I don't even understand what I'm supposed to do.

Assignment/ Question
Alex is the new office manager at a small advertising firm. One responsibility is to manage the technology being used by the employees. However, it turns out that they have been using outdated software and could use some upgrades! Before launching a campaign to modernize the office software, Alex needs to know exactly what kinds of software to recommend, so a survey will be distributed to find out what common file types the employees use. Please help by explaining what a file type is, what the different kinds are, and what each one does best. Write a paragraph of at least five sentences that Alex can include at the top of the survey.
Alex collects the survey sheets and combines the results. Now your expertise is needed! Please fill out the file content that matches the file type, as well as recommending a particular piece of software.

I Don't Even Understand What I'm Supposed To Do.Assignment/ Question Alex Is The New Office Manager At

Answers

Answer 1

Answer:

i tried but i can figure it out

Answer 2

Answer:

You have to fill into the table what the file type and recommendations are (for example, .xls is a spreadsheet and Excel is the software is the recommendation).  Hope that helps a bit!

Explanation:


Related Questions

What are the advantages of a watchtower?

Answers

Answer:

Usually used in securing flanks of other burning types.

Allows fast area ignition.

Crew coordination important.

Use in light to medium fuels.

Knowledge of fire behavior very important.

Explanation:

good luck

please mark me as brainlist

A ______ is a portable device for recording audio and video.
a. recorder
b. video
c. television
d. camcorder

Answers

Answer:

D

Explanation:

A camcorder is a portable device for recording audio and video. Thus, option D is correct.

What is video?

A video is a recording of a motion, or television program for playing through a television. A camcorder is a device or gadget that is used to record a video. audio is the sounds that we hear and mix media is a tool used to edit the video.

Digital camcorders are known to have a better resolution. The recorded video in this type of camcorder can be reproduced, unlike using an analog which losing image or audio quality can happen when making a copy. Despite the differences between digital and analog camcorders, both are portable, and are used for capturing and recording videos.

A camcorder is a self-contained portable electronic device with video and recording as its primary function. A camcorder is specially equipped with an articulating screen mounted on the left side, a belt to facilitate holding on the right side, hot-swappable battery facing towards the user, hot-swappable recording media, and an internally contained quiet optical zoom lens.

Therefore, A camcorder is a portable device for recording audio and video. Thus, option D is correct.

Learn more about recording audio on:

https://brainly.com/question/27861365

#SPJ5

Free computer games and free screen saver programs are typical carriers of _______.

A. DoS

B. worms

C. viruses

D. Trojan horses

Answers

Free computer games and free screen saver programs are typical carriers of Trojan horses. Therefore, the correct answer option is: D. Trojan horses.

What is a malware?

A malware is any type of software program such as a game or screen saver, that is designed and developed to be intentionally harmful to a host computer, website, server, or network, especially for the purpose of wreaking havoc, disruption, and destruction such as a Trojan horse.

In Computer technology, some examples of a malware include the following:

WormsRootkitRATAdwareTrojan horseSpywareZombiesViruses

In conclusion, a Trojan horse simply refers to a type of malware that has the ability to perform undocumented actions which are completely unapproved by an end user of the device and they are commonly found in free software such as computer games and free screen saver programs.

Read more on malware here: brainly.com/question/28260161

#SPJ1

Joshua needs to store all of his music (over 2 GB), his movies (4GB), and his pictures (1GB). He wants to be able to access his media wherever he goes. He needs a cheap storage solution. Which type of storage would be best for Joshua?

Joshua needs to store all of his music (over 2 GB), his movies (4GB), and his pictures (1GB). He wants

Answers

Answer:Cloud storage

Explanation:I think that the cloud storage would be his best choice, because there are free cloud storages for use and all you need is access to the internet to upload or download files from them.

...............is a personal computer that fits on desk.​

Answers

Answer:

desktop computer

Explanation:

imagine there are 100 miners in the bitcoin network, each of whom is capable of calculating 1024 hashes per minute. in order for the network block rate to be 1 block per 10 minutes, how many hexadecimal zeros must we require for our difficulty level?

Answers

The required number of hexadecimal zeros for the difficulty level is 7 (i.e., 4,248,294 in hexadecimal is equivalent to 7 leading zeros).

The bitcoin network uses a system called proof-of-work to secure its transactions and maintain the blockchain. Miners compete to solve complex mathematical problems by performing millions of calculations per second.

The difficulty level of the mathematical problem is adjusted by the network every 2016 blocks, or approximately every 2 weeks, to ensure that blocks are solved at a consistent rate of 1 block per 10 minutes.

To calculate the required number of hexadecimal zeros for the difficulty level, we need to use the formula:

Difficulty = (\(2^256 / Target\))

where Difficulty is the current difficulty level, \(2^256\) is the total number of possible hash values, and Target is the target hash value required for a block to be considered valid.

Since we want the block rate to be 1 block per 10 minutes, and there are 100 miners each capable of calculating 1024 hashes per minute, the total number of hashes per minute for the network is:

100 x 1024 = 102,400 hashes per minute

And the target hash value required for a block to be considered valid is:

10 minutes x 60 seconds x 102,400 hashes per minute = 61,440,000 hash values

So, the required number of hexadecimal zeros for the difficulty level can be calculated as:

Target = \(2^256 / Difficulty\)

Difficulty =\(2^256 / Target\)

Difficulty = \(2^256 / 61,440,000\)

Difficulty = \(4,248,294\)

Learn more about the network block rate:

https://brainly.com/question/30132999

#SPJ11

________ operating systems are used to control and coordinate computers that are linked together. group of answer choices embedded stand-alone network real-time

Answers

Network operating systems are used to control and coordinate computers that are linked together.

Network operating systems are specifically designed to control and coordinate computers that are interconnected within a network.

These operating systems provide features and functionalities that facilitate sharing resources, such as files, printers, and applications, among multiple computers in the network.

Network operating systems also handle network communication protocols, security, user authentication, and centralized management of network resources.

Learn more about Operating system here:

https://brainly.com/question/33634948

#SPJ4

state how to transfee information from website to el processing document in computers and technology.​

Answers

Answer:

This is typically done either by downloading or by copying and pasting.

Explanation:

A(n) __________ is a user who has administrative responsibility for part or all of the database.

Answers

An administrator is a user who has administrative responsibility for part or all of the database.

An administrator is responsible for performing all the administrative tasks, including directing and performing all the activities related to maintaining a thriving database environment.

A database administrator also ensures that the organization’s databases and related applications work efficiently and functionally.

A database administrator should also ensure that data is readily available and protected from loss and corruption.

The administrator should additionally monitor the movement of data in the database.

The database administrator also ensures consistency, quality, and security of data in the database.

Therefore, a database administrator plays a significant role in the functionality and efficiency of a database.

#SPJ4

three-tier architecture has the following three tiers: select one: a. presentation tier, control tier and data tier b. presentation tier, application tier and data tier c. application tier, control tier and data tier d. presentation tier, application tier and network tier

Answers

The three-tier architecture has option b. presentation tier, application tier, and data tier.

What is the three-tier architecture?

Presentation tie: This level is dependable for dealing with the client interaction and showing data to the client. It incorporates components such as web browsers, portable apps, or desktop applications that give the client interface.

Application level: This level contains the application rationale and preparing. It handles assignments such as information approval, commerce rules, and application workflows.

Learn more about three-tier architecture from

https://brainly.com/question/12627837

#SPJ4

Spoken poetry about physical fitness​

Answers

Why did I think that said spooky as if there’s a spooky poem about PE

Ariana has decided to allow some of her co-workers to use the personal photographs
that she took for their business website. Before doing this, however, what does she
need to obtain to grant them permission?
A. a sticker

B. the property value

C. watermark

D. a license

Answers

Answer: D. a license

Ariana needs a license in order to obtain to grant them permission. Thus, the correct option for this question is D.

What are Business websites?

Business websites may be defined as a space that significantly provides general information about the company or a direct platform for e-commerce.

It involves the collection of World Wide Web pages usually containing links to each other and made available online by an individual, company, or organization.

Before deciding to allow some of her co-workers to use their personal photographs, Ariana needs to obtain to grant them permission in the form of a license. This is because it captures the personal identity of co-workers.

Therefore, Ariana needs a license in order to obtain to grant them permission. Thus, the correct option for this question is D.

To learn more about Business websites, refer to the link:

https://brainly.com/question/23060064

#SPJ2

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

In a _error,solution is working but not giving required results

Answers

Answer:

it is a random error

Explanation:

I HOPE THAT THIS ANSWER HELPS YOU

How do you access the dark web? What are the negatives of doing this?

Answers

the dark web is illegal and therefore people can hack you, obtain your information (identity theft) etc.

Question 1 of 20
Which of the following is an example of intellectual property?
OA. Pages of a book
OB. Journal of ideas
C. Lines of a poem
OD. New version of a novel
SUBMIT

Answers

Answer:

C

Explanation:

Answer:

C. Lines of a poem

Explanation:

Figured out the hard way

If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?

Assignee
Client
Delegate
Manager

Answers

Answer:

assignee

Explanation:

post the solve
Q.1 Write all the MATLAB command and show the results from the MATLAB program Solve the following systems of linear equations using matrices. 2y = 8z = 8 and -4x + 5y +9z = -9. x-2y+z=0,

Answers

The solution for the given system of linear equations is x= 3, y = -1, and z = 2.

As the given system of linear equations can be represented in matrix form as:

| 0 2 8 | | y | | 8 |

| -4 5 9 | x | y | = |-9 |

| 1 -2 1 | | z | | 0 |

MATLAB commands to solve the system of linear equations are:

1. Define the coefficient matrix and constant matrix:

>> A = [0 2 8; -4 5 9; 1 -2 1];

>> B = [8; -9; 0];

2. Solve for the variables using the command ‘\’ or ‘inv’:

>> X = A\B % using ‘\’ operator

X =

3.0000

-1.0000

2.0000

>> X = inv(A)*B % using ‘inv’ function

X =

3.0000

-1.0000

2.0000

Hence, the solution for the given system of linear equations is:

x = 3, y = -1, and z = 2.

Learn more about MATLAB: https://brainly.com/question/30641998

#SPJ11

Why is my phone not notifying me when i get text messages?.

Answers

Because your bad, you should feel bad, and your phone knows it

If you could represent yourself with a single object, what would that object be and why?

Answers

Answer:

If I could represent myself with a single object, it would be my human hoodie. The reason I would do that is to show and tell everyone that I am human, no matter my sexuality, race, or ethnicity. I love who I want, I can be whoever I want and I don't want nor need anyone else's opinion or saying in what I do. I am my own person, I don't need anyone else's help with being myself. I can do a fine job of it by myself.

Explanation:

The lines that can be formatted to display on the edges of cells are called _______.

style lines
edge lines
borders
underlines

Answers

Answer:

borders

Explanation:

Borders can be formatted in cells of excel or goog.le sheets. You can change width, shape, color, and whole plethora of things!

The lines that can be formatted to display on the edges of cells are called _______.style linesedge linesbordersunderlines

The lines that can be formatted to display on the edges of cells are called \(\boxed{ borders . }\)

a. style lines

b. edge lines

c. borders

d. underlines

\(\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}\)








points) Convert the following 6-bit two's complement numbers to integers.

Answers

Given 6-bit two's complement numbers need to be converted into integers.Explanation:Two's complement representation is a method used in computing and mathematics to represent negative integers. In this method, a negative number is represented by the two's complement of its positive counterpart. In the two's complement notation, the most significant bit (leftmost bit) is used to represent the sign of the number.

Let's convert the given two's complement numbers into integers by following the below formula: If the leftmost bit is 0, then the number is positive, so simply convert the binary to decimal. If the leftmost bit is 1, the number is negative. In this case, invert the digits (change all 0s to 1s and vice versa), convert the binary number to decimal, and then add a negative sign to the result.Now, let's convert the given two's complement numbers into integers:011011 → The leftmost bit is 0. Therefore, the given 6-bit number is positive. So we can convert it to decimal as follows:

011011₂ = 1 x 2⁵ + 1 x 2³ + 1 x 2¹ + 1 x 2⁰= 32 + 8 + 2 + 1= 43Therefore 43.101110 → The leftmost bit is 1. Therefore, the given 6-bit number is negative. So we can convert it to decimal as follows:Step 1: Invert the bits: 101110 → 010001Step 2: Convert the binary number to decimal:010001₂ = 1 x 2⁵ + 1 x 2⁰= 32 + 1= 33Step 3: Add a negative sign to the result:-33Therefore, the main answer is -33.101011 → The leftmost bit is 1. Therefore, the given 6-bit number is negative. So we can convert it to decimal as follows:Step 1: Invert the bits: 101011 → 010100Step 2: Convert the binary number to decimal:010100₂ = 1 x 2⁴ + 1 x 2²= 16 + 4= 20Step 3: Add a negative sign to the result:-20Therefore, the main answer is -20.001110 → The leftmost bit is 0. Therefore, the given 6-bit number is positive. So we can convert it to decimal as follows:001110₂ = 1 x 2² + 1 x 2¹ + 1 x 2⁰= 4 + 2 + 1= 7Therefore

TO know more about that complement visit:

https://brainly.com/question/29697356

#SPJ11

select the entry that correctly uses mla style for in-text documentation. the student is providing in-text documentation for the following online source, which includes no page numbers:

Answers

The entry that correctly uses MLA (2016) style for in-text documentation is: that of Walker.

What is MLA in-text documentation?

MLA format is known to be one that tends to follows the author-page king or way of in-text citation.

Note that in this method, it implies  that the author's last name as well as the page number(s) from whence the quotation or paraphrase is said to be taken from is one that needs to or must appear in the text, and there is found also a complete reference that need to appear on your Works Cited page or reference.

Therefore, The entry that correctly uses MLA (2016) style for in-text documentation is: that of Walker in the image attached.

Learn more about MLA (2016) style  from

https://brainly.com/question/13959275

#SPJ1

Select the entry that correctly uses MLA (2016) style for in-text documentation.

The student is providing in-text documentation for the following online source, which includes no page numbers:

Walker, Rob. "Stuck on You." The New York Times Magazine, 3 June 2010, www.nytimes.com/2010/06/06/magazine/06fob-consumed-t.html. Accessed 9 June 2010.

select the entry that correctly uses mla style for in-text documentation. the student is providing in-text

Which statement describes lossless compression?
OA. It is a method that converts temporary files into permanent files
for greater storage capacity.
B. It is a technique that accesses memory addresses to retrieve data.
C. It is a method that results in the loss of all the original data in a
file.
D. It is a technique that allows all of a file's data to be restored from
compressed data.
its d

Answers

D. It is a technique that allows all of a file's data to be restored from

compressed data. Lossless compression shrinks the image without sacrificing any crucial information.

More about lossless compression

A type of data compression known as lossless compression enables flawless reconstruction of the original data from the compressed data with no information loss. Since most real-world data exhibits statistical redundancy, lossless compression is feasible.

By utilizing a sort of internal shorthand to denote redundant material, lossless compression "packs" data into a smaller file size. Depending on the type of information being compressed, lossless compression can reduce an initial file that is 1.5 MB to roughly half that size.

Learn more about lossless compression here:

https://brainly.com/question/17266589

#SPJ1

Ceejay needs to find a way to allow users to work from home using company owned laptops during a pandemic so that they are able to access resources on the intranet. Which of the following would be the best choice for him to implement?
a. RDP b. VPN c. VNC d. IP Spoofing

Answers

Since Ceejay needs to find a way to allow users to work from home using company owned laptops during a pandemic so that they are able to access resources on the intranet, the best choice for him to implement is: B. VPN.

What is a VPN?

In Computer technology, a VPN is an abbreviation for Virtual Private Network and it can be defined as a secured, encrypted and private web-based service that is typically used for accessing region-restricted and censored internet content from remote locations.

In this context, we can reasonably infer and logically deduce that Ceejay should implement a Virtual Private Network (VPN) connection in order to enable his company's employees (users) to access resources stored on the intranet.

Read more on VPN here: brainly.com/question/28945467

#SPJ1

what is the 'key exchange' problem in modern information security? encryption keys are too long. there are too many encryption keys to keep track of. two parties need to privately share the secret encryption key before communicating. the encryption key is too complicated to calculate.

Answers

The 'key exchange' problem in modern information security refers to the challenge faced by two parties who need to privately share a secret encryption key before communicating securely. Encryption is a method of converting data into an unreadable format, so that only authorized parties with the correct decryption key can access the information.

Key exchange is crucial for ensuring secure communication because it allows the involved parties to establish a shared secret key that can be used for encryption and decryption. However, exchanging keys securely can be a challenge, especially when communication is happening over an unsecured channel where eavesdroppers can intercept the messages.
One common solution to the key exchange problem is using asymmetric encryption algorithms, such as RSA or Elliptic Curve Cryptography (ECC), which involve the use of public and private key pairs. In this system, each party has a public key that can be shared openly and a private key that is kept secret. The sender encrypts the message with the recipient's public key, and the recipient decrypts it with their private key.
While asymmetric encryption provides a solution to the key exchange problem, it is generally slower than symmetric encryption methods, which use a single shared key for both encryption and decryption. To achieve the best of both worlds, many secure communication protocols combine both techniques, using asymmetric encryption to securely exchange a symmetric key that is then used for encrypting the actual data.

Learn more about key exchange here:

https://brainly.com/question/28707952

#SPJ11

Which of the following does not contribute to the increasing vulnerability of organizational information resources?
a. International organized crime taking over cybercrime b. Smaller, faster, cheaper computers and storage devices c. Additional management support d. Today's interconnected, interdependent, wirelessly networked business environment
e. Decreasing skills necessary to be a computer hacker

Answers

A statement which does not contribute to the increasing vulnerability of organizational information resources is: c. Additional management support.

What is information security?

Information security can be defined as a preventive practice which is typically used for the protection of an information system (IS) that make use, store, and transmit information, from potential attack, damage, theft by thieves, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

What is vulnerability?

Vulnerability is any form of weakness, flaw, or defect that is found in a computer system, website, network, or software application, which can be exploited by an attacker or a hacker, in order to gain an unauthorized access and privileges to sensitive user data and information that are stored in a computer system.

In Computer technology, increasing the skills that are necessary to be a computer hacker would most likely increase the vulnerability of all organizational information resources.

Read more on vulnerability here: brainly.com/question/17094626

#SPJ1

What does each row represent?
What distinguishes one record from another?
What should you choose as the primary key for
this table?

Answers

Answer:

I think this is your answer broski.

Explanation:

What does each row represent?What distinguishes one record from another?What should you choose as the

Answer:

a..c,,c

Explanation:

drop down on edge

what did Bakers wear (1) in the Portugal does (2) when was author was young ???

Please don't post invalid answer please..!!​


Anyone active here please give me answer of that question..!!

Answers

(i) The dress that the bakers used to wear in Portugal was; a a single-piece long frock that reached to their knees called ''Kabai''.

(ii) The dress that the bakers used to wear when the author was young was; shirts and trousers that were shorter than the ones of full length but longer than half-pants.

This question is from the title "Glimpses of India" which is a story about a baker from Goa that is related to the period/time when the Portuguese were ruling in Goa. The story is simply a chronicles of one of the bakers that was residing in a Goan village.

i) Now, according to his story, it was clear that the cloth that was synonymous with the bakers was a single piece frock that reached their knees and this dress was called "Kabai"

ii) When the author was young he reported that the dresses then among the bakers were shirts and trousers that were quite shorter than the ones of full length but longer than the half-pants.

Read more on glimpses of india at; https://brainly.com/question/9566788

list 4 functions of algorithm​ .ASAP,pls no Links!!! Thanks

Answers

Answer:

Simple recursive algorithms.

Backtracking algorithms.

Divide and conquer algorithms.

Dynamic programming algorithms.

Explanation:

Other Questions
help me with this please. classify the following triangle A.rightB.isoscelesC.equilateralD. abtuseE.acuteF.scalene What research idea best represents one that might deal with epigenetics?. Just wondering when can I message ppl? On this app like how many points are needed? identify the constant of proportionality (unit rate) from a verbal description of a proportional relationship when a patient has a myocardial infarction, the pumping efficiency of the heart is altered because? What is the perimeter and area of the photo below? And please show me how you did it. I need it for a school math group, and Im struggling. So please show work. Queen Isabella wanted Native Americans ______________. a to convert to Christianity b to move to Spain c to work on Spanish ships d to show the way to the Indies All the angles in the diagram are measured to the nearest degree.Work out the upper bound and lower bound of angle x. 1. What does death symbolize in art? W is less than or equal to 9 and greater than or equal to 1 a white dwarf has a mass of about 0.8 msun and the radius of about 6800 kilometers. calculate the average density of the white dwarf, in kilograms per cubic centimeter. No association means the y-values increase as the x-values decrease. *A.TrueB.False 1. What is Mars ? Explain your answer.What is Earth ? Explain your answer. . a bag contains four red jelly beans and 7 green jelly beans. what is the probability of randmly wuthdrawing 5 jellybeans such that at least 2 are red HELP ASP ILL GIVE WHOEVER IS RIGHT BRAINLEST AND MORE POINTS!! Susan make $12 per hour babysitting and $24 per hour as a lifeguard. Her goal is to make at least $420. Write an inequality, graph the solution, and list three possible solutions salaries and wages payable is credited for the gross earnings of the companys employees. true false Why do you think Lincoln makes so many references to the American Revolution Does genetic drift cause alleles to be lost? Which of the following is the MOST important reason to follow documentation conventions in your academic writing?Select one:a.Following documentation conventions helps you establish your credibility as a researcher and author.b.Following documentation conventions means that you disagree with the open-source movement.c.If you follow documentation conventions in your writing, you'll get a good grade.d.If you follow documentation conventions, you do not have to cite your sources.