Answer:
"Ems" (em)
Explanation:
“Ems” (em): Is is a scalable unit that is used in web page text or markup language like HTML, it allows page elements have a consistent relative font sizes.
It is important to know that an em (1em) is equal to the current font-size, for instance, if the font-size of the document is 10pt, 1em is equal to 10pt. Ems are scalable in nature, so 2em would equal 20pt.
Raul looks at different technologies that will help him do his job. What part of the process is this?
analyzing options
determining the goals
evaluating the decision
gathering data
This process is known as analyzing options. When Raul looks over different options and/or technologies that will help him do his job, he is going over the different options and seeing which option is best for him. When deciding which is best for him, he will need to consider: what Raul needs it to complete, how each technology option compares to the next, the price point and all of the functions the technology can do. After he figures out what it can do compared to what purpose he needs it to serve, he can determine the best option for himself.
This portion of the process is actually called gathering information.
I tried the other option on Odesseyware and got it incorrect.
I hope this helps!
What are two best practices for discovering whether a message you’ve scheduled with Hootsuite has failed to send?
A) Download a 'Past Scheduled' report from Hootsuite Analytics, and cross-referencing it with posts actually published on your social properties
B) Review Past Scheduled calendar view in Publisher for entries colored red
C) Regularly check Publisher's 'Rejected' Tab
D) Enable email notifications for failed messages under Preferences
Answer:
B & D
B) Review Past Scheduled calendar view in Publisher for entries colored red
D) Enable email notifications for failed messages under Preferences
Explanation:
Hootsuite application is a social media management system scheduling tool. It use to manage and keep track of one's social media network channels, to monitor people's comments and reviews about your brand and enable you to respond immediately. The two best practices for discovering whether a message you have scheduled with hootsuite has failed to send are:
i) Review Past Scheduled calendar view in Publisher for entries colored red
ii) Enable email notifications for failed messages under Preferences
A mixture above the upper flammable limit is too rich to burn or explode. A vapor/air mixture below the lower flammable limit is too _________to burn or explode. A. Combustible B. Lean C. Rich
The answer is B: Lean.
Before an explosion can occur, certain conditions must be met. These conditions include combustible gas like fuel, air in certain proportions, and a spark or a flame. The minimum or least concentration of a particular combustible vapor or gas that will burn in air is defined as the LEL (Lower Explosive Limit) for that gas. Below this level, the mixture becomes very lean to burn. On the other hand, the maximum concentration is defined as the UEL (Upper Explosive Limit). Above this level, the mixture is too rich to burn
6. How does understanding terminology’s structure and construction help you to understand medical terms?
This helps one to fully understand what the doctor is saying and by you understanding this, it can be of great importance. You can explain everything properly to the patient what the doctor is talking about. Everything can be broken down in normal English setting about what the doctor wrote.
Create a program that reads words.txt (link near top of our home page) in order to: determine the length of the longest word(s) and output that length plus the first word of this length found. determine the length of the shortest word(s) and output that length plus the first word of this length found determine and output the average length of all the words in the list.
Which type of loop is best if you do not know how many times you need the loop to run?
You need a method to remotely manage a few servers from any client within the enterprise. you want to avoid any method that requires additional client software except a web browser. what will you use? give an outline of tasks.
The answer is to use Windows PowerShell Web Access
Also known as a PowerShell Web Access, it is featured in windows servers 2012. It acts as gateway that connects to a remote PC or any other device in your environment.
Below is a brief outline of how you can install PSWA
1. You are required to install and configure the IIS
2. Install and configure the Windows PowerShell web access feature
The remaining steps define and configure “authorization rules” and include;
1. Configuring the IIS gateway.
2. Creating restrictive authorization rules.
Presentation aids should include short phrases or images to convey your message. True False
The data in a database management system that identifies the names of tables, fields in each table, and the properties of each of the fields, as well as which fields are primary and foreign keys, etc. is called ____________.
a. data definitions
b. metadata
c. qualitative data
d. descriptive data
e. uberdata
By definition, Metadata describes other data or data about other data. In simple terms, it provides context for data. In DBMS, metadata defines attributes and data elements like data type, name, size, and etcetera. It also defines data that could be about records and structures like columns, length and fields.
Your boss, kelly, tells you that the users have approved your data model and that you can go ahead and create database structures such as tables. you begin developing the tables for your database and realize that you need to design your table structures so that data integrity is protected. you recall that a process called normalization is used to improve data integrity. what is the best way to normalize this data?
To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a _____.
To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a theme.
What are the characteristics of a theme?The characteristics of the theme are as follows:
A theme may be defined as a combination of desktop background pictures, window colors, and sounds. It is used to determine the visual appearance of all windows, applications, dialogs, panels, and applets. It completely demonstrates the visual interface to the items that appear on the window.The theme can be utilized in order to change the complete design of an entire document to include colors, fonts, and effects. Sometimes, themes are modified according to the need and interests of the user. They possess specific properties in the computer and technology.
Therefore, a user should apply a theme when he/she wants to change the overall design of an entire document to include colors, fonts, and effects.
To learn more about Theme, refer to the link:
https://brainly.com/question/26624021
#SPJ6
How can you tell the difference between subnet addresses and interface addresses?
Subnet addresses are used to divide a network into smaller subnetworks, while interface addresses are used to identify specific devices or interfaces on a network.
Explanation:Difference between subnet addresses and interface addressesIn networking, subnet addresses and interface addresses serve different purposes.
A subnet address is used to divide a large network into smaller subnetworks, allowing for better organization and management of network resources. It is a range of IP addresses that share the same network prefix and subnet mask. For example, in the IP address 192.168.0.0/24, 192.168.0 represents the subnet address.
An interface address, on the other hand, is used to uniquely identify a specific device or interface on a network. It is a unique IP address assigned to a network interface such as a network card or router interface. For example, an interface address could be 192.168.0.1.
what is the relationship between ionic bonds and cleavage
Imposing stricter recycling regulations would greatly benefit our city in many ways.
Which is the best revision of the underlined portion of the sentence?
would be a totally beneficial thing to do.
would be great and I’ll tell you why.
would be pretty great for our city for many reasons.
no change
Given that there is no underlined portion of the sentence, we cannot completely answer this question. However, basing on the excerpt borrowed from Erika’s letter to her mayor, I honestly would not change anything. Given that Erika is addressing the mayor about a serious issue, The sentence’s choice of words is correct and sounds very academic, professional and formal, something that Erika would want to achieve.
Answer:
(D) no change
Explanation:
IN POWERPOINT: What do you click to create a new presentation in Normal view? A. Blank Presentation B. Layout C. Section D. New Slide
Which theory uses game playing to understand the development of self?
On the attendance worksheet, in cell l5, enter an if function to determine if the percentage in cell k5 is greater than or equal to the goal in cell h18. the function should return the text goal met if true and review if false. set the reference to cell h18 as an absolute reference
"explain why professional software is not just the programs that are developed for a customer"
To put it into simple terms, software is always a continuous process of coding and updating, thus, you will never code and be done. Professional software not only consists of programs that are developed for a client, but also the compilation of documentation, configuration of data, support websites, requirements, design manuals, and evolution to make these programs operational and complete.
A professionally done software system consists of more than one program and configuration files used to set up these programs.
All spreadsheet formula should start with
Camile uses specialized equipment designed by Olivia to analyze and predict weather and atmospheric changes. Which describes the career pathways of Camile and Olivia?
answer
Olivia is in the Engineering and design pathway and Camille is in the science and meteorology pathway.
Explanation
engineering and design path way- this is a methodological series of steps that are used by engineers in creating functional products and processes.
science and methodology pathway- these are steps used by scientists to create explanations based on the evidence which they have gathered.
You want to create a database for the various product categories in your business which office 2007 application with you launch to accomplish this
When the Clipboard dialog box launcher is clicked, the Clipboard displays in _______ view. A. shortcut menu B. dialog box C. window D. task pane
Answer:
B. dialog box
Explanation:
Clipboard is a feature of the operating system to which a small amount of data is sent and later transferred. This is where text, images, and files that are duplicated or moved through the Copy (Ctrl + C) and Cut (Ctrl + X) commands in programs such as Microsoft Word and Windows Explorer, for example.
A text-only forum accessed through a bulletin board service (BBS) is known as a _____.
Answer:
newsgroup---for apex
Final answer:
A text-only forum accessed through a bulletin board service is known as a discussion board, a precursor to modern internet communication systems.
Explanation:
A text-only forum accessed through a bulletin board service (BBS) is known as a discussion board. In the infancy of the internet, bulletin board systems were an early form of online communication.
These systems were pre-internet computer networks that connected personal computers using modems and phone lines. Users of BBS could share files, post messages, engage in discussions, and even play text-based games.
The significance of BBSs at the time is comparable to the modern-day impact of the European Union (EU) on trade or climate change on environmental policies - they transformed their respective fields.
Why is the protocol down, even though you issued the no shutdown command for interface vlan 99?
At least one device needs to be assigned to a Vlan 99 to bring the protocol up. Assuming that the Status is UP and the protocol is DOWN may mean that there are no ports assigned to Vlan 99 and thus no host assigned to this Vlan.
Answer and explanation:
The protocol of a management interface with VLAN 99 could be "down" because there are no ports assigned to it, meaning there are no hosts assigned to that interface. In this case, the status of the interface can be displayed as "up" regardless of the protocol.
To modify a text box, shape, or SmartArt graphic, the user must first select the _____.
Final answer:
To modify a text box, shape, or SmartArt graphic, the user must first select the object, enabling access to specific formatting and editing tools appropriate for the item, such as the SmartArt Tools Design and Format tabs, Drawing Tools for shapes, and text layout options for text boxes.
Explanation:
To modify a text box, shape, or SmartArt graphic, the user must first select the object. This initial action grants access to a range of formatting and editing tools tailored to the selected item. For example, upon choosing a SmartArt graphic, the SmartArt Tools Design and Format tabs become available, offering numerous layout, style, and color options. Similarly, selecting a shape enables the use of the Drawing Tools, which provide capabilities to fill, align, group, and modify the shape's appearance. When it comes to text boxes, activating one allows the user to adjust the text layout, remove or format the border, and other text-specific modifications via the contextual tab or the Format Shape option.
SmartArt graphic: Customized through SmartArt Tools Design and Format tabs for layout, style, and colors.
Shapes: Modified via the Shapes drop-down list for advanced formatting like filling, aligning, and grouping.
Text boxes: Adjusted for text display and border through the Format Shape option or Layout Options icon.
What is the exact number of bytes in a system that contains 6.4 bytes?
1 Gigabyte = 1,073,741,824 bytes
How about 6.4 Gb = X?
X = (6.4 Gb×1,073,741,824 bytes) / 1 Gigabyte
X = 6,871,947,674 bytes
Which of following allows you to share a file with someone that is too large to send via e-mail?
Dropbox
Google Drive
One Drive
All of the above
One can share files via email that is too large by drop box, g drive, and one drive. The correct option is D.
What is a drive?A drive is a location (medium) that can store and read information that cannot be easily removed.
All drives contain files and programs that your computer uses. When you write a letter in a word processor, for example, the program is loaded from the drive.
When you need to send large files via email but they are too large, one of the more efficient solutions is to use cloud-based storage services.
Cloud storage services such as Mail Drop, OneDrive, and G Drive are excellent options for sending large files via email.
Thus, the correct option is D.
For more details regarding drive, visit:
https://brainly.com/question/966908
#SPJ5
Coordinates that measure how far a point is from the origin are _______________. A. Relative coordinates B. Absolute coordinates C. Negative coordinates D. X coordinates
Answer:
answer b
Explanation:
A group of scientists are working on research. All of them need to simultaneously work on the computer and perform different operations. Which operating system do they need to use?
Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he works and what he does there?
Answer:
the answer is c
Explanation:
Answer:
C. in a laboratory, where he designs power plants, and in a factory where the plants are manufactured
Explanation: