The internal control being used here is the "software comparison of dates on vouchers and receiving reports," and it helps ensure the accuracy and completeness assertions related to the recorded transactions.
Internal controls are processes and systems implemented by organizations to help ensure the reliability and accuracy of financial reporting. Assertions are representations made by management about the accuracy and completeness of the financial statements.
In this specific scenario, the software compares the recording date on vouchers (documents that authorize payment) with the date on the underlying receiving report (document that confirms goods have been received). This internal control helps verify that transactions are recorded accurately (dates match) and completely (all necessary documents are present). By doing so, it supports the accuracy and completeness assertions related to the organization's financial transactions.
Learn more about Internal controls visit:
https://brainly.com/question/31428317
#SPJ11
Which characteristic is shared by all prime lenses?
A characteristic that is shared by all prime lenses is that by construction, it does not give the possibility of modifying the focal length from the same lens.
What are prime lenses?A prime lens has a fixed focal length, which means that it has only one focal length, that is, the angle of view is fixed.
Characteristics of prime lenses A prime lens does not allow to zoom in or out of the surrounding environment from the lens body.A prime lens can be classified according to their focal length, but what characterizes them all is that they only have a single focal length.Therefore, we can conclude that prime lenses are those that only have one focal length.
Learn more about prime lenses here: https://brainly.com/question/2548694
1.Explain what service is offered over an ISDN BRI circuit to the residential telephone subscriber.2.How many voice channels are available on one ISDN BRI circuit?3.Can an ISDN line carry data information along with voice information simultaneously? If yes at what bit per second rate is available for the data transmission?4.When commercial power is lost at the resident’s home the ISDN line continues to function. A. True B. False
Answer:
Following are the solution to the given points:
Explanation:
For point 1:
Integrated Communications Networks is a technology used to transmit digital signals using telephone lines cables over a local loop.
Due to its larger capacity, it's far faster than just a 's got. ISDN Basic Rate Service (BRI) offers a total bandwidth of 144 kpbs, which would be based on two B channels and a 16 Kbps D channel. As private and small company customers, however, it is adequate.
The BRI is split into two categories: a) in-house cable from the ISDN end to the NT (S/T reference or S-bus) and b) broadcast from the NT to a headquarter (U reference point).
It enables a full-duplex operating point.
This BRI section's maximum length is between 4 to 8 km.
You pay for the speed you utilize using an ask service. In all other words, the price cost of how long you remain connected was evaluated. One can also buy flat-rate usage plans because you can with the phone service.
Given the fact ISDN uses an existing Cat 3 cable, re-connection to a service is not necessary.
In regions in which no additional high-speed access to the internet is available, ISDN can be available.
For point 2:
In the BRI configuration, 2 Data (bearer) lines with 64 kbit/s are available. With voice and user information the B-channels have been used.
For point 3:
Yes, It offers concurrent voice & data communications with improved signaling capacity at 64 kb/s.
For point 4:
It is true.
to help ensure that an html document renders well in many different web browsers
Answer:
Doctype Declaration
Explanation:
In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.
Answer:
I think it is:
B. a doctype declarationExplanation:
Given the following class declarations: public class Base { public void methodOne() { System.out.print("A"); methodTwo(); } public void methodTwo ()
{ System.out.print("B"); } } public class Derived extends Base { public void method One() { super.methodOne(); System.out.print("C"); } public void methodTwo() { super.methodTwo(); System.out.print("D"); } } Assume that the following declaration appears in a client program: Base b = new Derived(); what is the result of the call b.method One();? A. A B. AB C. ABB D. ABCC E. ABC D
The result of the call b.methodOne() when Base b = new Derived(); is executed is D. The methodOne() in Derived class overrides the methodOne() in Base class and calls super.methodOne() which calls the methodOne() in the Base class. So, "A" is printed.
Then, the methodTwo() in Derived class is called which calls the methodTwo() in the Base class first, printing "B", and then prints "D" in the Derived class. Finally, "C" is printed in the methodOne() of the Derived class. Therefore, the output is "ABD" followed by "C". It is important to note that when we create an object of Derived class and assign it to a reference variable of type Base, we can only access the methods and variables that are defined in the Base class.
The result of the call b.methodOne(); in this scenario is E. ABCD. Let's break down the steps to understand why:
1. Base b = new Derived(); creates a new object 'b' of type Base, but its actual implementation is the Derived class.
2. When you call b.methodOne(), since the object 'b' is of the Derived class, it executes the methodOne() of the Derived class.
3. Inside methodOne() of the Derived class, the first statement is super.methodOne(); which calls the methodOne() of the Base class.
4. In the Base class's methodOne(), it first prints "A" using System.out.print("A");, and then calls methodTwo() of the Base class.
5. Inside methodTwo() of the Base class, it prints "B" using System.out.print("B");.
6. Execution returns to the Derived class's methodOne(), and now it prints "C" using System.out.print("C");.
7. Finally, it calls methodTwo() of the Derived class. Inside methodTwo() of the Derived class, it first calls super.methodTwo() which is the methodTwo() of the Base class, which prints "B" again.
8. Then, it prints "D" using System.out.print("D"); in the Derived class's methodTwo().
So, the output is "ABCD", which corresponds to option E.
Learn more about base at : brainly.com/question/485375
#SPJ11
Your company has decided that security is very important and wants to add a second security check that will identify its employees while they are logging in to their computers. What type of security do you recommend?
answer choices
Smart cards
Key fobs
Hardware tokens
Biometric locks
Based on the given scenario, the type of security that is most recommended for the company to add a second security check that will identify its employees while they are logging in to their computers is smart cards.
A smart card is a device that appears like a credit card with a computer chip embedded in it that can be used to securely store and exchange data. Smart cards are typically used to authenticate an individual or to verify their identity, allowing access to specific locations, services, or devices. Smart cards can be used for a variety of purposes, including payment processing, ID verification, and access control, among others.The implementation of smart cards in a security system would guarantee a higher degree of security, enabling users to use their smart card as an authentication method. Smart cards provide a secure and convenient way of accessing sensitive data while also ensuring the security of the data stored within them.
Learn more about smart cards: https://brainly.com/question/9635432
#SPJ11
PLEASE HELP!!!!!! ASAP
What are two ways to create forms in Base to search data?
Use a wizard, or use Design View.
Use a wizard, or use a report.
Use a report, or use Design View.
Use a report, or use a table.
Answer:
use a wizard or use a design view
Explanation:
i took the test
Answer: A
Explanation:
A. Who will use the database?
1. What pricing strategy is used by local electric
distributors/retailers in charging us monthly electric bills?
Local electric distributors/retailers are the ones that distribute and sell electricity to the consumers.
They need to have a pricing strategy to charge the consumers a fair price for their services. There are different pricing strategies used by these companies to charge the monthly electric bills.One of the most common pricing strategies used by local electric distributors/retailers is the Cost-plus pricing strategy. This strategy involves adding a markup to the total cost of providing the service. The markup is added to cover the expenses and generate a profit for the company. This pricing strategy is commonly used by regulated utilities as the markup is reviewed and approved by the regulatory commission.
The second pricing strategy is the value-based pricing strategy. This strategy involves charging the customers based on the value they receive from the service. For example, a customer who consumes more electricity will be charged more. This pricing strategy is common in competitive markets where different electric distributors/retailers are competing to win customers.The third pricing strategy is the demand-based pricing strategy. This strategy involves charging the customers based on the demand for electricity.
During peak hours, when the demand is high, the price of electricity is high. During off-peak hours, when the demand is low, the price of electricity is low. This pricing strategy is used to encourage the customers to use electricity during off-peak hours and reduce the load during peak hours.In conclusion, local electric distributors/retailers use different pricing strategies to charge the consumers monthly electric bills. The choice of pricing strategy depends on various factors such as the regulatory environment, market competition, and customer demand.
Learn more about customer :
https://brainly.com/question/13472502
#SPJ11
What is the correct way to create an inline frame with no border and scroll? Choose all that apply. Pick ONE OR MORE options
The way to create an inline frame with no border and scroll is to use the style attribute to set the border CSS property to 0 and the overflow CSS property to hidden, like so:
<iframe style="border: 0; overflow: hidden;" src="https://example.com" width="400" height="400"> </iframe>This will ensure that the frame has no border and is not scrollable. Additionally, you can use the HTML attribute scrolling="no" to prevent the frame from being scrollable, like so:
<iframe scrolling="no" src="https://example.com" width="400" height="400">
</iframe>
Learn more about inline frame
https://brainly.com/question/29534530
#SPJ11
Write a program to declare an integer array of size 10 and fill it with random numbers using the random number generator in the range 1 to 5. The program should then perform the following: . Print the values stored in the array Change each value in the array such that it equals to the value multiplied by its index. Print the modified array. You may use only pointerioffset notation when solving the programt Example run: The sales red the fa (& 7 4- 8 A hp 144 ( 9 Add text 1 Draw P
We declare an integer array 'arr' of size 10. We then use the 'srand' function to seed the random number generator with the current time to ensure different random numbers on each program run.
Here's a program in C that fulfills the requirements you mentioned:
#include <stdio.h>
#include <stdlib.h>
#include <time.h>
int main() {
int arr[10];
srand(time(NULL)); // Seed the random number generator
// Fill the array with random numbers between 1 and 5
for (int i = 0; i < 10; i++) {
arr[i] = rand() % 5 + 1;
}
// Print the original array
printf("Original Array: ");
for (int i = 0; i < 10; i++) {
printf("%d ", arr[i]);
}
printf("\n");
// Modify each value in the array by multiplying it with its index
for (int i = 0; i < 10; i++) {
arr[i] = arr[i] * i;
}
// Print the modified array
printf("Modified Array: ");
for (int i = 0; i < 10; i++) {
printf("%d ", arr[i]);
}
printf("\n");
return 0;
}
We fill the array with random numbers between 1 and 5 using the rand function. To limit the range, we use the modulo operator (%) to get the remainder when divided by 5 and add 1 to shift the range from 0-4 to 1-5.
We then print the original array using a for loop. After that, we modify each value in the array by multiplying it with its index. Finally, we print the modified array.
Each array element is accessed using pointer arithmetic notation, 'arr[i]', where 'i' represents the index of the element.
Upon running the program, you should see the original array printed first, followed by the modified array.
To know more about integer array
brainly.com/question/32893574
#SPJ11
Consider the following data regarding students' college GPAs and high school GPAs. The estimated regression equation is
Estimated College GPA=2.56+0.1582(High School GPA).Estimated College GPA=2.56+0.1582(High School GPA).
Compute the sum of squared errors (SSESSE) for the model. Round your answer to four decimal places.
GPAsCollege GPAHigh School GPA3.963.964.42
The sum of squared errors (SSE) for the model is 0.2639 (rounded to four decimal places).
To calculate the sum of squared errors (SSE) for the model, we need to use the following formula:
SSE = ∑(y - ŷ)²
where y is the actual value, and ŷ is the predicted value.
We are given the estimated regression equation as:
Estimated College GPA = 2.56 + 0.1582(High School GPA)
Using this equation, we can calculate the predicted college GPA for each high school GPA value in the table:
College GPA High School GPA
3.96 3.96
4.17 4.42
Now, we can calculate the sum of squared errors:
SSE = (3.96 - (2.56 + 0.1582(3.96)))² + (4.17 - (2.56 + 0.1582(4.42)))²
= 0.2639
Therefore, the sum of squared errors (SSE) for the model is 0.2639 (rounded to four decimal places).
Learn more about error here:
https://brainly.com/question/30524252?
#SPJ11
To compute the sum of squared errors (SSE) for the given model, we need to compare the estimated college GPAs obtained from the regression equation with the actual college GPAs provided in the data. The formula for SSE is given by:
SSE = Σ(yi - ŷi)2
where yi is the actual college GPA, ŷi is the estimated college GPA from the regression equation, and Σ is the summation over all the observations.
We can use the given regression equation to compute the estimated college GPAs for each observation:
Estimated College GPA = 2.56 + 0.1582(High School GPA)
For the first observation with High School GPA = 3.96, the estimated College GPA is:
Estimated College GPA = 2.56 + 0.1582(3.96) = 3.147392
Similarly, we can compute the estimated college GPAs for the other two observations:
For High School GPA = 3.96, Estimated College GPA = 3.147392
For High School GPA = 4.42, Estimated College GPA = 3.265424
Now we can compute the SSE by using the formula above:
SSE = (3.96 - 3.147392)2 + (3.96 - 3.265424)2 + (4.42 - 3.265424)2
= 0.5711856 + 0.4945218 + 2.7869269
= 3.8526343
Therefore, the sum of squared errors (SSE) for the given model is 3.8526 (rounded to four decimal places).
For such more question on equation
https://brainly.com/question/29174899
#SPJ11
does anyone have a pdf of the greatest by eddie van der meer????
Answer
aight' so im finding it but i have to asnwer before someone else so look in the comments for it.
Explanation:
Just wait i getting it rn
Stonewalling sends a(n) ______ message to the other person.a. assertive messageb. confirmingc. disagreeingd. disconfirminge. competing
A financing fee is computed by taking your annual percentage rate, or APR, the amount you owe, and the time period into account.
What is finance charge of credit card?The interest you'll pay on a loan is defined as a finance charge, and it's most commonly used in the context of credit card debt. A financing fee is computed by taking your annual percentage rate, or APR, the amount you owe, and the time period into account.
Given that,
Interest rate = 15.5%
Date: 1-3 (3 days)
Average daily balance = amount paid × day
= $200 × 3 = $600
Date: 4-20 (17 days)
Average daily balance = amount paid
= $300 × 17 = $5100
Date: 21-30 (10 days)
Average daily balance = amount paid × days
= $150 × 10 = $1500
So, total average daily balance for the month
= $(600+5100+1500)
= $7200
Now, the finance charge = $7200 × (15.5÷1
= $93.00
Therefore, A financing fee is computed by taking your annual percentage rate, or APR, the amount you owe, and the time period into account.
To know more about finance charge refer to,
brainly.com/question/22717601
#SPJ1
Identify way computer are used in television production
Answer:
image editing, text om screen, weather graphics, animation, sattelites ... a lot more possibilites are endless just limited
In early 2021 a social media company was de-hosted by a cloud service provider because the service provider believed the social media company promoted extreme points of view that were dangerous.Do you believe cloud service providers have the right to discriminate against customers because of their political beliefs or because of their customers' customer's political beliefs? Why or why not? Is there any danger in the precedence this type of censorship sets?
Cloud service providers are private entities and have the right to set their own terms and conditions for providing services to customers.
If the terms of service prohibit certain types of content or behavior, then the cloud service provider has the right to enforce those policies. However, cloud service providers should also be transparent about their policies and communicate them clearly to their customers.
Discriminating against customers based on their political beliefs or the beliefs of their customers may raise concerns about censorship and freedom of speech. It is important to ensure that any restrictions on speech are applied fairly and without bias.
Setting a precedence for this type of censorship could lead to a chilling effect on free expression and could be a concern for those who value freedom of speech. It is important to balance the need for free expression with the need to protect against harmful or dangerous content.
To know more about Cloud service, click here:
https://brainly.com/question/29531817
#SPJ11
what social conditions gave rise to the memphis lynching? view keyboard shortcuts edit view insert format tools table 12pt paragraph
The Memphis Lynching was a result of the deep racial tensions that had been escalating in the city since the end of the Civil War.
African Americans had been the victims of racial violence, economic exploitation, and political oppression since the end of the war. White supremacists had targeted African American political activists, labor organizers, and religious leaders, and had used tactics of intimidation and terror to ensure that African-Americans could not exercise their civil rights. The Memphis Lynching was a result of this hostile environment, as the alleged perpetrator of the murder, Ell Persons, had been accused without evidence and was subjected to an extra-judicial mob execution.
This event was an example of how the social conditions of the time had given rise to a culture of violence and fear, and how African Americans were denied basic civil rights.
You can learn more about racial tension at: brainly.com/question/8148930
#SPJ11
what will the following display to the console (don't run the code until you work it out by hand!) public class person {string name;public person(string name
Given the provided code snippet, here's an explanation of what it does, including the terms "display," "console," and ensuring conciseness in my response.
The code snippet you've shared is a part of a C# class called "Person" with a single property called "name" of the type "string". The class has a constructor that takes a string parameter named "name" and assigns it to the "name" property of the class. Currently, this code does not have any functionality to "display" anything to the "console" since it only defines a class structure. To display the "name" property to the console, you would need to create an instance of the "Person" class and then use the Console. WriteLine() method to print the "name" property to the console. For example, in the Main method of your program, you could write the following code to display the "name" property of a "Person" instance:
```csharp
public static void Main(string[] args)
{
Person person1 = new Person("John Doe");
Console.WriteLine(person1.name);
}
```
This code creates a new instance of the "Person" class called "person1" with the name "John Doe". Then, it uses Console. WriteLine() to display the "name" property of "person1" to the console, which will output "John Doe".
Learn more about code here:
https://brainly.com/question/29590561
#SPJ11
Given an undirected graph G=(V, E) and an edge e=(u, v) E E, design a O(|V+|El) time algorithm to determine whether there exists a cycle in G that contains e.
The algorithm determines the existence of a cycle in an undirected graph containing a given edge by removing the edge, performing DFS on the graph, and checking if the edge is encountered. Time complexity is O(|V| + |E|).
Given an undirected graph G=(V, E) and an edge e=(u, v) E E, let's see the algorithm to determine whether there exists a cycle in G that contains e or not. The algorithm is as follows:
Algorithm
Delete the edge e from graph G.Perform depth-first search (DFS) on the remaining graph G.If DFS encounters the edge e during the search, then a cycle containing the edge e exists in G, so return True.Otherwise, return False.To check whether there exists a cycle in G that contains e or not, we will remove the edge e from the graph G and then perform a depth-first search (DFS) on the remaining graph G. If DFS encounters the edge e during the search, then a cycle containing the edge e exists in G, so return True. Otherwise, return False.
The time complexity of this algorithm is O(|V| + |E|) because we perform DFS on the graph G and DFS takes O(|V| + |E|) time.
Learn more about algorithm : brainly.com/question/13800096
#SPJ11
Thinking carefully about a speaker's reasoning and purpose can help you _____ that speaker's message. In other words, you consider the message and decide whether it is believable.
Thinking carefully about a speaker's reasoning and purpose can help you comprehend (understand) that speaker's message. In other words, you consider the message and decide whether it is believable.
What do you think is the purpose of the speakers in their speech?Making sense of the world around us is referred to as reasoning. A communication must be evaluated during critical listening in order to be accepted or rejected. Critical listening can be practiced while listening to a sales pitch.
Speakers must provide proof to back up their claims in order to be convincing. Listeners who pay close attention are wary of assertions and generalizations. When the speaker is not regarded as an authority on the subject of the speech, strong evidence is especially crucial.
Therefore, When communicating, speakers aim to achieve both broad and detailed goals. There are two main goals for speaking in college and beyond: to inform or to persuade. There is no clear distinction between the two; many talks will combine elements of both.
Learn more about reasoning from
https://brainly.com/question/25175983
#SPJ1
What is web
searching engine ?
Explain the process of creating a switch statement to replace an if-then-else statement in Java.
Answer:
The answer to this question is given in the explanation section.
Explanation:
Let look at an if the else statement
if (condition1) {
//some code if condition 1 is true
} else if (condition2) {
// some code if condition 2 is true
} else {
// some code if condition 3 is true
}
No let look at switch statement
switch(expression) {
case x:
// code block
break;
case y:
// code block
break;
default:
// code block
Now let look at your answer.
if then else should be replaced with switch if conditions are fixed.
in the process of replacing
write your condition of if statement in the case area of swatch
Answer:
The answer to this question is given in the explanation section.
Explanation:
Let look at an if the else statement
if (condition1) {
//some code if condition 1 is true
} else if (condition2) {
// some code if condition 2 is true
} else {
// some code if condition 3 is true
}
No let look at switch statement
switch(expression) {
case x:
// code block
break;
case y:
// code block
break;
default:
// code block
Now let look at your answer.
if then else should be replaced with switch if conditions are fixed.
in the process of replacing
write your condition of if statement in the case area of swatch
In order for the "Detector" in the side-chain to react quicker, we must select ___________.
In order for the "Detector" in the side-chain to react quicker, we must select a faster attack time.
The detector in a compressor's side-chain is responsible for detecting changes in the input signal and triggering the gain reduction process. The attack time determines how quickly the detector reacts to changes in the input signal. A faster attack time means that the detector will react more quickly to changes in the input signal, resulting in a more aggressive compression effect. Slower attack times can be used to preserve the transient content of the signal.
Choosing the appropriate attack time for a given signal is an important part of achieving the desired compression effect.
You can learn more about input signal at
https://brainly.com/question/29520180
#SPJ11
What are the differences between online platforms sites and content?.
Websites offer one-way interaction, with visitors taking in whatever content is presented.
Platforms provide reciprocal engagement, with user interactions resulting in individualized experiences. Marketplaces, search engines, social media, blogs, app stores, communications services, payment systems, services included in the so-called "collaborative" or "gig" economy, and many more online services have all been referred to as "online platforms." A digital service known as an online platform makes use of the Internet to enable communications between two or more dissimilar but related users. Platforms are locations where electronic demand and supply collide.
Learn more about communication here-
https://brainly.com/question/14809617
#SPJ4
With the exception of the ____________________ operator and the member selection operator, operators must be overloaded to be used on class objects.
With the exception of the assignment operator and the member selection operator, operators must be overloaded to be used on class objects.
The two operators in C++ that do not need to be overloaded are the assignment operator (=) and the member selection operator (.). These operators are not overloaded because they can only be used with fundamental types in C++. The remaining operators must be overloaded to be used with class objects, such as the multiplication operator (*), the addition operator (+), and the subtraction operator (-).
This means that when you use these operators with objects of your class, you must define the operation's behavior. A class can overload a member function that provides an operator definition, allowing it to be used with objects of that class. When using an operator on a class object, the definition of that operator for that class will be used.
When an operator is overloaded for a class, the overloaded operator can be used with objects of that class in the same way that other operators can be used with objects of built-in types.
You can learn more about operator overloading at
https://brainly.com/question/29990215
#SPJ11
FILL IN THE BLANK. This type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms. ___
Spreadsheets software is a type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms.
Why do people use spreadsheets?One tool for storing, modifying, and analyzing data is a spreadsheet. A spreadsheet's data is arranged in a series of rows and columns, where it can be searched, sorted, calculated, and used in a number of charts and graphs.
Therefore, A program known as a spreadsheet, also referred to as a tabular form, is used to arrange data into rows and columns. This information can then be arranged, sorted, calculated (using formulas and functions), analyzed, or graphically represented to illustrate.
Learn more about Spreadsheets from
https://brainly.com/question/26919847
#SPJ1
Using AD FS terminology, the trusting company is referred to as which of the following choices? a. account partner b. resource partner c. relying party
In AD FS (Active Directory Federation Services) terminology, the trusting company is referred to as the "relying party."
AD FS is a Microsoft technology that allows for the authentication and authorization of users across different organizations. It enables the use of single sign-on (SSO) for accessing resources and applications between trusted entities.
In the context of AD FS, the trusting company is referred to as the "relying party." The relying party is an organization or service that relies on the identity provider (account partner) to authenticate and provide access to its resources. It trusts the identity provider to verify the identity of users and provide the necessary security tokens.
The relying party establishes a trust relationship with the identity provider, allowing it to accept and process authentication requests and assertions. This enables users from the account partner's organization to access resources and services within the relying party's environment without the need for separate authentication.
By referring to the trusting company as the "relying party," AD FS emphasizes its role in relying on the identity provider's authentication services to enable secure access to its resources.
Learn more about AD FS here:
https://brainly.com/question/29910420
#SPJ11
Select the one that uses the heading tag correctly.
a.
b.
c.
d.
Answer:
yes . where is option please check it
Initially licensed and used in NeXT software by Steve Jobs, then used later to code Mac OS X for Apple.
The term that is being referred here is "Objective-C". It was initially licensed and used in NeXT software by Steve Jobs, who co-founded the company after leaving Apple in the 1980s.
Objective-C was initially licensed and used in NeXT software by Steve Jobs.
Steve Jobs and his team developed Objective-C as an object-oriented programming language that could be used for building software applications. Later on, when Jobs returned to Apple in the late 1990s, Objective-C was used to code Mac OS X, which was a major overhaul of the company's flagship operating system. Today, Objective-C is still used by some developers, but it has largely been replaced by newer programming languages like Swift.
To learn more about Apple visit : https://brainly.com/question/28732063
#SPJ11
what career cluster allows you to act direct or produce
Answer:
finance analyst, treasurer, economist, bank worker, debt counselor or insurance professional.
Explanation:
Select the correct answer.
What is also known as a visual aid in a presentation?
OA. background
OB. animation
OC. review
OD. slide.
Answer: Slide
Explanation:
A visual aid is something which makes the viewer under the presentation without using the audio and it enhances the presentation. The photographs, graphs, charts are usually included in the slides to make people understand the presentation more clearly.
The slides includes the information in a written form and along with it are attached some photos, pie charts, et cetera.
So, even when the people are not listening to the presentation they can understand the presentation.
Where do you want to install?
It looks like you don't have any applicable device(s) linked to
your Microsoft account. To install, sign in on a device with
your Microsoft assount,
Get more info
How do I do this
This really depends on the thing you are trying to install, and the device you are trying to install it on.
try to find the app info and see what devices it is compatible with. make sure you are using a compatible device, and make sure you are signed in.