When you exit an Office app, if you have made changes to a file since the last time the file was saved, the Office app displays a dialog box asking if you want to save the changes you made to the file before it closes the app window.​ (True/False)

Answers

Answer 1

Answer:

TRUE: When you exit an Office app, if you have made changes to a file since the last time the file was saved, the Office app displays a dialog box asking if you want to save the changes you made to the file before it closes the app window.


Related Questions

What type of slide show is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer? A. Photo album B. OLE C. Office Clipboard D. Brochure

Answers

Answer:

C. Office Clipboard

Explanation:

An Office Clipboard is a type of slide show that is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer.

Answer:

A:Photo album

Explanation:

Organizing photos into a slide show is an effective technique for a business to showcase its products and services. Rather than a static brochure, a slide show is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer. Photo album slide shows can be presented at a conference booth, online, or distributed through email.

1. You want to find if TCP/IP Services are working properly on your Computer, you would use which command? a. PING LOCALHOST b. IPCONFIG /STATUS c. NETSTAT LOOPBACK

Answers

Answer:

Option A

Explanation:

Option B is rejected because it is used to get the startup network settings, processes extra features used by the network.

Option C is rejected because it is used to check the stats like ping,fps of the network by using a loop back.

Option A is selected because PING command is used to check the data packets transfer rate between two ends using ICMP protocol. Local host means that you are specifying the one end as your side. If the packets are there then it is working else the IP service is down.

Which black inventor patented fifty different devices, most of them dealing with the lubrication of machines, and successfully contested claims against the genuineness of his designs?

Answers

Answer:

American engineer Elijah McCoy was born in Canada but became US citizen very young, and and made vital contributions in the United States after the Civil War such as in the progress of locomotives design and railroads in America, the automatic lubrication systems for steem engines and many other inventions among his 57 U.S. patents that made train travel more efficient.

Explanation:

Pick two programming languages. Please describe: - The major differences between those two languages; and - If you were assessing an application and determining what language would be best for the programming, why you would choose each language.

Answers

First language : JAVA

Second Language : C++

Major Difference :

1. Platform Dependency :

Java is platform independent which means that its code can be run on any machine. It uses JVM ( Java virtual machine ) which converts the code in byte form and then run it which makes it flexible enough to be used on any system. So .exe file can run on any OS.

C++ is not platform independent and thus its .exe file  cannot be run on different OS.

2. Objects

In JAVA everything is reference typed and is inherited from the class objects that are predefined in it.

In C++ not everything is class or reference typed.

3. Garbage Collector

Java has built in garbage collector when we use classes in java.

C++ make developer to collect garbage when he uses reference types like pointers.

Why choose Java and C++ ?

People are very confused about the platform in-dependency of JAVA, so i decided to choose Java and compared that concept with c++ which is mother of all languages.

The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program. __________

Answers

Answer: This Information Security Handbook assist and guide managers to establish and implement an information security program.

Explanation:

The handbook looks to implement adequate security programs and also to demonstrate their effectiveness.

a) True, The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program.

This handbook is published by the National Institute of Standards and Technology (NIST). Offers comprehensive advice and strategies on:

Creating effective information security policiesMaintaining effective information security practicesIntended to assist organizations in protecting their information systems

Provides detailed recommendations on:

Security controls Risk managementOther critical aspects of information security

The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program.

a) True

b) False

HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol includes a status code returned by the server to tell the browser the status of its most recent page request. Some of the codes and their meanings are listed below: 200, OK (fulfilled) 403, forbidden 404, not found 500, server error Given an int variable status, write a switch statement that prints out, on a line by itself, the appropriate label from the above list based on status.

Answers

// Making a function that will take a integer as argument and return  print the code

void Print(int statuscode){

// starting the switch statement on the interger sent

switch(statuscode)

  case 200: // for case 200

              cout << "Ok,Fullfilled"<< endl;

  case 403: // for case 403

             cout << "Forbidden" << endl;

   case 404: // for case 404

             cout << "Not Found" <<endl;

   case 500: // for case 500

             cout << "Server Error "<< endl;

    default: // default case

              cout << " Wrong code"<<endl;

}

The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

Answers

Answer:

Basic

Explanation:

The 3rd generation programming language that most students learned when most computers used MS DOS was basic. It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

Final answer:

The 3rd generation programming language widely learned during the dominance of MS-DOS was C. It remains a popular language due to its safety in using third-party code and its compatibility with other languages.

Explanation:

The 3rd generation programming language that most students learned when most computers used MS-DOS was C. C language remains a safe programming language for using third-party code and provides a coding standard that integrates easily with other programming languages. This language is widely recognized for its efficiency and control. It's also notable for its capability to produce programs that are more compact and run faster than those written in other languages.

Learn more about Programming Languages here:

https://brainly.com/question/32924876

#SPJ2

On which tab are import and export commands located in Access? A. Home B. Database Tools C. External Data D. Create

Answers

Answer:

C. External Data

Explanation:

On the External Data tab, you can find import and export commands located in Access.

Given an int variable n that has been initialized to a positive value and, in addition, int variables k and total that have already been declared, use a for loop to compute the sum of the cubes of the first n whole numbers, and store this value in total. Thus if n equals 4, your code should put 1*1*1 + 2*2*2 + 3*3*3 + 4*4*4 into total. Use no variables other than n, k, and total.

Answers

Explanation & answer:

We do not know which language you are using, so a pseudocode will be given, it will be similar to java or C/C++.  For other languages, you can adapt to the syntax of the target language.

int n=5;

//

total = 0  // initialize  variable to store total value, already declaired.

// k will be used as a dummy variable, already declared

for (k=1; k<=n; k++){

   total+=k*k*k;  // k*k*k works for almost all languages.  adapt as needed

   }

print(n, total)

Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purposes. How can an administrator meet this requirement? - Assign delegated administration to the subset of users to View All Data - Create a permission set with the View All Data permission for the subset of users - Enable the View All Data permission for the roles of the subset of users - Create a new profile and role for the subset of users with the View All Data permission

Answers

Answer:

Last Option is correct answer. ( Option D)

Explanation:

Option A is rejected because this will allow the view permission but as mentioned the management want a new profile for the users as well.

Option B is rejected because again it will not facilitate the different profile requirement.

Option C is not answer because It will only help in viewing the data and granting permission.

Option D is selected because it will meet both requirements which are to make a new profile first of all and then grant the View permissions to these profiles for the user subset.

An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE. What information must be supplied to the IDE during this process? Choose 3 answers: - The environment into which the changes was deployed - The related change set connection Information - The username and password of the destination environment - The data of the fields which are being deployed - The metadata components that need to be deployed

Answers

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

Assume there is a class AirConditioner that supports the following behaviors: turning the air conditioner on and off. The following methods provide these behaviors: turnOn and turnOff. Both methods accept no arguments and return no value. Assume there is a reference variable officeAC of type AirConditioner. Create a new object of type AirConditioner and save the reference in officeAC. After that, turn the air conditioner on using the reference to the new object.

Answers

//making reference object.

// the following line will declare a officeAC object of type AirAconditioner by //calling the class constructor by reference using "new" operator.

AirConditioner officeAC =  new AirConditioner();

// the following line will can the method of class AirConditioner to turonOn //the AC

officeAC.turnOn();

How do i add the sum of a column in excel?

Answers

Excel has a built in sum function to calculate the sum of elements. The syntax of this function is:

=sum(argument)

This formula is written in the destination cell where we need our sum to show up.

The argument is the cells , columns or range of cells and columns for which we need to find the sum. If we need to find the sum of elements in a column, the formula will be like:

= sum(A:A)

This formula will find the sum of all elements that are present in the column A. The argument in the above formula is A:A which represents that entire column A is selected.

This formula can be modified according to the needs. For example, if we need to find the sum of two columns A and B, the formula will be:

=sum(A:B)

This formula calculates the sum of all elements in columns A and B.

Given a String variable named line1 and given a Scanner reference variable stdin that has been assigned a reference to a Scanner object, read the next line from stdin and save it in line1. (Do not concern yourself with any possible exceptions here-- assume they are handled elsewhere.)

Answers

Answer:

Scanner stdlin = new Scanner(System.in);

line1 = stdlin.readline();

Explanation:

1.stdlin is the referenced input variable made by using built in Scanner class of Java language.

2.Than in line1 the next line from the console will be assigned by using readline function.

You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn’t seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial?

Answers

What are the following advertising methods?


One who is capable of identifying existing and predictable hazards in the surroundings, or working conditions
which are unsanitary, hazardous, or dangerous to employees, and who has authorization to take prompt
corrective measures to eliminate them is a/n
O A. Competent person
O B. OSHA Compliance Officer
O C. Qualified person
O DOSHA Outreach Trainer

Answers

Answer:

A: Competent Person

Explanation:

An OSHA “competent person”, by way of training and/or experience, has knowledge of applicable standards and authority to stop work deemed hazardous or that may cause harm to an employee. He/she has the authority, given from above, to correct workplace hazards. Such authority sets OSHA’S competent person apart from OSHA’S qualified person.

What is drill-down capability?
Multiple Choice
a. Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
b. The ability to look at information from different perspectives.
c. Finds the inputs necessary to achieve a goal, such as a desired level of output.
d. Enables users to get details, and details of details, of information.

Answers

Answer:

Enables the users to get details ,and details if details ,of information.

Explanation:

Drill - Down Capability is the capability that lets user to see more information by pointing and clicking on the specific element.For example - a report that displays literacy rate by state can allow the user to select a state and by clicking on it and user can see the literacy rate by county or city within that state.

Hence we conclude that option d is the correct answer that is  

Pete is designing a web page for a clothing company. He wants to show the different types of clothing lines available through a video. He wishes to use Adobe Flash Player to play the videos on the website.​Pete wants to set the playback quality parameter of the movie where the display quality of the video is favored over the playback speed. Which of the following values of the quality parameter must he apply to accomplish this?​false​true​low​high

Answers

Final answer:

Pete should set the quality parameter of the video to 'high' in Adobe Flash Player to prioritize display quality over playback speed.

Explanation:

Pete is designing a web page and wants to use Adobe Flash Player to play videos with a focus on display quality over playback speed. To achieve this, Pete should set the quality parameter of the video to 'high'. When the quality parameter is set to high, it ensures that the video will be displayed with the best quality possible, even if this means that the video might buffer or play back with less speed on slower internet connections or less capable devices. This setting prioritizes the visual experience for users who want to see the clothing lines with the highest image clarity and detail.

In a class hierarchy A. The more general classes are toward the bottom of the tree and the more specialized are toward the top B. The more general classes are toward the top of the tree and the more specialized are toward the bottom C. The more general classes are toward the left of the tree and the more specialized are toward the right D. The more general classes are toward the right of the tree and the more specialized are toward the left

Answers

Answer:

Option B

Explanation:

Option A is rejected because the general behavior of the objects are the reason that the classes concept was introduced and thus the general class should be on the top.

Option B is selected because down the hierarchy the common behavior in classes are reduced and thus they became more specialized and thus the specialized classes should be bottom to the general ones.

Option C is rejected because hierarchy works from top to bottom not from left to right.

Option D is not answer because hierarchy has nothing to do with left and right.

What will be the output of the following code snippet? token = False while token : print("Hello")
A) "Hello" will continue to be displayed until the user stops the program.
B) No output because of compilation error.
C) No output after successful compilation.
D) "Hello" will be displayed only once.

Answers

Answer:

Hi!

The correct answer is B.

Explanation:

The code snippet doesn't follow the correct form of writing a while loop, so it will crash when compiles.

One correct form to write the code is:

token = false;

while (token){ // Evaluate token, if true prints else terminates the loop. In this case, token is false so, no output and finish the program.

     print("Hello");

   };

A(n) ____________ for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.​

Answers

Answer:

​algorithm

Explanation:

A(n) ​algorithm for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.​

A(n) algorithm is a collection of instructions for a computer program that describes how to start with information. That is already known and is defined in a problem statement, and how to use that knowledge to modify it in order to find a solution. ​

What algorithm information specified in an issue statement?

A set of instructions called an algorithm is what a computer must follow in order to conduct calculations or other problem-solving tasks. A formal definition of an algorithm is that it is a finite set of instructions that are followed in a particular order to complete a specified goal.

Algorithms include maths equations and recipes. Algorithms are used in programming. Algorithms power the internet, which is how all online searching is done.

Therefore, an (algorithm )  for a computer program is a set of steps that explains how to begin with known information specified in an issue statement and how to manipulate that information to arrive at a solution.​

Learn more about algorithm here:

https://brainly.com/question/22984934

#SPJ5

Which statement is NOT CORRECT?

In a file approach to data management, the data definitions are included in each application separately.
The file approach to data management causes the same information to be stored separately for different applications.
In a file approach to data management, a change in the structure of a data file is easily handled because each application has its own data files.
In a file approach to data management, different applications could be using older and newer versions of the same data."

Answers

Option C is not correct because in file system there is problem of using same data at different place with old and new updated versions and thus change in the data on one file is not reflected on the other related files implicitly rather we will have to change the data in each file manually which is indeed not easy task. In fact that is one of the biggest drawback of file system.

Option A is correct because the files of different data has separate definitions of the topics they are about.

Option B is correct because has no reversibility and thus same data can be present on different files.

Option D is correct because because of no reversibility the files can have same records with new or old versions

Limiting the amount of personal information available to others includes reducing your ______________ footprint

Answers

The blank should be filled with "digital"

Write an if/else statement that adds 1 to the variable minors if the variable age is less than 18, adds 1 to the variable adults if age is 18 through 64, and adds 1 to the variable seniors if age is 65 or older.

Answers

Answer:

Explanation:

data is a statement like

data 10,20, 30 , 40 , 50, 60 , 70, 80

\\the numbers represent ages.

For x := 1 to end of data do a[x]:=read(data)

\\ This is a comment. You could do this much easier if you just use three if statements rather than the if then else.

minor:=0;adult:=0;senior:=0;

while a[x] <> 0 do begin

age:= a[x]

if age < 19 then minor:=minor + 1;

If age > 18 then if age < 65 the adult:=adult + 1;

if age > 64 then senior := senior + 1;

end;

I have not declared the variables anywhere. That depends on what language you are using. The key step you  want are the three if statements. How you find out what's in them is another matter.

Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y, the message Your request is being processed is printed if response is n, the message Thank you anyway for your consideration is printed if response is h, the message Sorry, no help is currently available is printed for any other value of response, the message Invalid entry; please try again is printed.

Answers

// Here is the required switch statement on response character

switch(response){

case 'y': // case to check if the response is y

cout<<" Your request is being processed ";

case 'n': // case to check for n

cout<<" Than you, anyway for your consideration";

case 'h': // case to check for h

cout<<"Sorry \, no help is currently available.";

default : // default case

cout<< Invalid entry: please try again.";

}

Assume that two parallel arrays have been declared and initialized: healthOption an array of type char that contains letter codes for different healthcare options and annualCost an array of type int. The i-th element of annualCost indicates the annual cost of the i-th element of healthOption. In addition, there is an char variable, best2.Write the code necessary to assign to best2 the health option with the lower annual cost, considering only the first two healthcare options.

Answers

/*

Since we have to check the first two options only as mentioned in last part of question the loop will work 2 times only and will compare the cost of first element and second and assign the healthoption accordingly

*/

for(int i =0;i<=1;i++){

if(annualCost[i]<annualCost[i+1]

best2 = healthOption[i]

else

best2 = healthOption[i+1]

}

Dr. Apple wants to study a drug to manage diabetes in adolescents. The researcher plans to use an electronic informed consent (eIC) form presented on a tablet device. Per FDA guidance on the “Use of Electronic Consent in Clinical Investigations” (2016), can adolescent subjects assent using an electronic device?

Answers

Answer: Yes, the eIC could be used for assent.

Explanation:

Electronic informed consent (eIC) may be used for seeking, confirming and documenting informed consent.

Answer:

TRUE, the eIC process can be used for assent.

Explanation:

The eIC process can be used to obtain the consent of pediatric subjects and parental permission.

Technological advances led to new forms of data collection in clinical research. This type of process seeks to provide adequate information about the research to the subjects who participate in it in order to allow this information to allow them to make a voluntary decision about their inclusion in the study.

PowerPoint displays many that are varied and appealing and give you an excellent start at designing a presentation. However, you have a specific topic and design concept and could use some assistance in starting to develop the presentation.
(A) Icons
(B) Themes
(C) Advertisements
(D) Catalogs

Answers

Answer:

The answer is themes.

Power point displays many themes

Explanation:

A power point theme is a combination of effects,fonts and colors that can be applied to the presentation.It makes the presentation more attractive and beautiful if used properly and smartly.Power point has built in themes that gives excellent start to your presentation.

Given a int variable named yesCount and another int variable named noCount and a char variable named response, write the necessary code to read a value into response and then carry out the following: if the character typed in is a y or a Y then increment yesCount and print out "YES WAS RECORDED" if the character typed in is an n or an N then increment noCount and print out "NO WAS RECORDED" If the input is invalid just print the message "INVALID" and do nothing else.

Answers

// reading the value in response variable

cout<<"Enter the value :";

cin>>response;

// checking the value and printing the results

if(response == 'y' || response == 'Y')

{

yesCount+=1;

cout<<"YES WAS RECORDED";

}else if(response == 'n' || response == 'N')

{

noCount+=1;

cout<<"NO WAS RECORDED";

}else

cout<<INVALID";

Final answer:

To record yes or no responses, the code reads a char input, then increments corresponding counters based on the input value, and prints out a message. The counters maintain a count and total of the responses.

Explanation:

To handle the described scenario in a programming task, we would need to write a code block that checks the value of the char variable named response and, based on its value, increments either yesCount or noCount. Let's assume we're working with a language like Java, the following code snippet would achieve the desired functionality:

Scanner scanner = new Scanner(System.in);
char response = scanner.next().charAt(0);
if (response == 'y' || response == 'Y') {
   yesCount++;
   System.out.println("YES WAS RECORDED");
} else if (response == 'n' || response == 'N') {
   noCount++;
   System.out.println("NO WAS RECORDED");
} else {
   System.out.println("INVALID");
}

The code starts by waiting for the user to input a character. If the character is 'y' or 'Y', yesCount is incremented and a message is printed out. Similarly, if the character is 'n' or 'N', noCount is incremented and a corresponding message is issued. If the input is neither of these, the input is deemed invalid and an "INVALID" message is printed. This process helps in maintaining a count and total of the 'yes' and 'no' responses.

What is the most downloaded iphone application of all time?

Answers

Answer:

You

Tube is the most popular.

Other Questions
he University Health Center receives 500 flu vaccinations at the beginning of each flu season. Suppose they offer these vaccines for $20.00 each. Assume that college students have varying budgets, some have some money to spare, some are on a very tight budget. Some students have preexisting conditions, such as asthma and diabetes, that place them at high risk for the flu. Who will receive the vaccines if the University Health Center sells them for this price? the students who will pay for them at that price the students who most need them the students with asthma and diabetes the students who most want them Suppose the school sells all of the vaccines at this price. What has it managed to achieve? Choose the best answer. Which sentence is an example of faulty coordination?a. Basketball is an exciting sport that was invented in 1891.b. Basketball, which was invented in 1891, is an exciting sport.c. Invented in 1891, basketball is an exciting sport.d. Basketball is an exciting sport, and it was invented in 1891. You are trying to decide if your brother's obsession with neatness is a problem. You consider whether the behavior is atypical, dysfunctional, distressful, and/or deviant in order to assess whether it truly is: Paragraph blocks are especially useful in problem-and-solution essays because they allow a writer to? Write a c++ program that accepts a string from the user and then replaces all occurrences of the letter e with the letter x What is 2 to the power of three halves equal to? when plants make flowers, gene A is expressedin whorls 1 and 2, gene B is expressed in whorls 2 and 3 and gene C in whorls 3 and 4; gene D in contrast is expressed in 2,3 and 4. What is predicted to be the consequence of homozygosity for a null mutation in gene C?a) no sepalsb) no petalsc) no petals or sepalsd) no gametes Find the greatest common factor of 28 and 42. 2 4 714 What is diverticulosis in the sigmoid colon Evaluate: (35 + 25)2 + 3A) 123B) 98 Choose the expression that represents a quadratic expression.a. 9x - 2b. 5x^2 + 9x - 1c. -2x^3 + 8x^2 - 7x + 1d. x^4 - 12x^3 + 8x^2 - 7x + 1 Just how far should an employee go with loyalty? Are there boundaries? Angela and Brian were measuring the length of each side of the same box, in order to find its volume. They both measured the sides to be 7.2, 3.5, and 8.7. Angela, to avoid mistakes in rounding, first found the volume and then rounded to the nearest whole number. Brian, on the other hand, decided to take the easy route and rounded the length of the sides to the nearest integers and then found the volume using the rounded lengths. What was the positive difference between Angela's and Brian's rounded volumes? (Note: The volume of a box is defined to be the product of its three sides.) Suppose that you and a friend are playing cards and you decide to make a friendly wager. The bet is that you will draw two cards without replacement from a standard deck. If both cards are clubs, your friend will pay you $531. Otherwise, you have to pay your friend $32. How much would you expect to win or lose? In early July, Damon Rutton purchased a $70 ticket to the December 15 game of the Sarasota Shippers. Parking for the game was expected to cost approximately $22, and Rutton would probably spend another $15 for a souvenir program and food. It is now December 14. The Shippers were having a miserable season and the temperature was expected to peak at 5 on game day. Damon is thinking about skipping the game and taking his wife to the movies and dinner, at a cost of $50. The amount of sunk cost that should influence Damons decision to spend some time with his wife is How do you do this question? We have 7 boys and 3 girls in our church choir. There is an upcoming concert in the local town hall. Unfortunately, we can only have 5 youths in this performance. This performance team of 5 has to be picked randomly from the crew of 7 boys and 3 girls. What is the probability that exactly 4 boys are picked in this team of 5? Three balls are tossed with same initial speed from a fourth floor dormitory window. Ball A is launched 45 degrees above the horizontal, Ball B is launched 45 degrees below the horizontal, and Ball C is launched horizontally. Which ball hits the ground with the greatest speed A 51-year-old female visits her health care provider for vaginal bleeding and low back pain. Her health history includes anxiety disorder, type 2 diabetes, and hypertension. She is 52 tall and weighs 224 lbs. She smoked cigarettes for 25 years but quit 8 years ago. She is post-menopausal for over a year. What is the reason for vaginal bleeding and low back pain? which function has the greater maximum value f(x)=-2x^2+4x+3 or g(x), the function in the graph?