Answer:
Single sign-on
Match each vocabulary word to its definition. 1. downloading choose not to do something 2. lead time person who sends out unwanted e-mail 3. opt out how long it takes to receive an item after it is requested 4. spammer standard layout used as the basis to create new, similar items 5. template copying a file from a remote computer to your computer 6. tutorial self-paced instruction
Answer:
1. downloading:
copying a file from a remote computer to your computer
2. lead time:
how long it takes to receive an item after it is requested
3. opt out:
choose not to do something
4. spammer:
person who sends out unwanted e-mail
5. template:
standard layout used as the basis to create new, similar items
6. tutorial:
self-paced instruction
Explanation:
Downloading is simple phenomenon in which a computer in a network copies the desired data from other computer that also must have internet connection.Lead time can be defined as a time period between the initialization and completion of any production.Opt out can be defined as an option for not participating (in any kind of activity).Spammer can be defined as a person who sends spam messages or e-mails. These messages can be for promotion of any product or for any other reason. Spam messages are always unwanted.Template can be defined as a basic structure for designing a document or draft. Its a building block or cell.Tutorial is an introductory video made for giving instructions for any technical issue. It is used for training purpose as well as learning.i hope it will help you!
What does the shell of an operating system do?
O changes the operating system so that it can be installed on smartphones
generates a printed list of the inputs and outputs of the OS
O creates files and sets up a systedimo files are managed efficiently
O provides a user interface that enables users to interact with the OS
The shell of an operating system provides a user interface that enable to interact with the operating system.
O provides a user interface that enables users to interact with the OS
Explanation:
Shell is program which is available in nowadays in OS, where it is interface or interacted with operating system to change or edit some configuration of operating system. Shell basically coming from UNIX operating system, at shell prompt in Unix operating system, shell script are created, edit and executed
For c programming execution we use shell command in UNIX operating system. In windows 10 it is renamed as PowerShell nothing but dos prompt with extra addition features. Same features are available in Linux also.
Answer:
D
Explanation:
it just is
How long before a speech should you begin practicing?
a. 3 days
C. 1 week
b 5 days
d. 3 weeks
Answer:i think its c
Explanation:
The time before a speech should begin practicing is 1 week. The correct option is c.
What is practice?Practice is the act of repeatedly practicing something to become better at it. The definition of practice includes performing in order to get better, carrying out, or engaging in a specific vocation.
So, after being called to the bar, you might practice law or piano scales. As a general rule, if you could end it in -ed or -ing or put to before it, it would be the verb.
A standard or set of recommendations recognized to result in positive results when followed are referred to as best practices. The best practices related to the execution or configuration of a task. Strict best practice standards may be established by a governing body or internal to a company.
Therefore, the correct option is C. 1 week.
To learn more about practice, refer to the link:
https://brainly.com/question/24313388
#SPJ6
will mark branyist
What occurs when information is copied from an internet source to another computer?
Transferring
Uploading
Downloading
Pasting
Answer:
Pasting
Explanation:
because when you cope and right click it says paste
PASSAGE: The picnic had been scheduled for weeks in advance. The Morris family was looking forward to some fun and relaxation with friends. Mother Nature, however, didn't feel like cooperating with the family's plans. Dark clouds loomed on the horizon the entire morning. The family met some friends at the entrance to the park. While the kids started playing a game of catch, the adults worried about the possibility of rain. The sky began to darken and rumble as if a storm was about to break. Then, just as suddenly, the clouds parted and the sun shone through. Happy with this turn of events, the adults began setting up the picnic table and chairs.
Which event creates tension in the story?
A) Everyone arrived for the picnic.
B) The sky began to darken and rumble.
C) The sun shines through the clouds.
D) The kids start playing catch.
Answer:
B) The sky began to darken and rumble.
Explanation:
B) The sky began to darken and rumble.
It seems they have arranged it big. Hence, the money is not a problem. Any number of people can be invited,
The problem was certainly that the rain was about to come as sky turned dark and rumble. And hence, this answer as its what created tension.
Answer:
B) The sky began to darken and rumble.
Explanation:
The climax of the story (which creates the greatest moment of tension) is when The sky began to darken and rumble as if a storm was about to break. This suggests that something bad is about to happen.
The stakeholders in a project who make the final decisions and provide the financing for the project are usually ____.
Answer:
Sponsor
Explanation:
The Sponsor or the financier is an executive within the organization, and he has the power to assign any required resources as well as take the decision related to the project as well as come up with the financial resources required for the project completion.
What does the Snap to grid setting do?
A. Makes objects line up with the grid lines exactly
B. Makes the grid show up while players are playing the game
C. Adds an object to a game that keeps track of players' high scores
D. Locks backdrop objects so you don't accidentally change them
Answer:
A. Makes objects line up with the grid lines exactly. In short, it is a backstage of the objects that need to be shown on the screen. And the object is being picked from there in the required manner. We cannot ensure a backstage without an invisible grid, and this is the snap to the grid, as being explained above, It has a huge application, and is very important in its domain,
Explanation:
Snap which is intended for the grid(Snap to grid) is a function code that manages the images and files without any human intervention. It makes use of an invisible grid to put in line various items on to the computer screen, alongside the vertical and horizontal lines.
Answer:
Snap to grid is a computer function used to organize files or images automatically. It uses an invisible grid to line up the items on the screen along perfect horizontal and vertical lines
Explanation: In Shorter terms it would be, A)
What is 3NF in database design?
Answer:
The 3NF form is a "eliminate columns not dependent on the key" in the database design.
Explanation:
3NF form stands for third normal form says that it is necessary to remove all column that references to all related information that is not based on the primary key.
It is difficult to store data into one table to remove this problem we use the normalization, there are many forms in the normalization that are "1NF, 2NF, 3NF, and BCNF". The main purpose to use 3NF (normal form) in the database is to remove the data duplication.
Does anyone know the answers to the AR test on Gathering Blue by Lois Lowery?
yes i do....................................................
1. What is the central idea of the section "Service Record." Use two text details to
support your answer.
Answer:
Service record is the record that is used to track the record of service of the employ in an organization.
Explanation:
The idea behind the service record is to maintain the whole detail of record of the person during his employment including, personnel information, record related to his promotions and posting, salary record etc.
What is the recommended procedure for disconnecting an external hard drive to avoid losing data?
Disconnect the hard drive’s power supply, then remove the drive.
Instruct the operating system to eject the drive before unplugging it.
Use the Power button to turn off the computer, then remove the drive.
Wait until the drive stops spinning, then remove the drive.
Answer:
Instruct the operating system to eject the drive before unplugging it.
Explanation:
Answer: Its B
Explanation:
Word Online works exact same as the downloaded Office 2016 version.
True
False
Answer:
The Answer is false. They work similarly but quite differently on a lot of offerings from them. Office 365 and office.com are online version, and Office 2016 is a desktop version.
Explanation:
I am not going very deep into this but the facts I am mentioning will clarify your doubts.
Office 2016 offers so many ways to share a file even though we work offline on it We can email the document, share on social media as well as store on One drive. However, Office 365, and especially Word online does not allow any other sharing options than sending an invitation or sharing a link.
For Word Online you will need internet all the time, though you can work from anywhere, and even on any device. Word 2016 does not require internet, but provide a lot of analytics features and even data mining facilities when it is connected to the internet.
Watch out for Word online 2019 version, and office 2019 desktop version. They are awesome and provides AI features, and a lot more than 2016 versions, both desktop and online.
David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted in the text. David should create a _____.
a.data entry form
b.graph
c.report
d.form letter
define token. Give examples of 5 tokens in any programming language
Tokens and its examples:
Token is data type and it is behavior or categorized types. Basically most of programing language will have all five tokens data types and they are.
Operators.ConstantsReserve wordsSeparatorsIdentifiersOperators: - such as mathematic operations such as example: - “+”,”-“
Constants: - which used with CONST in vb.net or #define in c programming language, such as example: - 400,200.
Reserved words:- if , then are all used for if condition where if and then are reserved used in programming language for specific purpose.
Separators: - it used with write a procedure or function, in c languages “()” or “()” in vb.net sub and end sub.
Identifiers: - end user to define variable with data type class and store the value in the programming languages, such as amt = 0, rate=10.5.
Jargon is:
O
A. the text that goes into the presenter notes section of a slide
presentation.
O
B. language that includes terms that only a select few can
understand.
O
C. the main point of your slide presentation,
O
D. another way to describe good communication.
Answer: The answer would be "B" - language that includes terms that only a select few can understand
Explanation:
Jargon is language that includes terms that only a select few can understand. The correct option is B.
What is communication?Communication is defined as the act of giving, receiving, and sharing information – in other words, talking, writing, listening, and reading.
Good communicators pay close attention, speak or write clearly, and respect opposing viewpoints.
Communication in our daily lives helps us build relationships by allowing us to share our experiences and needs, as well as connect with others.
It is the essence of life, allowing us to express our emotions, share information, and share our thoughts. We must all communicate.
Jargon is a specialized language used by a group or profession. It's a common form of shorthand among experts, and when used correctly, it can be a quick and efficient way of communicating.
Thus, the correct option is B.
For more details regarding Jargon, visit:
https://brainly.com/question/3702410
#SPJ5
Which components exist in the contextual tab for tables called Design? Check all that apply.
The 'Design' contextual tab for tables includes components for applying 'Table Styles', enabling 'Table Style Options', and customizing 'Shading and Borders' to enhance the visual aspect of tables.
Explanation:The contextual tab for tables called Design in Microsoft Office applications like Word and Excel includes multiple components aimed at enhancing and customizing the appearance of tables. Some key areas in this tab are:
Table Styles: Options to apply predefined styles to the table, which can include combinations of shading, bordering, and color schemes designed to make tables more visually appealing and readable.Table Style Options: Checkboxes that allow users to quickly toggle certain style features, such as header and total rows, banded rows or columns, and the display of first or last columns specially formatted.Shading and Borders: Features to customize the background color behind cells (shading) and the lines that define the edges of cells and boundaries of the table (borders).These components help users to quickly and easily modify the design and format of tables inserted into their documents or worksheets.
Select the correct answer.
In which phase does the development team check the project for error handling capabilities?
A , design
B, testing and delivery
C, development
D, maintenance
Answer:
B
Explanation:
engineers design and carry out test cases and evaluate exit criteria (by following the scope set in the planning phase). They create bug reports describing detected defects and report to the stakeholders on the test findings and the completion status. Testing may be repeated to check for errors.
Which function returns the least value of a given set of numbers or range of cells?
OA ROUND
OB. COUNT
OC. NOW
OD. MIN
MIN returns the least value of a given set of numbers or range of cells
D. MIN
Explanation:
In MS-excel there are many inbuilt functions are available. Each function is used to either select cell or series of cells or return the value to specific value.
ROUND :- These is inbuilt function which returns round value for selected cell or selected range cell.
=Round(5.6) returns 6.
COUNT: - These are inbuilt function gives count of selected range of cell.
=COUNT (a1-A10)
NOW: - In excel it is inbuilt function it returns date and time of the system
MIN :- In Excel it is inbuilt function give minimum value for selected range of cell . (Least value from range cells)
When the track changes icon is active, the icon will appear ___ .
Answer:
The answer to the given question is "yellow in color".
Explanation:
In the given question the answer is "yellow in color" and the description of the Task changes icon can be given as:
Task changes icon is a part of the Microsoft word. This icon is on the Review tab. Task changes are an editing command that is used for creating an authorized document and it also provides a facility to make changes to the document.when we move our mouse on this icon it will appear in yellow. That's why the answer to this question is "yellow in color".
Answer:
Yellow when active grey when inactive.
Explanation: If I'm correct your four options are
grey in color
highlighted light green
yellow in color
in bold
So When Track Changes is turned on, the icon will turn yellow. It will return to gray when the feature is turned off.
It is not important to keep financial records since they can all be found online.
OA. True
OB. False
Reset
Ne
Answer:
False
Explanation:
Due to the fact that financial records can be erased. Also, I believe it is a law to keep financial records when doing business but I'm not too sure.
katherine has work experience of seven years as a graphic designer and photographer. she wants to now redirect her career to web technology. what kind of job is suitable for her, keeping in mind the kind of work experience she has? katherine can consider a job as a(n) _____
Web designer. She should start by learning HTML, CSS, and Javascript for frontend development.
Answer:
web developer
Explanation:
Which statement identifies a limitation of models?
Models may be oversimplified.
Models describe scientific observations.
Models represent all aspects of an object.
Models are always accurate depictions of a system.
Answer: Models may be oversimplified. The problem with the model is definitely this, that they are not fully self explanatory. You are certainly going to find that not all the information can be fetched from them. And hence for the complete information one needs to wait for the project to take its real shape. And only then we can find out the complete details of the project. Hence, the above answer.
Explanation: Various natural phenomenon can be missing from the model due to oversimplification. And hence most complex aspects of the system remains hidden, till the model is transformed into a real project.
The scientific observations are always described the best way, and the model is certainly up with all the aspects of ab object. Also, they are highly accurate. Hence, the above answer.
Models may be oversimplified, this statement identifies a limitation of models. The correct option is a.
Models have the potential to be oversimplified, failing to adequately represent the complexity of systems in the actual world. While models are useful for understanding and forecasting phenomena, in order to manage them, they frequently involve simplifications and assumptions.
This can result in inaccurate or faulty depictions of the real system. Although models' level of depth may not include every feature of an object or process, their goal is to characterise scientific data and anticipate outcomes.
It is crucial to understand that models do not always represent reality perfectly or accurately, and their limits should be taken into account when evaluating their findings.
Thus, the correct option is a.
For more details regarding models, visit:
https://brainly.com/question/33240027
#SPJ3
Your question seems incomplete, the probable complete question is:
Which statement identifies a limitation of models?
a. Models may be oversimplified.
b. Models describe scientific observations.
c. Models represent all aspects of an object.
d. Models are always accurate depictions of a system.
creating a newsletter
You receive an e-mail from your manager letting you know that you need to add a field to the database. What should you do?
A - Start creating all fields from the beginning.
B - Insert a column into your database table.
C - Create a new database and export the existing data to the new database.
D - Link a new database to your old database
Answer:
insert a column into your database ( C )
Explanation:
A database is an organized collection of important data. it is generally stored in a computer and access can be granted to users who have the necessary need to access them.
for complex databases they are designed using specific/formal designs and modeling techniques to make them unique information in a database can be retrieved ,manipulated and updated as well and this is mostly carried out Database Administrator. a database management system is used to manage recent/modern databases.
A database is used by companies or organization to keep good records of their data.
Inserting a column is the best way to add a new field because a column contains as "row and a column" inside it
Arrange the stages of a digital forensics investigation in sequence.
collection
presentation
readiness
analysis
review
Answer:
Collection
Analysis
Readiness
Presentation.
Explanation:
Collection: The action or process of collecting someone or something.
"The collection of data."
Analysis: This is the detailed examination of the elements or structure of something.
Readiness: It is a state of being fully prepared for something.
Presentation: This is the giving of something to someone, especially as part of a formal ceremony.
The arrangement of stages of a digital forensics investigation in sequence are:
CollectionAnalysisReadinessPresentationWhat is the forensic investigation?In a forensic investigation, all tangible evidence related to a crime is gathered and examined in order to draw conclusions about a suspect.
The act or practice of gathering someone or something. "The gathering of information."
Analysis: This is the close investigation of a thing's constituent parts or structural makeup.
The state of being totally ready for anything is called readiness. Giving something to someone, particularly as part of a formal ceremony, is known as a presentation.
Therefore, the stages of a digital forensics investigation in sequence are:
CollectionAnalysisReadinessPresentationTo learn more about the forensic investigation, refer to the link:
https://brainly.com/question/13073221
#SPJ2
what type of computer needs a systemthat will take up little space
MAC is a computer that needs a system that takes up a little space.
Explanation:
MAC is short for Macintosh Operating System. MAC is developed and owned by Apple Inc.
The MAC operating system is a graphical user interface and supports high-performance graphics. Generally, the MAC is used for designing purposes because of the high multimedia management capabilities.
MAC comes in handy while working on projects that deal with graphics building, and management plus people also make use of MAC in blogging.
How to calculate checksum in information and technology
Answer:
It can be done using the software like MD5 & SHA Checksum Utility and Online Checksum calculator.
Explanation:
Suppose you are downloading the ISO file the checksum will be listed. And as you download your file, you will need the checksum calculator for verifying the integrity of the file.
Around 99.9% of the cases, you are not required to care for the checksum while you download the files from the Internet. Though, if you download something sensitive such as antivirus or the complicated software such as Tor, the good habit is to verify once the checksum since the hackers can inject the malware-infested versions of that critical software for gaining complete access to your system.
Many utilities are available for calculating the checksum, but only one or two are the best ones like MD5 & SHA Checksum Utility and Online Checksum calculator.
Install the first one on your computer.
This one is quite simple and very easy for using, you just need to click on the browse button for choosing your file, and automatically the hashes will be calculated for the MD5, SHA-512, SHA-1, and SHA-256. THE MD5 is the shortest and the SHA-512 is most in length. And the lengthier the hash, the more secure it happens to be.
For the verification of the hash, you simply need to copy and then paste it over at the hash box, which is located at the bottom. Now click on the verify and it will then compare it with the generated hashes (4 in number) to check if there is a match. If it matches you are safe.
You can also use the Online checksum calculator if you want.
We can calculate the checksum on our own as well:
We want to send 32 bit message, and hence we devide it into m parts of k bits each such that mk= total size of data sent in bit, or whatever unit used.
10101010101010101010101010101111
Divide above in four parts:
10101010
10101010
10101010
10101111
Now add first 2 and if 1 is carry over, add it to the resultant. Go on doing this till you get the final sum. And then take 1s complement
10101010
10101010
----------
01010100
1
---------
01010101
10101010
------------
11111111
10101111
-----------
10101110
1
----------
10101111 take 1s complement
01010000 (checksum)
Send four original parts and checksum to receiver
At receiver end:
all four parts are added, which will be same as previous, when we added them. Now add this to checksum, and take 1st complement, ad if everything is 0. It means our data ia original, and we need not worry.
10101111
01010000
-----------
11111111 take 1s complement
00000000
All are 0 hence the file is not corrupt and the original one sent.
A(n) is a small bit of text separated from the rest of the paragraph at the top of a column or page. widow or orphane
Answer:
orphane
Explanation:
Ask the user to input an integer. Print out the next three consecutive numbers. in python
Answer:
Explanation:
n = int(input("Enter Number : "))
print(n+1,n+2,n+3)
Answer:
In python, the code would be written as...
Explanation:
n = int(input("Enter Number : "))
print(n+1,n+2,n+3)
You are printing both the number and the next three consecutive numbers after that. which essentially your answer "n" plus the numbers that create the next number "n+1" = your answer plus 1, "n+2" = your answer plus 2, etc.
Select the correct answer.
Which information is considered free for use?
O A. information involving mature adults
OB. information acquired by companies
O c. information shared on social networking websites
OD. information that is personal and sensitive
Reset
Next
Answer:
A
Explanation:
This Information involves informing the young youth about adult and mature life
Answer:
The Answer is C.
Explanation: