determine the correct usage for styles and themes by placing each characteristic under the correct category​

Answers

Answer 1

Answer:

Styles create bulletin lists and are found in the format tex tab change indentation

Themes change page colors, create message borders, are found under options tab


Related Questions

unanswered questionl

Answers

¿ ? ¿ ? Whattttt ? ¿ ? ¿

Answer: What

Explanation:

PLS HELP SO I CAN PASS WILL GIVE BRAINLINESS AND 30 POINTS
Charlie Chaplin is know for developing

a
The Dramedy
b
Early Special Effects
c
Slap-Stick
d
The Prat-Fall
Question 2 (1 point)
Chaplin felt it was important for the audience to

a
turn off their cellphones during the movie.
b
believe the stunts were real by doing them himself.
c
escape from their problems by avoiding difficult topics.
d
have an emotional connection with the characters.
Question 3 (3 points)
Match the silent film with its modern influence

Column A
1.
Metropolis:
Metropolis
2.
The Kid:
The Kid
3.
Nosferatu:
Nosferatu
Column B
a.Freddy Kruger
b.The Simpsons
c.Sharknado
d.Star Wars
Question 4 (1 point)
How did Nosferatu change the Vampire cannon (story)?

a
Vampires are friendly
b
Vampires can be killed by sunlight
c
Vampires can become invisible
d
Vampires can be repelled by garlic
Question 5 (1 point)
Metropolis was the first film to

a
have religious undertones.
b
use special effects.
c
have humanoid robots.
d
use Gothic Imagery.


movies being the kid , nosferatu , and metropolis

Answers

Answer:

a

have religious undertones.

b

use special effects.

c

have humanoid robots.

d

use Gothic Imagery.

Explanation:

8. It is used to get qualitative data.​

Answers

Answer:

please give me brainlist and follow

Explanation:

Qualitative data describes qualities or characteristics. It is collected using questionnaires, interviews, or observation, and frequently appears in narrative form. For example, it could be notes taken during a focus group on the quality of the food at Cafe Mac, or responses from an open-ended questionnaire.

Imagine that you are helping to build a store management system for a fast food restaurant. Given the following lists, write a program that asks the user for a product name. Next, find out if the restaurant sells that item and report the status to the user. Allow the user to continue to inquire about product names until they elect to quit the program.

Answers

Answer:

The program in python is as follows:

def checkstatus(food,foodlists):

   if food in foodlists:

       return "Available"

   else:

       return "Not Available"

foodlists = ["Burger","Spaghetti","Potato","Lasagna","Chicken"]

for i in range(len(foodlists)):

   foodlists[i] = foodlists[i]. lower()

food = input("Food (Q to quit): ").lower()

while food != "q":

   print("Status: ",checkstatus(food,foodlists))

   food = input("Food (Q to quit): ").lower()

Explanation:

The program uses function.

The function is defines here. It accepts as input, a food item and a food list

def checkstatus(food,foodlists):

This check if the food is in the food lists

   if food in foodlists:

Returns available, if true

       return "Available"

Returns Not available, if otherwise

   else:

       return "Not Available"

The main begins here.

The food list is not given in the question. So, I assumed the following list

foodlists = ["Burger","Spaghetti","Potato","Lasagna","Chicken"]

This converts all items of the food list to lowercase

for i in range(len(foodlists)):

   foodlists[i] = foodlists[i]. lower()

Prompt the user for food. When user inputs Q or q, the program exits

food = input("Food (Q to quit): ").lower()

This is repeated until the user quits

while food != "q":

Check and print the status of the food

   print("Status: ",checkstatus(food,foodlists))

Prompt the user for another food

   food = input("Food (Q to quit): ").lower()

The five types of personal computers are: desktops, laptops, tablets, smartphones, and

Answers

Answer:

microcomputers

Explanation:

els
2.4
The SPCA receives an amount of R8 500 per annum from an undisclosed
donor. The amount has been growing at a rate of 7.5% per annum
IE
REQUIRED
Calculate how much the donor must have invested as a lump sum to be able
to continue with these payments indefinitely.
(2)​

Answers

Answer:

ds2d2d2d2dd

Explanation:

To understand, read, and give meaning to data in
tables and charts is to perform which of the
following?

A interpretation

B analysis

C assessment

D data collection

Answers

Answer:

teh answer is b

Explanation:

which of the

following?

A interpretation

B analysis

C assessment

D data collection

Answer:

interpretation

Explanation:

1

The following Mic1 microcode excerpt shows support for a possible 7 bit opcode, 8 bit integer argument machine instruction (organized like the INSP instruction). This part of the microcode will be reached after the instruction opcode has been parsed and identified by earlier parts of the microcode and while the IR contains the complete instruction from memory (as usual for the IR).

100:a := band(smask, ir);
101:a := a + (-1); if n goto 0;
102:ac := lshift(ac); if n goto 104;
103:goto 101;
104:ac := ac + 1; goto 101;
If this possible instruction had a masm assembly pneumonic of XXXX , and was used in an assembly program as shown below:

.
.
LODD abc:
XXXX 7
HALT
.
.
abc: "lost"

What would the 16 bit content of the AC look like when we hit the HALT instruction?

a. 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1
b. 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0
c. 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1 1
d. 0 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0

Answers

Answer:

The answer is "Option A".

Explanation:

In the first 2 signatures in a string, the "ol" with both the "l" throughout the low byte environment is included, and so the initial bit layout becomes: Number of [tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0[/tex] Its high 7 bits are moved to the lower 7 having come until the correct circular change of 7 is done:

[tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0 \ \ \ to \ \ 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1[/tex]

why do we need to settle technology in business?​

Answers

Answer:

Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.

discuss five domains of Instructional technology​

Answers

Answer:

Design, Development, Utilization, Management, and Evaluation.

Means having a current knowledge and understanding of computer mobile devices the web and related technologies

Answers

Answer:

"Digital literacy" would be the appropriate solution.

Explanation:

Capable of navigating and understanding, evaluating as well as communicating on several digital channels, is determined as a Digital literacy.Throughout the same way, as media literacy requires the capability to recognize as well as appropriately construct publicity, digital literacy encompasses even ethical including socially responsible abilities.

what is descriptive research​

Answers

Answer:

Descriptive research is used to describe characteristics of a population or phenomenon being studied. It does not answer questions about how/when/why the characteristics occurred. Rather it addresses the "what" question

combination of star topology and star topology can consider as hybrid?​

Answers

Answer:

no

Explanation:

A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology.

Write a C++ function for the following:
Suppose that Account class has a method called withdraw, which will be inherited by Checking and Savings class. The withdraw method will perform according to account type. So, the late bind is needed. Declare the withdraw method in Account class. The method should take a double input as withdraw amount and output true if the withdraw successfully and false if the withdraw unsuccessfully.

Answers

Solution :

class Account

[tex]$ \{ $[/tex]

public:

[tex]$\text{Account}()$[/tex];

double [tex]$\text{getBalance}$[/tex]();

void [tex]$\text{setBalance}$[/tex]();

[tex]$\text{bool withdraw}$[/tex](double bal);

[tex]$\text{private}:$[/tex]

double [tex]$\text{balance}$[/tex];

}:

[tex]$\text{Account}()$[/tex] {}

double [tex]$\text{getBalance}$[/tex]()

[tex]$ \{ $[/tex]

[tex]$\text{return balance}$[/tex];

}

void [tex]$\text{setBalance}$[/tex](double [tex]$\text{balance}$[/tex])

[tex]$ \{ $[/tex]

this.[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex];

}

[tex]$\text{boolean}$[/tex] withdraw([tex]$\text{double bal}$[/tex])

[tex]$ \{ $[/tex]

if([tex]$\text{balance}$[/tex] >= bal)

[tex]$ \{ $[/tex]

[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex] - bal;

[tex]$\text{return}$[/tex] true;

}

[tex]$\text{return}$[/tex] false;

}

}

How can the adoption of a data platform simplify data governance for an organization?

Answers

Answer:

by implementing models that predict compliance with data protection and data privacy policies.

Explanation:

A data platform is an IT system that helps an organization to organize, control and coordinate a large volume of data with the aim of making organizational systems faster and optimizing the decision-making process with effective strategic solutions for organizational success .

A database can simplify data governance for an organization by the fact that data is available to users determined by the organization itself, which increases the security and control of business-critical data.

This is a glitch ? 


 











































Answers

Answer:

I think no...Brainly might not allow unique text's.

Answer:

dunno???

Explanation:

Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy algorithm for binary search using a for loop is given in Algorithm 1.Algorithm 1BinarySearchFor(A)[[XXX TODO:pseudocode here]]2. Using the algorithm/algorithmic environment, give pseudocode using a while loop.Answer[[XXX TODO:your answer here]]3. Using the algorithm/algorithmic environment, give pseudocode using recursion.Answer[[XXX TODO:your answer here]]4. What is the loop invariant of your second algorithm

Answers

Answer:

Following are the Pseudo Code to the given question:

Explanation:

Following are the pseudo-code by using the For loop:

Defines the A function (node, element)

The node is larger than 0.

if another value of the node equals its element

Loop Break

That element if node. value becomes lower than that

Node is node equivalent.

right

Using other nodes is node equivalent.

 left

Node Return

If the node is vacant

print the Tree is empty

Following are the pseudo-code by using the while loop:

Defines the function A(node,element)

While this node is not zero.

if the value of the node equals the element

Loop Break

The element if node. value is lower than

Node is node equivalent.

right

Using other nodes is equivalent to an a.left node

Node Return

If the node is vacant

print Tree is empty

following are the Pseudo-code for recursion:

Set the function A (node, key)

If no root is the same as the root or no root.

return the root.

If the root value is lower than that of the quest for key return (root. right, key)

Return your lookup (root.left,key)

 

In the recursive function findMatch(), the first call is findMatch(array, 0, 4, key) . What are the remaining function calls to find the character 'e'?
public class FindMatch {
public static int findMatch(char array[], int low, int high, char key) {
if (high >= low) {
int mid = low + (high - low) / 2;
if (array[mid] == key) {
return mid;
}
if (array[mid] > key) {
return findMatch(array, low, mid, key);
}
else {
return findMatch(array, mid + 1, high, key);
}
}
return -1;
}
public static void main(String args[]){
char array[] = {'a','b','c','d','e'};
char key = 'e';
int result = findMatch(array, 0, 4, key);
if (result == -1) {
System.out.println("Element not found!");
}
else {
System.out.println("Element found at index: " + result);
}
}
}
a. (array, 2, 4, key) and (array, 3, 4, key)
b. (array, 2, 4, key), (array, 3, 4, key) and (array, 4, 4, key)
c. (array, 3, 4, key)
d. (array, 3, 4, key) and (array, 4, 4, key)

Answers

Answer:

The answer is "Option D".

Explanation:

In the given question "(array, 3, 4, key) and (array, 4, 4, key)", the element 'e' to also be searched is concentrated mostly on the right-hand side of the array since it is in the last place. This same middle value is 2 but findMatch(array, mid + 1 high, key) is labeled twice to move the center pointer to its last position, that is, so move that search item's 'e.'

Write a c++ to read seven days in an array and print it

Answers

Explanation:

Photosynthesis, the process by which green plants and certain other organisms transform light energy into chemical energy. During photosynthesis in green plants, light energy is captured and used to convert water, carbon dioxide, and minerals into oxygen and energy-rich organic compounds.

What is the effect when one part of a system changes? A. The entire system changes or could stop working. B. The closed-loop system becomes an open-loop system. C. The open-loop system becomes a closed-loop system. D. The larger system is not affected.

Answers

Answer:

c is the answer hope you get it right

The effect when one part of a system changes C. The open-loop system becomes a closed-loop system.

Systemic change is generally understood to require adjustments or transformations in the policies, practices, power dynamics, social norms or mindsets that underlie the societal issue at stake. It often involves the collaboration of a diverse set of players and can take place on a local, national or global level.

How does a systemic change happen?

All systems organize individual pieces into some sort of interrelated whole. Put simply, systemic change occurs when change reaches all or most parts of a system, thus affecting the general behavior of the entire system.

Why is systems change important?

A systems-change approach is more appropriate for problems that are complex, unpredictable, and context-dependent. For example, the challenge of inadequate access to educational opportunities for children from low-income neighborhoods cannot be addressed with a straightforward, logistical fix.

To learn more about A systems-change, refer

https://brainly.com/question/20798008

#SPJ2

Write a Python code that takes two sequences CATCGTCCT and CACCGACCG and prints the point mutations found when aligning the two sequences. Tip: you simply need to write a for loop to go over the length of the sequences, pick a letter from each position,and, compare the two sequences position by position for matches and report the mismatches.

Answers

Answer:

Following are the code to the given question:

def match_sequence(s1,s2):#Defining a method match_sequence that accepts two parameters

for l in range(len(s1)):#defining a loop that checks range of s1 value

if(s1[l] != s2[l]): # use if block to match each sequences

print('The sequence does not match at index: ',l+1)#print value with message

s1 = 'CATCGTCCT'#defining a string varible s1

s2 = 'CACCGACCG'#defining a string varible s1

match_sequence(s1,s2)#calling a method that prints its values

Output:

The sequence does not match at index: 3

The sequence does not match at index: 6

The sequence does not match at index: 9

Explanation:

In this code, a method "match_sequence" is declared that takes two string variable "s1 and s2" in its parameters, and inside the method, a loop is declared that checks the range of s1 value and use if block to match each sequence and use a print method that prints it values.

Outside the method, two string variables are declared that holds a string value that passes into the "match_sequence" method and calls it.

help asapp!!!!!! give the technical name means (write the name in one word) . the feature of virus which copies itself..​

Answers

Answer:

if a computer is made out of many copies it can cause a virus with a definition of a tro Jan by a virus

Explanation:

what follows is a brief history of the computer virus and what the future holds for this once when a computer is made multiple copies of it's so several reducing malicious intent here but animal and prevade fit the definition of a Trojan buy viruses worms and Trojans paint the name Malwar as an umbrella term

Write a program that demonstrates how various exceptions are caught with catch(Exception exception). This time define classes ExceptionA (which inherits from class Exception) and ExceptionB (which inherits from class ExceptionA). In your program, create try blocks that throw exceptions of types ExceptionA, ExceptionB, NullPointerException and IOException. All exceptions should be caught with catch blocks specifying type Exception.

Answers

Answer:

Sorry mate I tried but I got it wrong!

Explanation:

Sorry again

Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and malware detection software

Answers

Answer:There are several software products and settings you can make that will help alert you to or protect you from certain kinds of technology attacks such as malware, viruses, and so on.   Use these programs and keep them up to date so they can defend you against the latest threats.

Explanation:

places where computer are used​

Answers

Answer:

Banks and financial.

Business.

Communication.

Defense and military.

Education.

Internet.

Medical.

Transportation.

etc..

Answer:

businesses, schools, colleges, medical offices, banks.

Discusstheimportanceofbackingupdatainorganizations,pointingoutthebenefits
ofcloudbackupoption​

Answers

Addition helps kids master the relationships between numbers and understand how quantities relate to one another. Even when kindergartners can't reliably answer addition problems or manipulate large numbers, basic addition skills give them a framework for mastering math in elementary schoo

Simon has a folder that's just a little too large for his thumb drive. How can he make the folder smaller without deleting the contents? *

Answers

Answer:

Try zipping the folder.

Explanation:

This reduces the size of the content but doesn't make you delete anything.

The city of Green Acres is holding an election for mayor. City officials have decided to automate the process of tabulating election returns and have hired your company to develop a piece of software to monitor this process. The city is divided into five precincts. On election day, voters go to their assigned precinct and cast their ballots. All votes cast in a precinct are stored in a data file that is transmitted to a central location for tabulation.

Required:
Develop a program to count the incoming votes at election central.

Answers

Answer:

Explanation:

The following program asks the user to enter the precinct number and then loops to add votes until no more votes need to be added. Then it breaks the loop and creates a file called results to save all of the results for that precinct.

precinct = input("Enter Precinct Number: ")

option1 = 0

option2 = 0

while True:

   choice = input("Enter your vote 1 or 2: ")

   if int(choice) == 1:

       option1 += 1

   else:

       option2 += 1

   endVote = input("Vote again y/n")

   if endVote.lower() != 'y':

       break

f = open("results.txt", "w")

f.write("Precinct " + precinct + ": \nOption 1: " + str(option1) + "\nOption 2: " + str(option2))

Ling has configured a delegate for her calendar and would like to ensure that the delegate is aware of their permissions. Which option should she configure?

Delegate can see my private Items
Tasks > Editor
Inbox > None
Automatically send a message to delegate summarizing these permissions

Answers

Answer:

Tasks>Editor (B)

Explanation:

I just did the test

Answer:

Tasks > Editor

Explanation:

Did the test

An A record contains what

Answers

Answer:

IP address

Explanation:

An A record is actually an address record, which means it maps a fully qualified domain name (FQDN) to an IP address.

Answer:

IP adress. the person above me is correct

Other Questions
Which expression is equivalent to ? Assume Decrease 117 kg in the ratio 10:13 For years India was ruled by the British East India Company. However, after several riots, the British government stepped in and assumed responsibility for ruling the South Asian country. Why did the British government feel the need to replace the British East India Company?The British government, hoping to remain the most powerful country in the world, decided to gain control of all the wealth generated in India.British citizens did not like havng to pay to settle disputes caused by independent companies, so they pressured their government to take control.The British government believed that the British East India Company was causing too much disruption in India's social structure.Managers at the British East India Company realized they were was losing control and asked the British government to step in. ILL MAKR YOU AS BRAINLIEST Choose the reasons Andrew Jackson likely won the election of 1828: (place an x by the reasons)_____ He gave away money_____ He appealed to voters by campaigning in public_____ He ran a strong campaign qu'est ce qui a motive joseph kessel decrire les mains du miracle? The total cost of 5 boxes of pasta is $13.00. There are 12 ounces of pasta in each box. Each box of past costs the same amount.What is the cost, in dollars, of the minimum number of boxes needed to total 48 ounces of pasta? I have alot of Health Questions and English Questions that nobody has helped me on can any one thats 100 % excellent on these two subjects please click on my name and go to my questions and please only answer them if your 100% correct. Im failing both subjects and need to bring my grade up. What is the value of i^12? i need all the steps to the solution i need help with this Marty was renting a boat and wanted to get the best plan. Rental and plan A charges a fee of $50 plus $25 per hour. Plan B charges a fee of $10 plus $35 per hours. Write a system of equations that represent the situation above. Life science is the study of living things.According to this definition, a life scientist wouldmost likely study.Why is the answer cellular reproduction?? What was the Massive Resistance movement?Group of answer choicesa protest against school segregationa student movement to prevent desegregationa plan to prevent desegregation in schoolsa movement to unite black voters in the South What is most likely true about Tia? From Abdel Fattah estedameLearning ActivitiesLearning Task 3Directions: Read the text below and answer the following questions. Do thisin your notebook.How to Moid a SculptureFirst, clean the clay by getting rid of the bits of sand and dirt from it. Then add orremove water from the clay if necessary. If the clay is too wet, it will not hold a shape.And if it is too dry, it will not be flexible enough to mold. Next begin to shape the clayinto something with your bare hands or with foois. Roli and push clay into shapes orpull off and stick back on different places. After the clay has been molded, put it intoa kind of oven to be fired. Then, build a fire. As the fire slowly gets hotter and hotterwater is baked out of the clay. Sooner or later, the clay dries up and becomes hardwith a new shape. Remove it from the oven and let it cool. Afterwards, you may paintit or put some desians of your choice on it.Answer the following questions:1. What is the text about?2. How many steps in the process are given?3. What are those steps?4. What words are used to introduce the steps?5. What type of text is the example above? Match the questions with the correct answers about the given box plot below What is the value of x? Round to the nearest tenth Why were people drawn to authoritarian leaders during the Great Depression? Select an equation that is equivalent to a^2-144b^2 a) (a-12b)^2 B) (a+12b)^2 C) (a-12b)(a+12b) C) a^2-24ab+144b^2 Find the value of x. Then find the mB and mC.