Answer:
he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any
Explanation:
WILL MARK A BRAINLIEST!!! PLS HELP!!!
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Answer:
man, just got rick rolled brb going to cry
Explanation:
Daijōbu desho. Datte Kimi yowai mon.
Which command should you enter at the command prompt to display the current user's quota limits and disk usage?
una laptop agarra mas internet que una computadora de escritorio?
una laptop agarra mas internet que una computadora de escritorio?
Su computadora no puede afectar la velocidad de Internet de sus otros dispositivos. ... La única forma en que su computadora puede reducir la velocidad de Internet de otros dispositivos es si no obtiene suficiente velocidad de su ISP y sus dispositivos luchan por un ancho de banda limitado.^^
quadratic equation 4
In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.
HOPE IT HELPS:)
To break a page click the _______ tab
Answer: Page Break (or press ctrl + enter on keyboard)
Explanation:
With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.
Answer:
Your answer is...
Visual.With visual voicemail, users can view message details, and in some cases read message contents without listening to them.
I hope this helped at all.
A _____ agent can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.
Specific tasks such as the remembrance of key information when filling out Web forms can be performed by: personal agent.
A personal agent is also referred to as user agent and it can be defined as a computing software or hardware-based system that is typically designed and developed to perform specific tasks on behalf of an end user.
This ultimately implies that, a personal agent is an intelligent computer hardware or software program that can be configured to perform specific tasks on behalf of an end user.
For example, a personal agent can be configured to remember key information when filling out Web forms.
Read more: https://brainly.com/question/21656851
What is voice recognition system ?
Answer: Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
Explanation:
Answer:
Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands. ... Voice recognition systems enable consumers to interact with technology simply by speaking to it, enabling hands-free requests, reminders and other simple tasks.
what command can be used to repair a dual boot system?
Answer:
bootrec utility
Explanation:
It entirely depends on your version of windows and if you are even on windows, so I have no explanation, but for windows it is possible.
Helpppp adapppppopppppp
Explanation:
(A) trust me I'm computer hecker experts
What is the name of the table tools contextual tab that appears once you insert a table? Transform Design Outline Charts.
Answer: B.) Design
Explanation: just took it
Answer:
b
Explanation:
A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.What is the first step Accenture could take?
Accelerating output and hence, growth of an enterprise is one of the core functions of Accenture. Hence, the first step to be taken by Accenture is to design an Enterprise analytic strategy assessment.
Data science leverages the power of collected data combined with simple and complex machine learning algorithm in other to draw pattern and trends from data. Since, the healthcare provider is a large enterprise, the first step that should be followed would be to design a strategy to the assess the data available to the organization or enterpriseHence, the first step is to develop an enterprise analytic strategy assessment.
Learn more : https://brainly.com/question/25602226
Give a brief explanation about the internet.plsssss
Answer:
The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.
Explanation:
INTERNET is a short form of Interconnected Network of all the Web Servers Worldwide. It is also called the World Wide Web or simply the Web.
To use the Expression Builder to create a calculated field, select the column in the Field row, right-click to display the shortcut menu, and then click ____.
Answer:
square brackets [ ]
Explanation:
Hope I could help. Good luck with your studies .
What will print to the console after running this code segment?
A. 15.
B. 16.
C. 18.
D. 21.
Answer:
16
Explanation:
answer =3+2
answer =5+3
return 8 × 2
16 will print to the console after running this code segment. Therefore, option B is correct.
What do you mean by code segment ?A code segment, also known as a text segment or simply text, is a section of an object file or the program's virtual address space that contains executable instructions.
A character array segment that represents a text fragment. Even though the array is directly accessible, it should be treated as immutable. This allows for quick access to text fragments without the overhead of copying around characters.
In memory, the code segment functions normally as read-only memory and has a fixed size; thus, without the need for loading, it can generally be found in read-only memory (ROM) on embedded systems.
answer = 3+2, answer = 5+3
return 8 × 2
= 16
Thus, option B is correct.
To learn more about the code segment, follow the link;
https://brainly.com/question/20063766
#SPJ2
PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.
Answer:
JavaScript can be implemented using JavaScript statements that are placed within the ... HTML tag
Explanation:
You have been asked to store a file with personal information on it. You need to be sure that only your user account can access the file, even if other user account have been granted permissions or if the disk is stolen. What standard NTFS feature can you use
Answer:
EFS
Explanation:
how do the peograms on a computer work
Answer: Computer programs work by telling the CPU to use input in a given way, manipulate it in another way, and then present the results as wanted. As you type in the words that you wish to, for example, add, the calculator program tells the processor to display them on your computer's screen.
Explanation:
URGENT The HTML tag of a table cell content is
A. True
B. False
Which of the following can be considered as peripheral devices?
A). Primary storage media
B). User interfaces
C). Secondary storage media
D). Operating systems
The option that can be considered as peripheral device's is Primary Storage Media. Thus, option A is correct.
What is a peripheral device?A peripheral, also known as a peripheral device, is an auxiliary device used to input and output data from a computer.
Terminals, printer, outside floppy hard disks and other data storage devices, video displays, keyboards, interfaces cards, external memory adapters, and other input/output gadgets that might or might not contain digital circuitry are examples of peripheral devices.
The computer retrieves and stores the data in the primary storage device until the procedure is done, or the data is no longer needed. Primary storage devices include random-access memory (RAM), graphic card memory, and cache memory.
A computer peripheral is any outside device that allows the computer to receive and send data. Therefore, it can be concluded that option A is correct.
Learn more about peripheral device here:
https://brainly.com/question/21080721
#SPJ2
What is the name of the type of keyboard that contains a coiled spring and a rocker, and provides both tactile and audible feedback.
Answer:
Buckling Spring
Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this
Firewalls are used to screen and avoid block the threat posed by unwanted data or files that could want to penetrate into a system. Hence, the kind of firewall described is packet filtering firewall.
Packet filtering firewall describes a network security protocol which examines individual data packets entering into a system.Each data packet is screened based on established principles and protocols, with only those who meet the defined requirement allowed to reach their destination while others are dropped.Hence, the missing phrase is packet filtering firewall.
Learn more : https://brainly.com/question/25706522
translate ¨friends¨ into spanish
Answer: I hope this is helpful
Explanation:
Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun
Friends- trusted and caring person
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us
Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.
Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.
Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.
Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.
Read related link on:
https://brainly.com/question/25522987
Software that enables information to be obtained from a computer without the user's knowledge is ____________
Answer:
Spyware
Explanation:
what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?
In the design phase of the systems development life cycle (SDLC), the _____ design indicates hardware and software, such as specifying Linux servers and Windows clients. Select one:
Answer:
logical
Explanation:
PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.
Answer:
JavaScript can be implemented using JavaScript statements that are placed within the ... HTML tag
Explanation:
Answer : language
JavaScript is a scripting language, not a HTMLanguage type. It is mainly to do process at background and it needs document.
Which would a student most likely do in a digital laboratory? conduct an experiment in chemistry take continuing education classes in chemistry look for an out-of-print book about chemistry watch an instructional video about chemistry.
Answer:
conduct an experiment in chemistry
Explanation:
A digital laboratory is an interactive online tool, where students are asked to mimic an experiment.
Answer:
"conduct an experiment in chemistry"
Explanation:
A digital laboratory is an online tool used to conduct chemistry experiments when, say, you are at home or the tools needed are dangerous. It also helps to make sure you have exact results since it is computerized.
Have a nice day!
I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)
- Heather
DIRECTIONS: Organize your desktop. Name the 5 folders based on the files given below. Organize your own desktop by sorting the given files accordingly.
Please
I need help
Answer: Music, Documents, PowerPoints, Pictures/Videos, Audios