How to translate a word file with goole translator.

Answers

Answer 1

Answer:

Use the translation websiteClick "Browse your computer". A file selection dialog will pop up. Select the file. Select the translation languagePress 'translate'!

Note: The document translation option will only show on medium and large screens


Related Questions

Which action must take place inside a procedure to reserve space on the stack for two doubleword local variables

Answers


after MOV EBP,ESP, subtract 8 from the stack pointer (ESP)

What is a recent innovation in edge computing enhanced by 5G?.

Answers

A recent innovation in edge computing enhanced by 5G is placing computing resources physically inside the network infrastructure.

5G is the fifth generation of mobile communications operating on the basis of telecommunication standards, following the existing 4G.

5G technologies must provide higher bandwidth than 4G technologies, which will ensure greater availability of mobile broadband, as well as the use of device-to-device modes (direct connection between subscribers).

It also allows ultra-reliable large-scale systems communication between devices, as well as less latency, higher speed, and less battery power consumption than 4G equipment.

Learn more about computers in https://brainly.com/question/24836371

The ______is the first part of a packet that contains the source and destination addresses. Select your answer, then click Done.

Answers

The first part of a data packet that comprises the source and destination addresses of a network is called a: header.

In Computer networking, the transmission control protocol/Internet protocol (TCP/IP) model refers to a standard networking protocol that allows network devices and host computers to interconnect and communicate with one another over a network, especially through the transmission of data packets and an Internet protocol (IP) address.

Generally, an IP address is typically designed and developed to hold information about data packets. Thus, a header is the information at the beginning of a data packet that comprises the source and destination addresses of a network.

In conclusion, a header is the first part of a data packet that comprises the source and destination addresses of a network.

Read more on header here: https://brainly.com/question/20629962

What do we call any element within a computer program, such as a computer game, which simulated decision-making based on algorithms defined by game designers and programmers?

non-player characters (NPCs)

artificial intelligence (AI)

avatar

roguelikes

Answers

Answer:

AI - Artificial Intelligence

Explanation:

How do you calculate the file size of a text file?

Answers

Answer:

It is calculated by multiplying the surface area of a document (height x width) to be scanned by the bit depth and the dpi2. Because image file size is represented in bytes, which are made up of 8 bits, divide this figure by 8.

what do you think is the reason why there are two kinds of transmission mode in computer networking?

Answers

Answer:  Transmission mode or communication mode is referred to as transmission of data between two devices using a communication channel that includes an optical fiber, copper wires, wireless channels, and various storage media. The data that gets transmitted is in the form of electromagnetic waves. There are various ways of data transmission where the message that is passed is in the sequence of pulses using digital modulation. The transmission mode of data was first introduced in a computer networking system during the 1940s in modems, then in LANs, WANs, repeaters, and other networking system

is this what u are looking for?

If you used D*n as the criterion in a Short Text field called FirstName, what would appear in that field in the query results

Answers

When querying a list or table, the use of wildcard symbols maybe used to optimize the search result. The words D*n will return First names which starts with D and ends with n.

The (*) denotes that the search returns any values or alphabets inbetween D and n.

Names such as Dean, Don, Drezn and other rated names would be included in the returned query.

Therefore, the returned query would include names starting with the letter D and ends with the letter n.

Learn more : https://brainly.com/question/25586700

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. True False

Answers

Answer:

False

Explanation:

The DES encryption standard is believed to be weakened by the American government by containing shortened key lengths and 'S-boxes' of unknown origin.

How to remove link color and underline in html.

Answers

Answer:

To remove the underline from all hyperlinks on a page, follow these steps:

Open the page that you want to modify.

Click the Codetab.

Put the following HTML code before the <BODY> tag: <STYLE>A {text-decoration: none;} </STYLE>

Click the Designtab. Your hyperlinks no longer contain underlines.

The FAT method ______________.

a. keeps information about the block where bit vector is stored.

b. employs space maps to manage information about free blocks.

c. does not store information about free blocks.

d. incorporates free-block accounting into the allocation data structure.

Answers

The FAT method incorporates free-block accounting into the allocation data structure.

The File Allocation Table (FAT) method is a file system designed to store file information in a designated entry format. The operating system makes use of it to manage files on hard drives and other computer devices.

It usually comprises an entry for each block. As such, it is indexed via the block number. This helps to locate files faster based on the address of the given number of the free blocks as opposed to using the traditional grouping method.

Learn more about the File Allocation Table (FAT) method here:

https://brainly.com/question/4671431

Question 8 of 10
When is a table the most effective way to present information?
O A. When graphs are more expensive to create.
O B. When you want to show the parts of a whole.
O C. When you want to show how parts fit together.
O D. When you want to make many details available in an organized
way.

Answers

Answer:

C

Explanation:

Tables and figures are particularly effective when large amounts of information have to be presented and discussed in an effective way.

Answer:

D. When you want to make many details available in an organized way.

Explanation:

How to test nativeelement in angular.

Answers

Answer:

Dim or Overly Bright Lights. ...

Dead Battery. ...

Slow or Malfunctioning Accessories. ...

Trouble Starting or Frequent Stalling. ...

Growling or Whining Noises. ...

Smell of Burning Rubber or Wires. ...

Battery Warning Light on Dash.

Explanation:

make sure you check

When should you close the socket python tcp server client.

Answers

f socket refers to an open TCP connection, the connection is closed. If a stream socket is closed when there is input data queued, the TCP connection is reset rather than being cleanly closed. The descriptor of the socket to be closed

To close the socket you need to call shutdown() first and then close(), and shutdown takes an argument

How to add animation to img angular.

Answers

Answer:

Step 1: Enabling the animations modulelink. ...

Step 2: Importing animation functions into component fileslink. ...

Step 3: Adding the animation metadata propertylink

Beyond restoring normal operations and data, what else should be done during the recovery phase?.

Answers

Based on troubleshooting management, beyond restoring normal operations and data, one should correct the underlying root cause during the recovery phase.

The need for correcting the underlying root cause.

During the restoration of normal operations and data, it is essential to correct the root cause of the problem.

By correcting the root cause of the operational problem, will limit the chance of the problem recurring.

Also, correcting the root cause of the problem will make the operations free completely of any possible malicious issue.

Hence, in this case, it is concluded that the correct answer is "correct the underlying root cause during the recovery phase."

Learn more about Restoration of operation here: https://brainly.com/question/6983264

Three teams (Team A, Team B, and Team C) are participating in a trivia contest. Let scoreA represent the number of correct questions for Team A, scoreB represent the number of correct questions for Team B, and scoreC represent the number of correct questions for Team C. Assuming no two teams get the same number of correct questions, what code segments correctly displays the team with the highest number of correct questions?

Answers

To make comparison between a set of variables, the if-else statement is usually employed, Hence, the correct code segment which displays the team with the highest number of correct questions is the option A.

First it checks if ScoreA > ScoreB ; - - - #1st blockIf True ; then check if ScoreA > ScoreC ;

Then TeamA will be the highest, if otherwise then it will be TeamC

If the 1st block is false, then ScoreB > ScoreA;then check if ScoreB > ScoreC ;Then TeamB will be the highest, if otherwise then it will be TeamC

Hence, the correct option is A.

Learn more : https://brainly.com/question/25675806

Answer:

A

Explanation:

What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?.

Answers

Plug-and-play devices are electronic devices that do not require any device driver to be manually installed on the host device (computer) and as such they start functioning immediately they are connected to the host device (computer).

Plug-and-play (PnP) can be defined as a technology that is designed and developed to allow an operating system (OS) of a computer to automatically detect and configure a peripheral (input and output device) as soon as they are connected to the computer.

On a related note, a plug-and-play device is an electronic device that do not require any device driver to be manually installed on the host device (computer) and as such it start to function immediately it is connected to the host device (computer).

In Computers and Technology, some examples of a plug-and-play device include the following:

External hard-driveComputer monitorKeyboardWeb-camMouse

Find more information: https://brainly.com/question/17402566

Fill in the blank with the correct answer.

Question 1 options:

1) options


2) view


3) selection


4) history


5) navigate

1.
The ______ panel records user operations and can be used to reverse changes made to an image.

2.
The ______ panel is used to pan an image and zoom in and out

3.
The ______ bar displays options available for selected tool.

4.
The Actual Size and Fit Screen options are available in the ______ menu.

5.
The Lasso, Marquee, and Wand tools are examples of ______ selection tools.

Answers

Answer:

1. history

2. view

3. Selection

4. options

5. navigation

Explanation:

Hoped this helped. I am un-sure of a few.

RSA encryption relies on
_____. Select 4 options.

the use of prime numbers
the system time

a public key that the server and the user's computer know

a private key that only the server knows

the difficulty in factoring large numbers

Answers

Answer:

the difficulty in factoring large numbers

 a public key that the server and the user’s computer know

 

the use of prime numbers

a private key that only the server knows

Explanation:

ege 2021

RSA encryption relies on a private key that only the server knows. Option C is correct.

What is RSA?

RSA is a kind of asymmetric encryption that employs two distinct but linked keys. A communication can be encrypted using both the public and private keys in RSA cryptography. To decrypt a message, use the opposite key that was used to encrypt it.

The RSA algorithm is the foundation of a cryptosystem (a collection of cryptographic algorithms used for specific security services or purposes) that enables public key encryption and is widely used to secure sensitive data, especially when it is sent over an insecure network.

Therefore, option C is correct.

Learn more about the RSA, refer to:

https://brainly.com/question/14319307

#SPJ2

how important are operating system in our devices?​

Answers

Answer:

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language. An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.

(Hope this helps, please mark as brainiest <3.)

Which development model emphasizes small revisions that enhance the code and expand the functionality until the entire program is built

Answers

Answer:

Iterative

Explanation:

is the model that emphasizes small revisions, unlike waterfall which is in a linear sequential flow.

______ requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure.

Answers

SOX requirements requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure.

Sarbanes Oxley (SOX) requires that data security policies are being made, effectively communicated and enforced. This is needed for data security as well as protecting financial data needed for normal operations.

SOX requirements are needed to be met so as to perform compliance auditing.

Find out more at: https://brainly.com/question/17157670

Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name using that registered name along with his country code. The name has already been registered by someone else. What should Bob do

Answers

Answer:

bobo

Explanation:

alannah just purchased a smart lock for her front door. how can she connect her lock to the internet so she can control the lock when she’s away from home?

Answers

Answer: cellular connection

She can connect her lock to the internet so she can control the lock when she’s away from home by Bluetooth connection. The correct option is D.

What is a Bluetooth connection?

Bluetooth technology enables devices to communicate with one another without the use of cables or wires.

Bluetooth operates on a short-range radio frequency, and any device equipped with the technology can communicate as long as it is within the required distance.

Some devices can be connected to your phone via Bluetooth without the use of a cord.

After the first time you pair a Bluetooth device, your devices may pair automatically. If your phone is connected to something via Bluetooth, a Bluetooth icon will appear at the top of the screen.

Alannah can connect her lock to the internet and control it via Bluetooth while she is away from home.

Thus, the correct option is D.

For more details regarding Bluetooth connection, visit:

https://brainly.com/question/28258590

#SPJ2

Your question seems incomplete, the missing options are:

A. network cable

B. cellular connection

C. power cable

D. Bluetooth connection

A technology ____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.

Answers

Answer:

A technology __cycle __ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.

Explanation:

Hope its help

EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.

Answers

Electronic data interchange (EDI), e-cash, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

Electronic data interchange (EDI).e-cash. Smart cards.Digital certificates.

Read more: https://brainly.com/question/24112967

What is the difference between the dom api and the html dom api.

Answers

The DOM-core is the object model that is common for all XML documents (including HTML) with elements and attributes. The HTML-DOM is an extension of the core DOM with more specific interfaces for the various HTML elements.

Create an application that prompts the user for a number and then displays the numbers 1 through the number entered, each on a separate line. Below the numbers, the sum is displayed.

Answers

Answer:

In Python:

start = num(input("Enter a number: "))

sum = 0

for x in range(1, start+1):

sum += x

print (x)

print ("Final Sum: " + sum)

Answer:

import java.util.Scanner;

public class NumberSum {

public static void main(String[] args) {

// TODO Auto-generated method stub

int num, sum=0,num1=0;

Scanner input=new Scanner(System.in);

 

System.out.println("Enter a number");

num=input.nextInt();

input.close();

 

do{

System.out.println(num1);

num1+=1;

sum+=num1;

}while(num1<=num);

System.out.println(sum);

}

}

Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.

Answers

Answer:   you said "Tamara needs to use

operators to organize the students' grades, then

operators to compare the results."

i think your right

Explanation:

sounds right.

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

Other Questions
Kyle Lowry earned $31.2 million in US dollars playing for the Toronto Raptors during the 20182019 season. How much was he earning in US dollars each hour of the year?A $2050.20 B $1872C $3562D $1300 Which of the following would most likely occur at point D on the business cycle?dwindling prosperityunemploymentincreased incomedecrease in GDP It takes Max three hours to run 30 kilometers. Georges, on the other hand, travels the same distance in 2 hours and 20 minutes. If both are to complete a 15-kilometre race, how long before Max will Georges arrive to the finish line? a country opens to trade. if the world price of a good exceeds the domestic price, the result will be: How many pints are equivalent to 2 1/4 gallons. Prepare a diet log for 7 days of the week.diet log should reflect three consecutivemeals of the day (i.e. breakfast, lunch, dinner,snacks, etc.) All food items and beveragesconsumed are to be recorded on the log. What are a least 2 problems America was facing in 1780? a chef is going to use a mixture of two brands of Italian dressing. The first brand contains 5% vinegar and the second Brian contains 15% vinegar. The chef wants to make 390 mL of a dressing that is 8% vinegar. How much of each brand should she use? Lucky is believing youre lucky. Identify believing by part of speech. I really need help this is carbon cycle help me label it 3. In the expansion of (ax^2+ by)^8 the coefficients of last two terms are -5832 and 6561, respectively.Find the values of: a and b Joe the scientist wants to figure out if the weight of a bowling ball will affect how fast it rolls down a ramp. Joe builds a 15 foot long ramp that is 5 feet tall at the top. Joe believes that if he rolls the 6 pound bowling ball from the top of the ramp, then it will roll the fastest. Joe then gets several bowling balls that are identical except for their weight. The different weights are 6 pounds, 8 pounds, 10 pounds, 12 pounds, and 14 pounds. Joe starts by placing the 6 pound ball at the top of the ramp and he starts the timer at the same time he lets go. He stops the timer when the ball reaches the bottom of the ramp. Joe repeats this process for all of the bowling balls. Joe repeats this process for all of the bowling balls.Whats the IV, DV, hypothesis and constant ? ( + 5) + ( 2)372 + 32x +7Whats the correct answer? what is the ratio of the average distances that oxygen will diffuse in a given time in air and water 3/2 to the power of 3 as a fraction A 500 kg cart is rolling to the right at 1.3 m/s. a 60 kg man is standing on the right end of the cart. what is the speed of the cart if tha man suddenly starts running to the left with a speed 10.0 m/s relative to the cart 1. Shelly pushes a .0035 kg marble witha force of .07.N. Can someone please explain this to me please? Will give brainly if you actually answer the question A load of 250 kg is hung by a crane's cable. The load is pulled by a horizontal force such that the cable makes a 30 angle to the vertical plane. If the load is in the equilibrium, calculate the magnitude of the tension in the cable the quotient of y and 8 is greater than 10