0 || num2 == 0)

   {

     break;

   }

   sum = add(num1, num2);

   outSum(sum);

 }

 return 0;

}

a user contacts the service desk after they just finished attempting to upgrade their laptop to windows 10. the upgrade failed, and the user asks you to explain why. which of the following log files should you review to determine the cause of the upgrade failure? system log security log setup application log see all questions back skip question course content course content overview q

Answers

The log files should you review to determine the cause of the upgrade failure : Setup (Contains a record of the events generated during the Windows installation or upgrade process.)

What causes an update to fail?System files are essential to the smooth operation of your device. Your system files may have recently been Corrupt or damaged, which is why Windows Update failed.Components like graphic cards, network cards, and other devices that are not natively compatible with Windows 10 require drivers in order to function. Windows Update problems might result from outdated drivers that are connected to this problem.Insufficient disc space is a frequent source of mistakes. Visit Tips to free up disc space on your PC if you need assistance. You don't need to look for the exact fault to fix it; following the instructions in this guided walk-through should help with any Windows Update errors and other difficulties.

Learn more about upgrade failure refer to :

https://brainly.com/question/8967471

#SPJ4

1. If a stepper motor has a step size of 90 degree/step, how many steps it will take to complete 5 rotations?
a. 10
b. 15
c. 20
d. 25
2. ADMUX register is associated with
A. Analog to digital conversion
B. PWM operation
C. Digital to analog conversion
D. USART operation

3. Which of the following is an input device?
A. Servo Motor
B. Stepper Motor
C. DC Motor
D. Ultrasonic sensor

4. ATMega324 has 8 bit timers and 16 bit timers
A. 2 & 1
B. 182
C. 2 & 2
D. 0 and 1

6. ISR stands for
A. Internal Status Register
B. Interrupt Status Register
C. Interrupt Service Routine
D. Internal Service Register

Answers

Stepper motor will have 10 steps to complete 5 rotations. ADMUX register is associated with Analog to digital conversion. From the following Ultrasonic sensor is input device. ATMega324 has 2 8 bit timers and 1 16 bit timers. ISR stands for Interrupt Service Routine.

What is Admux used for?ADC Multiplexer Selection Register, or ADMUX This register is used to choose the analogue port channel to be utilised for conversion, the reference voltage source, and how the result should be saved.A continuously variable, or analog, signal is transformed into a multilevel digital signal through the electronic process of "analog-to-digital conversion" without changing the signal's fundamental information.For hardware configuration and analogue to digital conversion, the ADC makes use of the registers ADMUX, ADCSRA, ADCL, ADCH, ADCSRB, and DIDR0. A separate analogue supply voltage pin, designated AVCC, is required for ADC hardware in addition to register settings.There are specific levels or states in the analog-to-digital converter's output. Almost always, the number of states is a power of two, such as 2, 4, 8, 16, etc. Binary signals, which are the simplest digital signals, only have two states. Binary representations of all whole numbers consist of strings of ones and zeros.

To learn more about Analog to digital refer :

https://brainly.com/question/24750760

#SPJ4

Given two strings, find all palindromes that can be formed with the letters of each string, From those palindromes, select one from each set that, when combined and rearranged, produces the longest palindrome possible, If there are multiple palindromes of that length, choose the alphabetically smallest of them. Example s1 « babbc"s2 = ddefefq' all of the leters of the first string can make a palindrome the choises using letters are [abcba, bacab] all of the letters of the second string can make a palindrome the choices using all letters are [abcba, bacab]

Answers

Using the knowledge in computational language in python it is possible to write a code that Given two strings, find all palindromes that can be formed with the letters of each string

Writting the code:

def mergePalindromes(s1, s2):

   '''

   The function accepts the following parameters:

   1. STRING s1

   2. STRING s2

   

   The function return a STRING

   '''

   # count dictionary maintains the count of each character in s1 and s2

   count = {}

   # find count of each character in s1

   for c in s1:

       count[c] = count.get(c, 0) + 1

   # find count of each character in s1

   for c in s2:

       count[c] = count.get(c, 0) + 1

   ans = ''

   chars = count.keys() # all character in s1 and s2

   # sort the chars in ascending order

   chars = sorted(chars)

   # iterate over the chars

   for c in chars:

       # if count of character c is even

       if(count[c]%2 == 0):

           # add character c to ans half of the count[c] number of times

           ans += c * (count[c]//2)

           # sets count[c] to 0

           count[c] -= count[c]

       # if count of character c is odd

       else:

           # add character c to ans half of the count[c] - 1 number of times

           ans += c * ((count[c] - 1)//2)

           # sets count[c] to 1

           count[c] -= (count[c] - 1)

   middle_char = ''  # middle character of the ans

   for c in chars:

       # if count[c] is 1

       if(count[c]):

           # set middle character to c

           middle_char = c

           break

   # add  reverse of first half of the ans to ans to get palindrome

   ans = ans + middle_char + ans[::-1]

   # return ans

   return ans

See more about python at brainly.com/question/18502436

#SPJ1

A point in a plane can be represented by its two coordinates, x and y. Therefore we can represent a point in a plane as a structure having two fields. Write appropriate main function to handle the function described in the figure. (5 points for main0 10 points for the function required in the figure) After you have finished with this, change the structure declaration from type defined structure to tag defined structure and change your code to reflect this. (10 points) typedef struct int x; int y POINT: Write a function that accepts the structure representing a point and returns an integer (I, 2, 3, or 4) that indicates in which quadrant the point is located, as shown in Figure 12-33. l positive positive Il negative positive II negative negative positive negative

Answers

As a result, a point in a plane may be represented as a structure with two fields. The two coordinates x and y can be used to represent a point in a plane.

What is a structural illustration?

Load-bearing structures include things like houses, skeletons, anthills, beaver dams, and salt domes. Buildings and other buildings that are the result of construction make up the foundations of a human culture.

What is life's structure?

When life coaches use the word "structure," they typically mean the procedures we employ to establish a recurrent activity or process in our lives. Life structures like classes, rituals, and procedures all assist us in accomplishing our goals.

Briefing:

#include<stdio.h>

#include<stdlib.h>

typedef struct{

   int x;

   int y;

}POINT;

// return the quadrant in which the point lies

int getQuadrant(POINT);

int main()

{

   POINT q1, q2, q3, q4

   q1.x = 1;

   q1.y = 2;

   q2.x = -1;

   q2.y = 2;

   q3.x = -1;

   q3.y = -2;

   q4.x = 1;

   q4.y = -2;

   printf("Quadrant of (1, 2) : %d\n\n", getQuadrant(q1));

   printf("Quadrant of (-1, 2) : %d\n\n", getQuadrant(q2));

   printf("Quadrant of (-1, -2) : %d\n\n", getQuadrant(q3));

   printf("Quadrant of (1, -2) : %d", getQuadrant(q4));

   return 0;

}

// return the quadrant in which the point lies

int getQuadrant(POINT ob)

{

   // if the point lies in the first quadrant

   if(ob.x >= 0 && ob.y >= 0)

       return 1;

   // if the point lies in the second quadrant

   if(ob.x <= 0 && ob.y >= 0)

       return 2;

   // if the point lies in the third quadrant

   if(ob.x <= 0 && ob.y <= 0)

       return 3;

   // if the point lies in the fourth quadrant

  else

      return 4;

}

To know more about structure visit:

https://brainly.com/question/30000720

#SPJ4

An object in Access responds to an event, such as clicking on a command button, based on specified event properties.
a. TRUE
b. FALSE

Answers

Answer:

True

Explanation:

Which type of social media platform connects people based on their location?
A.
discussion forums
B.
video sharing
C.
social networking
D.
microblogging

Answers

Answer:

I would say A.

Explanation:

a technician is running a network above a dropped ceiling that is also used for ventilation. the cable must be twisted pair and must be capable of gigabit ethernet speeds. which of the following cables should the technician use?

Answers

A technician is managing a network above a ventilation- and dropped-ceiling system.

Twisted pair and gigabit capabilities on the cable are requirements. Vertical wiring or cabling are other names for the backbone wiring. It offers connectivity between entrance amenities, equipment rooms, and telecommunication rooms. Fiber optic cabling is immune to electromagnetic interference and enables for longer cable distances without the need for a repeater than other types of cabling. However, it is more expensive, and installation calls for specialised knowledge and tools. CMR cable should be used when extending cable across vertical shafts or risers between floors.

What is distribution frame?

An interconnection and termination method for communications and audiovisual cable systems is called a distribution frame. Typically,

distribution frames have parts.

To learn more about cabling from given link

brainly.com/question/14300574

#SPJ4

27.9% complete
Question
If a user's computer becomes infected with malware and used as part of a botnet, which of the following actions can be initiated by the attacker? (Select all that apply.)

Answers

Answer:

Establish a connection with a Command and Control server

Launch a mass-mail spam attack

Launch a Distributed Denial of Service (DDoS) attack

Explanation:

The computer that has been infected and become part of a botnet will need to establish network connection to the "Command and Control" server of the bot-net.  Then it might participate in whatever attack the control instructs.

The actions that can be initiated by the attacker are

Establish a connection with a Command and Control serverLaunch a mass-mail spam attackLaunch a Distributed Denial of Service (DDoS) attack.

What is malware?

Malware is a catch-all term for viruses, trojans, and other damaging computer programs that threat actors use to infect systems and networks and access sensitive data. Malware is software designed to obstruct a computer's regular operation.

The computer that has been infected and joined a botnet must create a network connection to the bot-"Command net's and Control" server. After that, it might take part in whichever attack the control orders.

Therefore, the correct options are:

Establish a connection with a Command and Control serverLaunch a mass-mail spam attackLaunch a Distributed Denial of Service (DDoS) attack.

To learn more about malware, refer to the link:

https://brainly.com/question/22185332

#SPJ2

The question is incomplete. Your most probably complete question is given below:

1. Launch a Distributed Denial of Service (DDoS) attacks

2. Establish a connection with a Command and Control server

3. Launch a mass-mail spam attack

4. Launch a tailgating attack

An airplane can travel 395 mph in still air. If it travels 2160 miles with the wind in the same length of
time it travels 1790 miles against the wind, what is the speed of the wind?

Answers

Answer:

The speed of the wind is 355 mph.

Explanation:

The Contact entity has a LegalReports array. The LegalReportsLV List View displays the elements of the array.
Which two steps must be taken as part of the configuration to allow the user to add/remove rows to/from the LegalReportsLV?

Answers

These two steps must be taken as part of the configuration to allow the user to add/remove rows to/from the LegalReportsLV

1. Specify the Row Iterator widget's toRemove property

2. Specify the Iterator Buttons widget's toAdd property.

What is an array?

An array is a collection of elements, such as numbers, images, or physical objects, formatted into rows and columns according to their nature. An array, also referred to as a database system, is a group of things, or data, that are stored together in one or more contiguous memory locations.

Multiple data items of the same type should be stored together in an array. The commutative property of multiplication, which shows that you can shuffle the factors or elements and the result of the shuffle remains the same, can be demonstrated mathematically using an array.

By assigning an offset to every value in an array, you can use computer programming to find and identify where you stored each piece of information, or element.

Learn more about array

https://brainly.com/question/28565733

#SPJ4

Identify at least two ways computers are used in daily life and share one pro and one con for each

Answers

Answer:

There are many ways in which computers are used in daily life. Here are two examples, along with a pro and a con for each:

Personal computers:

Pro: Personal computers allow individuals to perform a wide range of tasks, including word processing, internet browsing, and online communication. They are also an essential tool for education and work.

Con: Personal computers can be expensive to purchase and maintain. They may also be vulnerable to viruses and other types of malware if not properly protected.

Mobile devices:

Pro: Mobile devices, such as smartphones and tablets, allow people to stay connected and access information and services on the go. They can also be used to make phone calls, send text messages, and take photos.

Con: Mobile devices can be addictive and may distract people from their surroundings, leading to problems such as decreased productivity and increased risk of accidents. They may also pose a security risk if lost or stolen, as they often contain sensitive personal information.

Two ways computers are used in daily life are: Online shopping and social media.

What is social media?

Social media refers to online platforms and websites that allow users to create, share, and exchange content and information with others.

Two ways computers are used in daily life are:

Online shopping:Pro: Online shopping offers convenience, as you can shop from the comfort of your own home and have items delivered directly to you. It also provides access to a wider variety of products than physical stores might offer.Con: Online shopping can be addictive and lead to overspending. It also has the potential to expose personal and financial information to security risks.

Social media:Pro: Social media platforms provide a way to connect with friends and family, meet new people, and share information and experiences. They can also be useful for promoting businesses or social causes.Con: Social media can contribute to anxiety, depression, and other mental health issues. It can also be a source of misinformation and cyberbullying, and it can be a time-waster if not used mindfully.

Thus, these are the uses of computer in everyday life.

For more details regarding social media, visit:

https://brainly.com/question/30326484

#SPJ2

evaluate the expressions
30 div 2 ,30 mod 2

Answers

Answer:

30 div 2 = 15, 30 mod 2 = 0

Explanation:

30 div 2 is equivalent to 30 divided by 2, which is just 15

30 mod 2 is equivalent to "the remainder of" 30 divided by 2, which is 0 because there is no remainder.

how does radio broadcasting system work​

Answers

Answer:

Explanation:

Radio works by transmitting and receiving electromagnetic waves. The radio signal is an electronic current moving back and forth very quickly. A transmitter radiates this field outward via an antenna; a receiver then picks up the field and translates it to the sounds heard through the radio.

The time() function returns the current time measured in the number of seconds since January 1 of the current year.
a. true
b. false

Answers

The time() function returns the current time measured in the number of seconds since January 1 of the current year. It is a false statement.

The time() function returns the current time in the number of seconds since the Unix epoch i.e. January 1, 1970, 00:00:00 GMT. It means that the time()  function returns the number of seconds passed since the epoch. For the Unix system, January 1, 1970, 00:00:00 at UTC is epoch - refers to the point where time begins.

Thus, the given statement is false because it states as the time() function returns the current time calculated in the number of seconds since January 1 of the current year.

You can learn more about Unix epoch at

https://brainly.com/question/24838853

#SPJ4


4. Return the card number, first name, last name, and average late fee of each customer. Name this column as "Fee".
5. Return the authors whose first names are shorter than all last names.
6. Return the first 10 borrowing which late fee is unknown.

How do I write these using Oracle SQL sub selects?

Answers

Answer:

To write these queries using Oracle SQL sub selects, the following syntax can be used:

1. Return the card number, first name, last name, and average late fee of each customer. Name this column as "Fee".

SELECT card_number, first_name, last_name, AVG(late_fee) AS "Fee"

FROM customers

GROUP BY card_number, first_name, last_name;

2. Return the authors whose first names are shorter than all last names.

SELECT *

FROM authors

WHERE LENGTH(first_name) < ALL (SELECT LENGTH(last_name) FROM authors);

3. Return the first 10 borrowing which late fee is unknown.

SELECT *

FROM borrowings

WHERE late_fee IS NULL

AND ROWNUM <= 10;

Explanation:

In these queries, sub selects are used to select specific data from a table and use it in the main query. For example, in the second query, a sub select is used to select the length of all last names from the authors table, and this data is then used in the main query to filter the authors whose first names are shorter than all last names. In the third query, a sub select is used to filter the borrowings with unknown late fees, and the main query is used to limit the result to the first 10 rows.

the fit to slide button on the taskbar changes the size of the slide in normal view so that the slide fits in the window.

Answers

When clicked, the Fit to Slide button automatically adjusts the zoom level of the slide so that it fits in the window. This allows the user to quickly adjust the size of the slide on the fly, without having to manually adjust the zoom level.

Adjusting Slide Size with the Fit to Slide Button

The Fit to Slide button on the taskbar is a useful tool for quickly adjusting the size of a slide in normal view. With a single click, the zoom level of the slide is automatically adjusted so that it fits within the window. This allows the user to quickly adjust the size of the slide without having to manually adjust the zoom level. This is especially useful for presentations with multiple slides of varying sizes, as it allows the user to quickly adjust the size of each slide to ensure they all fit within the window.

Learn more about programming: https://brainly.com/question/16397886

#SPJ4

Write a program that will calculate the areas of a circle, a square, and a rectangle depending on the user's input.

(use functions and switch statement).

Answers

Answer:

Explanation:

this is the image I did it somewhere else so i took a photo then put it here.

Which word in the following sentence is an appositive?
My older brother, Paolo, is the owner of a computer company.
a. brother
b. Paolo
c. owner
d. company

Answers

The answer is B. Paolo.
Other Questions
Which arrangement of the following four enzymes represents the order in which they would be used in a typical gene-cloning experiment resulting in the insertion of a cDNA into a bacterial plasmid? Begin with the gene's mRNA transcript. (eText Concept 20.1)reverse transcriptase, DNA polymerase, restriction enzyme, DNA ligase Who requires hospitals to make all medications patient-dose specific? Recommerce is a new trend that shows that many consumers want to squeeze more value out of their possessions by selling or trading them. Which of the following is NOT a type of recommerce?showrooming Several factors contribute to the movements of real GDP over time. With reference to the business cycle, investigate the impact that technological improvements might have on the economy. Consider the regularity, significance, and duration of these impacts. The voyages of Zheng He were discontinued because Chinese officialsthought theyled to harmful foreign influenceencouraged immigrationmade merchants too powerful.wasted valuable resources. what is the percent yield if 200 g of a product is produced during a reaction that has the potential of producing 250 g? At a coffee shop, the first 100 customers' orders were as follows. Small Medium Large Hot un 48 22 Cold 8 12 5 What is the probability that a customer ordered a medium given that he or she ordered a hot drink? Rounded to the nearest percent, [? ]% Enter What is the approximate date(s) that potatoes spread either to the West or East through the Columbian Exchange? Find the slope and y- intercept of the line -x + y = -10 Data obtained from outside sources, when combined with a firm's proprietary internal data assets, can give the firm a competitive edge. a. Trueb. False Researchers who utilize an intersectional approach to studying gender find that gender inequality is the same for all women,irrespective of other inequalities like race, disability status, or sexual orientation.True or False Ahmed is planning to cook his family dinner and needs to purchase several food items. He is able to purchase these items either at the local grocery store or the farmer's market. Given in the table are the items and their prices.Grocery Store Farmer's Market8 tomatoes for $14 10 tomatoes for $16.504 cups of mozzarella cheese for $4.40 3 cups of mozzarella cheese for $3.4512 eggs for $2.40 7 eggs for $1.75Part A: Choose one of the food items offered at the grocery store and the farmer's market and determine the unit price of the item at each location. Show all necessary work, including the name of the item chosen. (6 points)Part B: Based on your answer in part A, which location offers a better deal? Explain. (4 points) In a multiplant setting, where (Q1) is output from plant 1, and (Q2) is output from plant 2, profits are maximized whereMC1(Q1) = MC2(Q2) Were the poor or the rich more likely to be Muslim in Mali? Explain your answer. The right answer gets 25 points The non-linearity of the logistic regression is obtained because of the use of a non-linear activation function. O True O False rank the following ionic compounds based on increasing lattice energy. mgo, cacl2, nacl, nabr 2) Solve for m: 2.6m = 8.06 noah thinks of himself as shy, so he does not want to bother with even trying to network because he does not like interacting with lots of people. he reassures himself that jobs are always earned through hard work and a good resume. is there anything wrong with noah's approach (which choice is the best answer)? Impulses transmitted through the direct, pyramidal or corticospinal pathway, pass directly from upper to lower motor neurons (no __________ involved) and are responsible for __________ control of skeletal muscles.interneurons, conscious Respond to both questions in your answer.Name two conditions of the Treaty of Versailles.Were they too harsh on Germany?How did these conditions lead to another world war?Why did counties like Russia and Germany feel resentment?Respond in at least one - two sentences for each question.You may choose to start your answer with:The conditions were too harsh on Germany because.....These conditions lead to another world war because......