Answer: A. Microsoft Office
Explanation:
state two types of flowchart
Is MOOC's potentially harmful to copyright? Why or why not ?
Answer:
Fair-use exceptions to traditional copyright protection face challenges as well, given a MOOC's potential for global reach. Nonetheless, fair use and MOOCs are not mutually exclusive ideas. MOOCs remain an experiment...
hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.
What should Chris do?
telephone wires transfer data via analog signals that continuously change ________ on a wire.
Telephone wires transfer data via analog signals that continuously change voltage levels on a wire.
The loop’s two wires are used to transmit information in both directions simultaneously. Both the line card and the telephone create voltage analogs of sound across the two wires of the loop. The voltages from the devices at each end are therefore added.
An analog signal is a continuous signal that represents one quantity, that is, another quantity. For example, in an analog signal, the instantaneous signal voltage changes continuously with the pressure of the sound wave.
Conversely, digital signals represent time-varying value patterns, resulting in some bandwidth limitations and dynamic range limitations of the representation. The term analog signal usually refers to an electrical signal; however, anything, pneumatic, hydraulic and other systems can also transmit or be considered analog signals.
To learn more about analog signals:
brainly.com/question/29908104
#SPJ11
Sarah's research shows that business information management professionals also perform the duties of other professionals. Which other duties are performed by business information management professionals? Business information management professionals also perform duties of __________________ information systems professionals.
Answer:
Business information management professionals also perform duties of management information systems professionals
Explanation:
A career in business information requires a diploma or degree in business information management or business administration as well as being required to carry out the tasks of a management information systems (MIS) professional of which the knowledge required on data communications and computers can be obtained by completion of a certification or degree in MIS or an associate degree in information technology. In addition, a strategic management certification can further improve a career in business information management.
checking to determine whether the proper screener questions were invoked would be part of which step in the data analysis procedure? validation coding machine cleaning data checks and balances
Which step in the data analysis process-Validation-invokes a check to see if the appropriate screener questions were used.
What is data analysis process?Although numerous groups, organizations, and specialists approach data analysis in various ways, most of them may be boiled down into a general description.
Data analysis is the process of modifying, processing, and cleaning raw data in order to obtain useful, pertinent information that supports commercial decision-making.
The process offers helpful insights and statistics, frequently presented in charts, graphics, tables, and graphs, which lessen the risks associated with decision-making.
Every time we make a decision in our daily lives, we may observe a basic example of data analysis by assessing what has happened in the past or what will happen if we take that action.
In its simplest form, this process involves looking at the past or future and making a choice based on that analysis.
Hence, Which step in the data analysis process-Validation-invokes a check to see if the appropriate screener questions were used.
Learn more about data analysis process click here:
https://brainly.com/question/29376166
#SPJ4
When on the web, which precautions should you take to be safe and not get
scammed? Select the best answer.
A.Get in the habit of protecting your private information. You have a right toprivacy.
B.Don't ever randomly click on links or download anything.
C. Do not make friends with strangers on the web.
D. Slow down. Think. Do research.
E. All of the above.
Answer:
E) All of the above
Explanation:
All the options are absolutely necessary for web safety.
how many words is 4 pages double spaced times new roman 12
There are 1,000 word count double spaced in 4 pages. Documents that typically are 4 pages include college essays, operating manuals, and longer form blog posts. A standard single-spaced page has 500 words.
2000 words, single-spaced, or 1000 words, double-spaced, make up 4 pages. It will take approximately 7 minutes to read 4 pages. On average it will take approximately 50 minutes for the average writer typing on a keyboard at a typing speed of 40 words per minute. When utilising conventional 1-inch margins, 12 pt. Arial font, and an A4 (letter size) page size, a word count of 2,000 will result in approximately 4 pages with single spacing or 8 pages double-spaced.
However, the number of pages will vary depending on your margins, font family, font size, whether you use multiple spaces after a period, and your paragraph spacing settings. For example, 1 page single spaced created using Arial font will generate only 0.9 pages with Calibri or Times New Roman font.
To learn more about word count click here:
brainly.com/question/24043728
#SPJ4
How can i print an art triangle made up of asterisks using only one line of code. Using string concatenation (multiplication and addition and maybe parenthesis)?
#include <iostream>
int main(int argc, char* argv[]) {
//One line
std::cout << "\t\t*\t\t\n\t\t\b* *\t\t\b\n\t\t\b\b* *\t\t\b\b\n\t\t\b\b\b* *\t\t\b\b\b\n\t\t\b\b\b\b* *\t\t\b\b\b\b\n\t\t\b\b\b\b\b* * * * * *\t\t\b\b\b\b\b\n";
return 0;
}
Yes, it is possible with a single line and using escape sequences, but it is tedious and not recommended. Instead, you can use loops to write more readable and easy on the eyes code. We only used the cout method (C++). Good luck!
Chen needs to configure a filter on the current folder and would like to filter by the sender of a message. Which tab in the Filter
dialog box will he need to use to achieve this?
✓ Messages
More Choices
Advanced
SQL
Test answers: 1 is messages. 2 is msg. 3 is use the edit business card dialog box to control the information included. 4 is reviewer. 5 is select multiple calendars. 6 is chart. 7 is no automatic filtering. 8 is inside my organization tab. 9 is manage task.
Answer:
the correct answer is messages
Answer:
messages
Explanation:
I just did the assignment
why would you want to freeze rows in your spreadsheet? a to scroll through the spreadsheet while continuing to see the frozen cells b to modify only the frozen rows c to prevent the rows from being edited by collaborators d to limit the data that can be entered in the frozen row
You would want to freeze rows in your spreadsheet (a) to scroll through the spreadsheet while continuing to see the frozen cells.
"Why would you want to freeze rows in your spreadsheet?"If you're working on a massive spreadsheet with a lot of rows and columns, freezing rows and columns can be useful. When you freeze rows or columns, you may scroll through your spreadsheet without losing sight of your headers or other vital information at the top or side of the screen. When the Freeze Panes feature is activated, all rows above and columns to the left of the active cell are frozen in place.
For example, in a long spreadsheet, you may wish to keep the header row (row 1) visible while scrolling down to view other rows. You may accomplish this by freezing row 1. You may also freeze several rows by selecting the row just below the last row you wish to freeze before selecting Freeze Panes. Therefore option (a) is correct.
Know more about Freeze row here:
https://brainly.com/question/17194167
#SPJ11
northern trail outfitters is using one profile for all of its marketing users, providing read-only access to the campaign object. a few marketing users now require comprehensive edit access on campaigns. how should an administrator fulfil this request
Configure the login policy to demand that users log in using https://nto.my.salesforce.com.
A purposeful set of rules designed to direct behavior and produce logical results is called a policy. A policy is a declaration of intent that is carried out through a method or protocol. Typically, a governance board inside a company adopts policies. Both subjective and objective decision-making can benefit from policies. Policies used in subjective decision-making typically aid senior management with choices that must be based on the relative merits of a variety of aspects, and as a result, are frequently challenging to assess objectively. An example of a policy used in this manner is the work-life balance policy. In addition, governments and other institutions have policies in the form of laws, rules, guidelines, administrative procedures, rewards, and voluntary practices. Resources are frequently distributed in accordance with policy choices.
Here you can learn more about policy in the link brainly.com/question/28024313
#SPJ4
RAM that can be changed. True or False
Answer:
Yes, computer RAM can be changed, upgraded, etc. depending on whatever your motherboard supports.
Which code represents foot, abduction rotation bar, without shoes?
a. L3170
b. L3150
c. L3140
d. L3160
The code that represents "foot, abduction rotation bar, without shoes" is option a. L3170.
Among the provided options, the correct code for "foot, abduction rotation bar, without shoes" is L3170. The L codes are part of the Healthcare Common Procedure Coding System (HCPCS) used for describing durable medical equipment and supplies.
The code L3170 specifically refers to a foot abduction rotation bar without shoes. This type of device is commonly used in orthotics to help correct foot positioning and alignment. It provides support and stability for individuals with certain foot conditions or post-surgical needs.
It is important to note that accurate coding requires detailed knowledge of the specific item or service being provided and its corresponding code within the applicable coding system. Therefore, when assigning codes for medical devices or supplies, healthcare professionals and coders should refer to the relevant coding guidelines and documentation to ensure accurate and appropriate coding for reimbursement and tracking purposes.
In this case, for "foot, abduction rotation bar, without shoes," the correct code is L3170.
Learn more about HCPCS here:
https://brainly.com/question/32537696
#SPJ11
Parents can use this type of program to block access to selected Websites.
This kind of application can be used by parents to prevent access to particular websites. CSS. which of the following files can be added as controls to an HTML document.
How may parents ban access to particular websites using software?The greatest and most efficient website filter for families is called Net Nanny®. With the help of Net Nanny's website blocking software, you can protect your family's online experience and customize individual settings to block specific websites and categories of web content according to the requirements of each member of your family.
Do microblogs employ streaming software?The majority of microblog platforms offer streaming APIs to access their global data stream. These streaming APIs are used by software that serves as clients for user postings, events, and other information from the Microblog websites.
To know more about block access visit:-
https://brainly.com/question/24129952
#SPJ4
heat is released when select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a water freezes. b water evaporates. c ice melts. d all of these are correct. e none of these is correct.
When water freezes, latent energy from freezing and its equivalent are released into the environment. The release of energy is essential for the change in state to occur.
Latent heat is released into the environment when water freezes, but how?The latent heat of freezing is the energy that is lost. The latent heat of freezing energy was released as the water froze. Indeed, heat energy was being emitted. Once the temperature reached 32 degrees Fahrenheit, this heat energy stopped the temperature from dropping any further.
What is the name for the latent heat released by water molecules?The transformation of water vapor into a liquid is known as condensation. The 600 cal/gm of latent heat that was added during evaporation is removed from water molecules during the condensation process.
to know more about keyboard navigation here:
brainly.com/question/16860977
#SPJ1
When you import excel data, you create a link to the data in the access database. group of answer choices true false
Answer:
Explanation:
True
Which of the following statements is FALSE?
the value of the ID attribute....
a. may not start with a number
b. must be unique within each document
c. must not start with a special character
d. should be lowercase?
Answer:
d. Should be lower case?
You will need an Excel Spreadsheet set up for doing Quantity Take- offs and summary estimate
sheets for the remainder of this course. You will require workbooks for the following:
Excavation and Earthwork
Concrete
Metals
Rough Wood Framing
Exterior Finishes
Interior Finishes
Summary of Estimate
You are required to set up your workbooks and a standard QTO, which you will submit
assignments on for the rest of the course. The QTO should have roughly the same heading as
the sample I have provided, but please make your own. You can be creative, impress me with
your knowledge of Excel. I have had some very professional examples of student work in the
past.
NOTE: The data is just for reference, you do not need to fill the data in, just create a QTO.
Build the columns, and you can label them, however you will find that you will need to adjust
these for different materials we will quantify.
Here are some examples of what they should look like:
We can see here that in order to create Excel Spreadsheet set up for doing Quantity Take- offs and summary estimate, here is a guide:
Set up the spreadsheet structureIdentify the required columnsEnter the item details: In each sheet, start entering the item details for quantity take-offs. What is Excel Spreadsheet?An Excel spreadsheet is a digital file created using Microsoft Excel, which is a widely used spreadsheet application. It consists of a grid of cells organized into rows and columns, where users can input and manipulate data, perform calculations, create charts and graphs, and analyze information.
Continuation:
4. Add additional columns to calculate the total cost for each item.
5. Create a new sheet where you will consolidate the information from all the category sheets to create a summary estimate.
6. Customize the appearance of your spreadsheet by adjusting font styles, cell formatting, and color schemes.
7. Double-check the entered quantities, unit costs, and calculations to ensure accuracy.
Learn more about Spreadsheet on https://brainly.com/question/26919847
#SPJ1
In order to access cells with (x, y) coordinates in sequential bracket notation, a grid must be
In order to access cells with (x, y) coordinates in sequential bracket notation, a grid must be a two-dimensional array or matrix.
What us the sequential bracket?In order to approach cells accompanying (x, y) coordinates in subsequent bracket notation, a gridiron must be represented as a two-spatial array or matrix.The rows of the gridiron correspond to the first measure of the array, while the columns pertain the second dimension.
So, Each cell in the grid iron can be achieve by specifying row and column indications in the array, using the subsequent bracket notation.For example, if we have a 5x5 gridiron, we can represent it as a two-spatial array with 5 rows and 5 processions:
Learn more about access cells from
https://brainly.com/question/3717876
#SPJ4
Which statement is true regarding the Quick Access toolbar?
O It can be located at the top left-hand corner of the screen or below the ribbon.
O. It can contain functions that are also in the ribbon
O It can be modified to contain any function that you use frequently.
O All the above statements are true.
Answer: All the above statements are true
Answer:
D) All of the above
Explanation:
you are running a colleague test with your coworkers. one coworker points out that your data has limitations. what can you do to prepare to explain the limitations of your data? select all that apply.
When running a colleague test with coworkers, it is important to acknowledge and address any limitations of your data. Here are some steps to prepare for explaining the limitations of your data:m1. Be transparent: Acknowledge the limitations of your data upfront and provide context for why those limitations exist. This will help your coworkers understand the data more fully.
2. Provide examples: Use concrete examples to illustrate the limitations of your data. This will help your coworkers better understand the impact of the limitations. 3. Discuss potential biases: If your data has biases, discuss them openly and honestly. Explain how those biases may affect the interpretation of the data. 4. Provide alternative sources: If there are alternative sources of data that could supplement or replace your data, be sure to mention them. This will help your coworkers make informed decisions about how to use the data. 5. Discuss the implications: Finally, discuss the implications of the limitations of your data. Explain how those limitations may affect the conclusions you can draw from the data, and what the potential impact of those limitations may be. By taking these steps, you can prepare to explain the limitations of your data and help your coworkers make informed decisions about how to use the data.
Learn more about data here-
https://brainly.com/question/13650923
#SPJ11
uestion
Question text
_ is not an object-oriented programming language
BASIC is not an object-oriented programming language Hence option 3 is correct.
What is object-oriented programming?Object-oriented programming (OOP) is a programming paradigm that focuses on using objects as the basic building blocks of software. In OOP, an object is an instance of a class, which defines a set of related data and behavior. An object contains data in the form of fields, and behavior in the form of methods.
BASIC is a procedural programming language that is not typically considered an object-oriented programming language. It does not provide built-in support for classes, objects, inheritance, and other key features of object-oriented programming.
In contrast, C++, Simula, and Java are all object-oriented programming languages that provide extensive support for classes, objects, inheritance, polymorphism, and other object-oriented programming concepts.
Read more about object-oriented programming here:
https://brainly.com/question/14078098
#SPJ1
See full text below
Which of the following is not an object oriented programming language?
1)C++
2)Simula
3)BASIC
4)Java
why is what you say in business as important as how you say it
Answer:
Because the things you say and how you say it can determine whether or not you sell an item, make a deal with another company and things of that nature. Hope this helps!!
your system is currently running the multi-user.target. what would you enter at the command prompt to find out whether the atd.service is configured to start every time the multi-user.target is loaded?
You would enter systemctl is-enabled atd.service at the command prompt to find out whether the atd.service is configured to start every time the multi-user.target is loaded.
What is command prompt?
Command Prompt is the primary command-line interpreter for the OS/2, eComStation, ArcaOS, Microsoft Windows (Windows NT family and Windows CE family), and ReactOS operating systems. On Windows CE.NET 4.2, Windows CE 5.0,, it is known as the Command Processor Shell. Command Prompt communicates with the user via a command-line interface. On OS/2 and Windows, for example, it is possible to use real pipes in command pipelines, allow both sides of the pipeline to operate concurrently. As a result, the standard error stream can be redirected.
To learn more about command prompt
https://brainly.com/question/25808182
#SPJ4
your computer has a single hdd formatted with ntfs with the following data folders: c:\documents c:\pictures you create a new child folder under the c:\documents folder. what term describes the permissions the new folder automatically attains from the c:\documents folder? question 20 options: a) explicit permissions b) allow permissions c) inherited permissions d) deny permissions
The term that describes the permissions the new folder automatically attains from the C:\Documents folder is "inherited permissions". Option C is correct.
Inherited permissions refer to the permissions that are passed down from a parent folder to its child folders and files. When a new folder is created under a parent folder, the new folder inherits the permissions of the parent folder by default.
This means that the users or groups that have permissions to access the parent folder will also have permissions to access the new folder, unless those permissions are explicitly changed.
In this case, since the new folder was created under the C:\Documents folder, it will inherit the permissions of the C:\Documents folder, including any users or groups that have been granted access to that folder.
These inherited permissions can be modified to restrict or grant access to specific users or groups as needed. So option C, inherited permissions is correct choice.
For more question on inherited permissions click on
https://brainly.com/question/31163728
#SPJ11
Use the drop-down tool to match each definition to the correct word or phrase. The computer that responds to requests from the client computer: _____. Connects network devices or different parts of a network: __________. A piece of equipment that directs data where it should go: _____. Connects many different Ethernet devices and allows them to connect to the network with one connection: _________. The computer that uses service provided by a server: _________.
Answer:
The computer that responds to requests from the client computer:
Server
Connects network devices or different parts of a network:
Switch
A piece of equipment that directs data where it should go:
Router
Connects many different Ethernet devices and allows them to connect to the network with one connection:
Hub
The computer that uses service provided by a server:
Client
Explanation:
Following are the discussion to the given points:
The computer replies to queries from the client-server computer.Connects network components or various parts of a Network Switch.The router is a piece of equipment that directs information to the data location.Connects a variety of Ethernet devices and enables them to connect to the network through a single connection Hub.A network is a computer network that makes use of a service supplied by the Client-Server.Therefore, the final answer is "Server, Switch, Router, Hub, and Client".
Learn more:
brainly.com/question/20193625
which block cipher is used by most tcp/ip applications?
The most commonly used block cipher in TCP/IP applications is the Advanced Encryption Standard (AES). Its ability to protect sensitive data from unauthorized access has made it a critical component of many modern communication systems.
Block ciphers are encryption algorithms that operate on fixed-size blocks of data. AES is a widely adopted symmetric block cipher that was selected as the encryption standard by the US government in 2001. It uses a fixed block size of 128 bits and supports key sizes of 128, 192, and 256 bits.
While there are other block ciphers that can be used in TCP/IP applications, such as Blowfish and Triple DES, AES is the most commonly used. Its popularity is due to its high level of security, fast encryption and decryption speeds, and broad support across different platforms and devices. AES is used in a variety of applications, including secure email, file transfers, and virtual private networks (VPNs). Its ability to protect sensitive data from unauthorized access has made it a critical component of many modern communication systems.
To know more about Advanced Encryption Standard visit :-
https://brainly.com/question/31925688
#SPJ11
Please help! Why is my windows homepage like this with no desktop pictures for apps? It has like a mail logo for everything. How do I fix it?
_______ codes are supplemental codes used to help researchers collect data, track illness and disease, and measure quality of care
Answer:
Category II CPT codes are supplemental tracking codes, also referred to as performance measurement codes. These numeric alpha codes [e.g., 2029F: complete physical skin exam performed] are used to collect data related to quality of care.