the clr reads and executes
hope this helps
scav
Write 5 different types of basic programs.
Answer:
Word processors.
Game programs.
Spreadsheets.
Data base systems.
Graphics programs.
Explanation:
what is the total rows of a microsoft work
2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary
Answer:
They're necessary in order to ensure that we can all access the internet and access it easily and freely. About anyone can do just about anything. It isn't restricted to just certain people (or companies).
Explanation:
What are the three essential ingredients for a successful implementation of a basic structured cabling network
A telecommunications serverroom, cabling, work area
List the various autofill option present in excel. Write the use of copy cell and fill formatting only option in filter.
Insert empty cells when filling down a series
Autofill multiple rows or columns
Use the AutoFill option to get repeating series
Autofilling horizontally and vertically
Excel - Fill down a series of values that contain text
hope this helps
The healing brush tool will pick up the ________ from your source area, but maintain the color in the destination.
Answer:
The Healing Brush tool allows you to fix image imperfections such as scratches, blemishes, etc. By sampling the surrounding area or using a predefined pattern you can blend the imperfections into the rest of the image. The healing brush tool is located in the Photoshop Toolbox, on the left side. mark as brainliest
Explanation:
Why might you use the More button in the Find and Replace dialog box?
Answer:
Use the More button to display more options to help narrow the search criteria.
Explanation:
I think hope this helps you!!
The specification (including data types, instruction types, registers) of the interface between programs and the underlying hardware is called the
Answer:
instruction set architecture
The processor itself provides only limited support for multiprogramming, and __________ is needed to manage the sharing of the processor and other resources by multiple applications at the same time.
Answer:
The answer is C. software
Explanation:
A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
worms are the type of malware that can copy/clone it's self hope this helps
scav
If two hosts are connected by five point-to-point networks, how physical links will there be when one host sends a packet to the other host
The answer is 1 my friend!
have a lovely day :)
Analyze each of the situations below. Which of the following BEST Illustrates someone who shows appropriate information literacy skills?
O A. Felix completes an Internet search for a topic for his science class. He takes nearly 30 minutes reading through the different results until
he locates a reliable website.
OB. Deja makes sure that she checks her work email at least three times a day to make sure she hasn't missed any important information
OC. Heath volunteers to stay late after work this week to ensure that a new program is completed for a customer by the end of the week
OD. Marcel created a calendar that will help him stay organized at work.
The best illustration of information literacy is A. Felix completes an Internet search for a topic for his science class. He takes nearly 30 minutes reading through the different results until he locates a reliable website.
What is information literacy?Refers to being able to find and sort through information. Allows for problem solving.Felix has the problem of looking for information for his topic. He therefore goes online to find, sort through, and then use the information he finds to solve his problem.
In conclusion, the best answer in option A.
Find out more on information literacy at https://brainly.com/question/25039489.
The option that BEST illustrates someone who shows appropriate information literacy skills can be seen in option A.
What is an Information Literacy skill?Information literacy skills are defined as skills that are capable to locate, analyze, organize, using, and transmit information in all of its forms, particularly in circumstances involving decision-making, problem-solving, or knowledge acquisition.
From the given option, the BEST that illustrate the appropriate information literacy skills is that:
A. Felix completes an Internet search for a topic for his science class. He takes nearly 30 minutes to read through the different results until he locates a reliable website.
This is because Felix is having trouble finding information about his topic. As a result, he goes online to look for, filter through, and apply the knowledge he discovers to solve the problem of his situation.
Learn more about information literacy skills here:
https://brainly.com/question/10666756
Does the network include a network device?
a router
A. True
B. False
Answer:
True
Explanation:
Everything inside of your network/subnet would be able to communicate with everything else inside the same network but without a router it would be unable to communicate with other networks. It all boils down to what is your network design. If you need to have dhcp or firewall, then you must have a router.
Complete the code in this program that responds to moving a mouse over a message box.
from tkinter import *
def movingHandler(event):
print("Location: (", event.x, "," , event.y, ")")
return
myWindow = Tk()
message = "Hello."
eventArea = Message(myWindow, text = message)
eventArea.bind('<_______>',movingHandler)
eventArea.pack()
eventArea.mainloop()
Answer choices for the blank:
1. Button-3
2. Button-1
3. Moving
4. Motion
Code segments are extractions from a more complete program.
The code that completes the program is (4) Motion
How to complete the codeFrom the question, we understand that the program responds when the mouse is moved over a message box.
This means that, the message box reacts to mouse movement or motion on it.
Hence, the code that completes the program is (4) Motion
Read more about code segments at:
https://brainly.com/question/22654163
Answer:
motion
Explanation:
In the Information technology arena, information is important based on your role and perspective. Based on the ISM role what is the most important factor concerning data retention
The most important factors concerning data retention include availability/storage of media, regulatory and/or business needs, and confidentiality of data. It is fundamental for Informix Storage Manager.
Informix Storage Manager (ISM) and data storageInformix Storage Manager (ISM) can deliver efficient storage of data and other management services
Informix Storage Manager functions in the International Business Machines (IBM) Informix database server.
IBM Informix is a service of IBM's Information Management part focused on delivering database management systems.
Learn more about IBM Informix here:
https://brainly.com/question/6447559
List the three words using in programing LOGIC statements
Answer: If, Than, Else.
Explanation: Programming languages control the flow of a program using logic statements which are a specific form of IF…THEN…ELSE statements.
Programming languages use logic statements, which are a combination of "if", "then," and "else" statements, to regulate the execution of a program.
What are the "if", "then," and "else" statements?The "if or then" statements, together with its optional "else" clause, only require one statement to be performed for each of the two cases. Multiple statements can be combined together to execute more than one statement using a begin/end Block Statement:
if = (If something is true, do it; otherwise, do something else.)
{ if x < 10 then begin
x := x+1;
y := y+1;
end
else}
Even if just one statement is given, a begin/end statement block can be used as an option. This is a typical technique to keep code clean and understandable, as well as to prevent making the usual error of forgetting to add begin/end when later extending a single-line "if or then" statement.
Thus, programming languages use logic statements, which are a combination of "if", "then," and "else" statements, to regulate the execution of a program.
To learn more about the programming languages here :
https://brainly.com/question/11023419
#SPJ1
Write a qbasic program to convert distance from kilometer to miles
Answer:
INPUT “Enter Distance into Kilometers”; km m = km * 1000 miles = km / 1.6 PRINT km ” Kilometers = “; m; ” meters “; PRINT km ” kilometers = “; miles; ” miles”;
Explanation:
What is the rows of a defult work book
Answer:
Version Rows Columns Cells
Excel 2019 1,048,576 16,384 XFD 17,179,869,184
Excel 2016 1,048,576 16,384 XFD 17,179,869,184
Excel 2013 1,048,576 16,384 XFD 17,179,869,184
2. In the RACI model, which role offers insights or expertise to help others complete project tasks?
In the RACI model, the role which offers insights or expertise to help others complete project tasks is consulted.
What is a RACI model?
RACI model is also referred to as a RACI chart or RACI matrix and it can be defined as a diagram that is used as a graphical (visual) representation to indicate and identify the fundamental roles and responsibilities of users with respect to major tasks within a project.
In project management, RACI is an acronym for the following:
ResponsibleAccountableConsultedInformedIn the RACI model, the role which offers insights or expertise to help others complete project tasks is consulted because he or she is a subject matter or project topic expert.
Read more on RACI model here: https://brainly.com/question/6177865
A ____ can be used to prevent a user program from never returning control to the operating system. A) portal B) program counter C) firewall D) timer
Answer:
timer
Explanation:
Graphic designers consider _____ easier to use because it allows them to set the initial color based on hue and then fine-tune the saturation and lightness values.
Answer:
HSL is what is used
Explanation:
hue saturation lightness or hsl is what the answer is
hope this helped
scav
can someone teach me about computer subject?
Answer:
what do you you want to know about computer ?
___________________ is a formatting option used in chart.
a) Area
b) Legend
c) Chart Area
Answer:
c
Explanation:
chart area
I hope this will help you
What key is in the upper-left corner of the keyboard??
AnswertabAnswer:
(ESC) Escape
Explanation:
The function of this keyboard key is to escape the current t view or mouse inversion you are on, or it could be used as a keyboard shortcut when used with other keys.
This simple machine can directly utilize the wheel and axle to lift and maneuver heavy loads.
Inclined Plane
Lever
Pulley
Wedge
Answer:
inclined plane _____________(A)
If the range_lookup argument to the VLOOKUP function is set to TRUE, then the leftmost column of the table_array argument must be in ascending order.Group of answer choicesTrueFalse
In Microsoft Excel, the leftmost column of the table_array argument must be in an ascending order when the range_lookup argument to the VLOOKUP function is set to TRUE.
What is VLOOKUP function?A VLOOKUP function can be defined as a type of function that is typically used to look up a value in a specific column in Microsoft Excel.
In Microsoft Excel, the leftmost column of the table_array argument must be in an ascending order when the range_lookup argument to the VLOOKUP function is set to TRUE.
This ultimately implies that, you have to sort the leftmost column of the table_array argument in an ascending order (a through z), in order to get the right results when the range_lookup argument to the VLOOKUP function is set to TRUE.
Read more on VLOOKUP here: https://brainly.com/question/16986179
The author included this information most likely to – A) summarize the experimentation process scientists used B) Show the pride the scientists have in their work C) Encourage others to get involved in computer sciences D) Illustrate the flaws in the scientists’ logic.
The author included this information most likely to: C. Encourage others to get involved in computer sciences.
Who is an author?An author is also referred to as a writer and can be defined as an individual who expresses his or her thoughts about a particular subject (topic) in writing.
This ultimately implies that, an author is saddled with the responsibility of putting written information across to his or her audience, so as to either enlighten, inform, encourage, persuade, or convince them.
In this scenario, the author included this information most likely to encourage others to get involved in computer sciences.
Read more on an author here: https://brainly.com/question/25857058
5. An external CSS file is saved with D. Answer the following questions. 1. Explain the purpose and advantages of using CSS.
Which logical operators perform short-circuit evaluation?.
Answer:
Short-circuit evaluation is performed with the not operator.
10 points + brainliest to first correect answer :) incorrect answers/ answers with no effort will be deleted this is easy im just making sure :)
Which of these is not the correct method for moving text in a document in Word 2016?
Select the text, press Ctrl+C, move the insertion point to desired location, and press Ctrl+V.
Select the text, right-click on the text and select "Cut," move the insertion point to the desired location, and press Ctrl+V.
Select the text, click the Cut button, move the insertion point to the desired location, and click the Paste button.
All the above statements are correct.
Answer:
The first option is incorrect
Explanation:
With the Control+C method, you copy the text. With the Control+V method, you paste it. You do not remove any of the text and instead create a duplicate