Check
Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked? Check all that
apply.

Answers

Answer 1

Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked? Check all that

apply.

Indent the ideas in the bulleted list.

Change the number level of the list.

Choose the bullet to be used in the list.

Define the new bullet to be used in the list.

Pick the number format to be used in the list.

Answer:

Choose the bullet to be used in the list.

Define the new bullet to be used in the list.

Explanation:

When using Microsoft Word text editor, when the drop-down menu of the bullet icon is clicked, the following tasks can be accomplished which are to choose the bullet to be used in the list and define the new bullet to be used in the list.

A bullet is used to identify or list out important items, sometimes in ascending order, and are used to organize information to make the important points easy to pick out.

Answer 2

Answer:

Choose the bullet to be used in the list.

Define the new bullet to be used in the list.

Explanation:

.


Related Questions

Examine the following algorithm.
1. Get the student name.
2. Get the degree program name.
3. Subtract the number of credits taken so far from the required credits for the degree.
4. Get the number of credits required for the degree program.
5. Get the number of credits the student has taken so far.
6. Display the input information in Step 1 and 2.
7. Display the calculated information.
A. What logic error do you spot and how would you fix it?
B. What steps require user interaction (Ex: user must type in some input)?

Answers

Answer:

See the explanation please

Explanation:

A.

The algorithm tries to subtract the number of credits taken so far and the required credits for the degree before getting the number of credits required for the degree program and the number of credits the student has taken so far. Since the values are not known, calculation cannot be done.

Write the step 3 after step 5

B.

Step 1, 2, 4, 5 require user interaction, since it is asking the user to enter values

For this assignment, you will first prompt the user and read in two numbers from them. You need to check and make sure that both numbers are equal to or greater than 0 (can use an if or if/else statement for this). If so, multiply the two numbers together and print the new value to the screen.
If the user enters a number lower than 0, remind the user that they need to enter a number greater than or equal to 0 and exit the program.
Sample Runs
Sample Program Run (user input is underlined)
Please type in two numbers: 100 250
100 * 250 = 25000
Exiting program.
Please type in two numbers: -1 27
Please only enter numbers >= 0.
Exiting program.
(Here's an alternative way to do the same thing:)
Please type in one number: 100
Please type in a second number: 250
100 * 250 = 25000
Exiting program.
Please type in one number: -1
Please type in a second number: 27
Please only enter numbers >= 0.
Exiting program.

Answers

Answer:

number1 = int(input("Please type in one number: "))

number2 = int(input("Please type in a second number: "))

if number1 >=0 and number2 >=0:

   print(str(number1) + " * " + str(number2) + " = " + str(number1 * number2))

else:

   print("Please only enter numbers >= 0.")

print("Exiting program.")

Using a Loop:

while True:

   number1 = int(input("Please type in one number: "))

   number2 = int(input("Please type in a second number: "))

   if number1 >=0 and number2 >=0:

       print(str(number1) + " * " + str(number2) + " = " + str(number1 * number2))

       print("Exiting program.")

   else:

       print("Please only enter numbers >= 0.")

       print("Exiting program.")

       break

Explanation:

*The code is in Python.

Ask the user to enter two numbers

Check if they are both greater than or equal to 0. If they are, print their multiplication. Otherwise, print the remainder message

Print a message says "exiting program"

Note: Since I was not sure if the program keeps going until the user enters a negative value, I wrote two versions of the program. The one that uses the loop continues until the user enters a negative value.

How to represent derived attributes in database?

Answers

Answer:

Derived attribute can be defined as a type of attribute where its value will be derived from one or more of the other attributes of the same entity set.

Explanation:

An example of derived attribute is when we have an entity set called General. The set then has attributes like [Form], [Characteristics], [Address}, (Employment No).

(Employment No) which is represented distinctly in the attribute set can be called a derived attribute if it can be derived from one or more of the other attributes.

Derived attribute can be gotten through calculating values and not storing values.

For example, let us consider the following record of Teachers records;

(‘Teacher Number’, ‘Name’, ’Date of Birth’, Age today)

(‘E105’, ‘Samson’, ’07-Dec-1990’, 0)

This record shows that the teacher Samson was born on 7th of December, 1990. At the time of record insertion, he was born and 0 years old. What will be the value of his age on ’07-Dec-2000’? It is about 10 years. It clearly shows that the value is not fixed and it is a variable whenever the DOB is adjusted.

Therefore, we are not creating our table with derived attributes in it. Instead, the values ofderived attributes can be calculated at the time of retrieval and shown to the user. Hence, the record will look like as follows;

(‘E105’, ‘Samson’, ’07-Dec-1990’)

This means that 0 is a derived attribute from the Date of birth.

Diligent people are as concerned with the ____ as the ___ of their work

Answers

Answer:

Duration; quality/correctness.

Explanation:

Diligence is a way of life. It adds value to a piece of work. When a work is diligently done, it is said to be good or almost perfect. A diligent work evaluates all errors and corrects them from start to finish.

A diligent person takes time to analyse and complete a task to perfection. But diligence also comes with speed. A diligent work as to meet up with deadlines. Diligent people are also as concerned with the speed or duration of their work as to the correctness and quality.

Next
Digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. What is
that value called

Answers

Answer:

sampling height

Explanation:

Digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. The value is sampling height.

What are sound waves?

Sound waves are defined as the pattern of disruption brought on by sound energy leaving the sound source.

It is also defined as a mechanical wave that develops as a result of the medium's particles vibrating back and forth when the sound wave travels through it.

Sound waves are produced by these vibrations and travel through materials including wood, water, and the air.

The medium's particles move when an object vibrates, as well. Sound waves are the name for this motion, which continues until the particles run out of power.

Thus, digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. The value is sampling height.

To learn more about sound waves, refer to the link below:

https://brainly.com/question/21995826

#SPJ2

What kind of keybord is tis ned help pleese I don't no wat itis​

Answers

Answer:

judging by the logo at the top it's a hyperx keyboard and looks to be the alloy core rgb... hope this helps!

hyperX is the brand because it says it right at the top

50 pts. please help ! Explain briefly the role, responsibilities, and required background of the production designer of a film.

Answers

Answer:

Production Designers are responsible for creating and managing the visual aspects of a film, television or theatre production. They work closely with the Director and Producer to create the design style for aspects such as sets, graphics, props, lighting and costumes.

Explanation:

Answer:

The production designer makes sure the film looks good. They are professionally responsible to oversee its visuals. They should know the setting, characters, and time period. They make parts of the film based on the visual aspects. Years of experience regarding film should back them up so that they can manage the movie. They work with the director and producer as well. A style is be portrayed through costumes, lighting, props, sets, etc.

Explanation:

edg2021

I wrote this, change wording

Why is it important to use systems analysis and design methodologies when building a system? Why not just build the system in whatever way seems to be "quick and easy"? What value is provided by using an "engineering" approach? Also, Give a specific example of an organization (not one listed in the book) that does a good job of this and why.

Answers

Answer:

It encourages the documentation of the building process and serves as a good reference point when information about the system is needed. It also helps in the testing of the various components of the system for efficiency.

Explanation:

System analysis is the total evaluation of the working components of a system. it shows the health or functionality of components and analyzes the effect of their relationship on the total system performance.

The design methodology is an engineering process to achieving a complete system build. It follows a procedure, documenting its parameters and observations as the system is implemented.

Example of organizations that follows these methods in building their systems are automobile industries like Honda.

It promotes the recording of the construction process and acts as a helpful resource when details about the system are required. Additionally, it aids in the efficiency testing of the system's many parts.

What is System Analysis?

"The process of evaluating a procedure or business to define its aim and purposes and build systems and procedures that will efficiently achieve them," according to the definition of systems analysis.

System analysis is done to investigate a system or its components in order to pinpoint its goals. It is a technique for solving problems that makes the system better and makes sure that all of its parts function effectively to serve their intended purposes.

Six essential steps can be taken while creating a system. Systems analysis entails specifying the problem, its causes, the proposed solution, and the information need that a system solution must satisfy.

System analysis has a wide range of advantages, but it may also have significant drawbacks. The danger of conducting excessive analysis, which may be expensive and time-consuming, is one of the key drawbacks that is frequently disregarded. Finding the ideal balance is consequently a necessary aspect of the analyst's job.

To read more about System Analysis, refer to - https://brainly.com/question/28145726

#SPJ2

What is the first step you would take to create a table of authorities?
A. Open the table of authorities dialog box and select text.
B. Select the category before positioning the cursor on the page.
C. Mark citations before opening the Insert Table of Authorities dialog box.
D. Select text and open the Table of Authorities dialog box.

Answers

Answer:

C. Mark citations before opening the Insert Table of Authorities dialog box

Answer:c

Explanation:

Describing Editing Task
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
changing the size of the page
changing the case of a word
changing the spelling of a word
changing the margins of the page
changing a word to another word
3) Intro
Done

Answers

Answer:

changing the case of a word

changing the spelling of a word

changing a word to another word

Explanation:

What are the features that can extend record acees beyong Organization-wide defaults?A. Criteria-based sharing rules.B. Owner-based sharing rules.C. Public or private groups.D. Dynamic role hierarchy.

Answers

Answer: Criteria based sharing rules; Owner-based sharing rules.

Explanation:

The features that can extend record access beyond Organization-wide default are Criteria-based sharing rules and Owner-based sharing rules.

An owner-based sharing rule gives access to the records that certain users own. An example is when the sales manager for a company sees the opportunities that are owned by the sales managers in different locations. For the criteria-based sharing rule, it is not based on the record owners but rather on the record values.

You can get context-sensitive help information from the Code Editor by_________.A) selecting Contents from the Help menu
B) selecting Index from the Help menu
C) selecting Search from the Help menu
D) positioning the insertion point in a keyword and pressing F1

Answers

Answer:

D) positioning the insertion point in a keyword and pressing F1

Explanation:

In order to get context-sensitive help information from the Code Editor, a user should do the following:

1. call in your code to open the help topic with functions description

2. select the function name and press F1. This will open the topic with the function description

3. a user can view this help in the Microsoft Help Viewer or Web browser, this is based on the Visual Studio IDE Help settings.

Hence, the correct answer is: option D positioning the insertion point in a keyword and pressing F1

Write a recursive function that receives an array of integers and a position as parameters and returns the count of odd numbers in the array. Let each recursive call consider the next integer in the array.

Answers

Answer:

The following are the description of the recursive method:

public int recursive(int[] x1, int position) //defining a method recursive  

{

   if(position<x1.length) //defining if block that checks position value is less then array length

   {

       if(x1[position]%2==0) //defining if block that checks in array there is even number  

       {

           return 1+recursive(x1, position+1); //use return keyword to call method by incremnent value  

       }

       else//defining else block

       {

           return recursive(x1, position+1);//use return keyword to call method and add 1 in position value

       }

   }

   else//defining else block

   {

       return 0;//return value 0

   }

}

Explanation:

In the given code, a recursive method is declared, that accepts two integer variable "x1 and position", in which "x1" is an array variable, that pass in the function parameter.

In the method, the if block is used that checks the position values is less then array length. Inside this another, if block is used, that checks in the array there is an even number.

In the condition is true, it will call the method by adding the 1. otherwise, go to the else block, in this, it will call the method and add 1 in position variable.  

if the above condition is false, it will go to else block and return a value, that is "0".  

Which of these field types allows multiple, non-exclusive options?

Answers

Question:

Which of these field types allows multiple, non-exclusive options?

A. multi-part

B. checkbox

C. text

D. radio button

E. button

Answer:

The correct option is B) Checkboxes

Explanation:

Field types is a terminology often associated with Database Management.

A field type is often found in a data collection apparatus such a form. It's inherent quality or nature will determine the kind of data that it can collect.

Some field types allow for exclusive options. That is, in some data field types, it's impossible to select more than one option.

For example, a Button field type can only collect one type of value.

A Checkbox on the other can be configured to allow for multiple selections which may or may not be exclusive.

When working with Microsoft Access, for instance, you are required to select the name of the field and define the type of field data.

Cheers!

Network convergence refers to using a single_______________.

Answers

Answer:

Network, vendor, and bill.

Explanation:

Network convergence is a term used in communication networking that describes the productive synergy among telephone, video, and data transmission using a single network, vendor, and a bill. It enables usage of numerous devices and numerous services with single network, vendor, and bill.

Hence, in this case, it can be concluded that, Network convergence refers to using a single network, single vendor, and single bill.

Consider the partition problem: given n positive integers, partition them into two disjoint subsets with the same sum of their elements. (Of course, the problem does not always have a solution.) Design an exhaustive-search algorithm for this problem. Try to minimize the number of subsets the algorithm needs to generate.

Answers

Answer:

Please see below

Explanation:

The relevant algorithm has been attached as images herein as part a and part b. There are 2 important steps in solving this query.

First, you need to acquire a sum value of the array. For an odd sum, the output will come out as false since there cannot be 2 subsets whose sums are equivalent to each other.

Second, in case of an even sum, acquire sum divided by two and locate a subset of the array that has an equivalent sum to this (use recursion or dynamic programming).

Are natural languages capable of expressing algorithms?

Answers

Answer:

Yes.

Explanation:

Natural Language often referred to as Pseudocode, is capable of expressing algorithms. However, it is considered to be extremely difficult to employ due to the following reasons:

1. Natural language is extremely verbose

2. It lacks structure, hence, difficult to locate specific sections of the algorithms.

3. It has expanse meanings.

Therefore, it can be concluded that YES, natural languages capable of expressing algorithms

The development of various technologies led to many historic events. Use information from the Internet to describe one major historic event initiated by a technological development or discovery.

Answers

Answer:

The Compass

Explanation:

The compass was one of the foremost technological inventions that forever changed sea navigation.

Before its invention, sailors used landmarks to navigate and when it got dark, they had to stop and wait for daybreak before resuming their journey. Some other people used the inaccurate means of the sun and stars to navigate at sea.

But with the invention of the compass, all these problems were a thing of the past because the compass could provide direction despite the weather or time of the day and as a result, it opened more trade routes and assisted in the Age of Discovery.

Learning new skills will not help you become a better digital artist: True or false?

Answers

Answer:

false, it'll help a lot

Answer:

false

Explanation:

What type of program can you use to enter your java program?a) compiler.b) editor.c) spreadsheet.d) database.

Answers

Answer:

Editor

Explanation:

A compiler translates languages

A spreadsheet is a document in which data is arranged in columns and rows

A database is a structured set of data held in a computer

An editor allows you to, well, edit code

Hope this helps!

(Please mark Brainliest!)

What are 2 ways to access the vendor credit screen in quickbooks online?

Answers

Answer:

First by

Clicking

New Button (+) THEN click Vendor THEN click Credit

Secondly

Click Expenses Center then click New Transaction then finally click Vendor Credit

Answer:

Apply it to an existing unpaid bill, apply it to a future bill

Explanation:

Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party software application?
A. Sandboxing
B. Encryption
C. Code signing
D. Fuzzing

Answers

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access memory RAMb. Read-only memory (ROM)c. Compact disc (CD)d. Universal serial bus (USB)

Answers

Answer:

a. Radom Access Memory (RAM).

Explanation:

If a computer user modifies a document that is saved on his or her computer. This changes are stored on the Radom Access Memory (RAM) until the computer user save the document.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

The changes made when a document is modified before saving is stored on; A: Random Access Memory(RAM)

Radom Access Memory (RAM) can be defined as the short term memory of a computer system which makes it to handle all tasks and applications.

Thus means that RAM is a kind of temporary storage that will go off when you shut down the computer. Thus, it is the memory that is required for saving active changes you make before saving.

Read more about Random Access Memory at; https://brainly.com/question/86807

Which of the following are provided by most
professional organizations? Check all of the boxes
that apply.
uniforms
a code of conduct
legal representation
a network of professionals
skills validation

Answers

Answer:

B D E mark brain

Explanation:

i got a 100 on the whole lesson

Answer:

2. A code of conduct.

4. A network of professionals.

5. Skills validation.

Explanation: This is the correct answer on Edge 2021, just did the assignment. Hope this helps ^-^.

__________ is the most refined and restrictive service model. a) IaaS b) CaaS c) PaaS

Answers

Answer:

c) PaaS

Explanation:

Refined and restrictive service model allows the user to use full package of application stack as demand by the service. It should be noted that "PaaS" is the most refined and restrictive service model.

Platform as a Service known as (PaaS ) is computing platform that gives room for the user in the cloud to manage applications.

PaaS helps to overcome the problem in managing the complexity of software licence. Example of PaaS are window Azure,Apache Stratos.

A wall is built of bricks. What force is being applied to each brick from the bricks above? ​

Answers

Answer:

Gravitational Pull is the force that is being applied to each brick.

which bus slot provides highest video performance​

Answers

Answer:

The best slot to use for video cards is the PCI-Express x16 slot. The next best is the AGP slot. The next best is a PCI-Express x1 slot but video cards which fit that slot are very hard to find as of late 2006. The worst choice for a video card is a PCI slot.

what is TCP/IP adress​

Answers

Answer:

It's a computer networking protocol

Explanation:

TCP/IP stands for Transmission Control Protocol / Internet Protocol.

Hope this helps!

(Please mark Brainliest)

1. When should the architect begin the analysis?
2. What are the activities the architect must execute?
3. What is the set of knowledge domains applied to the analysis?
4. What are the tips and tricks that make security architecture risk assessment easier?

Answers

Answer: c

Explanation:

Because you divide the end to the five

1. Digital videos look sharpest when they are displayed at a resolution that is larger than the frame size.
2. Digital video is a core technology for which of the following?
(a) digital telivision
(b) video conferencing
(c) video messaging
(d) all of the above

Answers

Answer:

(d) all of the above

Explanation:

This is because, not only is digital video a core technology for digital television, it also happens to be a core technology for video conferencing and video messaging. This could be seen in its application in messaging apps for private discussion of for holding official meetings between employees in virtual conference.

Other Questions
How can new technologies in geography help us to answer geographys three key questions? Explain how these new technologies help us answer what, where, and why there. Give your answer in a short paragraph. Which fraction is equivalent to the fraction shown by this model. 12/9 How did early Hindus believe one could achieve union with ultimate reality? Which statement describes the structure of lipids?O composed of chains of monosaccharidesO composed of long chains of amino acidsO composed of single or double strands of nucleotidesO composed of a glycerol molecule bonded to fatty acid molecules Almaden Hardware Store sells two product categories, tools and paint products. Information pertaining to its 2021 year-end inventory is as follows:Inventory,by Product Quantity Per Unit Net Realizable ValueCategory Cost Tools: Hammers 110 $ 4.10 $4.60 Saws 110 9.10 8.10 Screwdrivers 210 1.10 1.70 Paint products: 1-gallon cans 410 5.10 4.10 Paint brushes 110 3.10 3.60 Required:1. Determine the carrying value of inventory at year-end, assuming the lower of cost or net realizable value (LCNRV) rule is applied to (a) individual products, (b) product categories, and (c) total inventory.2. Assuming inventory write-downs are common for Almaden, record any necessary year-end adjustment amount for each of the LCNRV applications in requirement 1. give examples of prevention to prevent illness or injuries A carpenter built a triangular support structure for a roof. Two of the angles of the structure measure 37 and 55. Find the measure of RTP, the angle formed by the roof of the house and the roof of the patio. PLEASE HELP PLEASE HELP every negative integer J is less than or equal to its inverse written in mathematical language why is math really hard An athlete goes to the gym to train for 90 minutes each day for as many days as possible. Write an equation that relates the number of days, d, that the athlete spends training if the athlete trains for 540 minutes. In a spreadsheet, there are many features that help you edit quickly.O TrueO False Would the bats be considered a keystone species for this ecosystem? Explain. You have an array of integers: int myints[10]; and the address of the first integer is be4350. What is the address of myints[1]? myints[2]? When did muslims were granted separate electorade? Can you WorkOut if you are having a tooth/gum ache?? WHO IS PAKISTANI.? :D how to increase current In the story Little Women, one family brings breakfast to another on Christmas morning. Read this passage and then answer the question that follows: A poor, bare, miserable room it was, with broken windows, no fire, ragged bedclothes, a sick mother, wailing baby, and a group of pale, hungry children cuddled under one old quilt, trying to keep warm. How the big eyes stared and the blue lips smiled as the girls went in. "Ach, mein Gott! It is good angels come to us!" said the poor woman, crying for joy. What explicit meaning can you find about the sick woman and her children from this text?(5 points) A. The father of the children left the family. b The children were cold and had not eaten. c The family bringing gifts pitied the children. d The woman would soon die from her illness. A rectangular yard is enclosed by 100 meters of fencing. The table shows some possible values for the length and width of the yard. >The area is in square meters How would you write -5.6 x 10-3 in standard form?