The Start menu on Windows computers changes based on actions performed by their users.

Answers

Answer 1
That’s true good luck

Related Questions

what is something a computer scientist would do

Answers

Answer:Computer scientists solve problems using technology. They write and program software, create applications for mobile devices, and develop websites. Their primary objectives are to validate and to develop mathematical models capable of computer interaction between people and other computers.

Explanation:

Jason has decided to use his name on all the images to protect them from misuse. He has also decided to use the logo of his company across all
the images to be extra sure about its protection in the digital world. Select the phrases or sentences that describe the two types of watermarking
options has he used to get the results.
Types of Watermarking Options
Jason wants to tag his name or logo somewhere on the image, preferably in the corner of the photo. He uses an online editing tool to add his
name at the corner of the image. He can prevent misuse of his Images online by adding a watermark over the image. Text watermarking
involves adding the imageer's name at the corner of the image. This is usually done with the help of online editing tools or software. In this form
of watermarking, he can use the logo of his company over the image to protect his identity.
Just to be sure, Jason also uses tiled watermarking, which involves placing his company logo in a pattern spread across the image. First, he
creates a copy of the original. This is to make sure that the watermarked version is saved separately. If needed, he can always access the
original image. Then he opens the logo that he wants to use as the watermark, coples It, and pastes it onto a new layer, above the image. He
turns down the opacity of the layered image. Then he merges the layer to join the watermark with the image.
L

Answers

Answer:

Text watermarking involves adding the photographer's name at the corner of the image.

Explanation:

This was one of the correct answers when I took the test, I got it wrong because I didn't pick all the correct answers. I hope that this was helpful to you! If you know the other correct answer(s) please comment and let me know and i'll edit this answer! :)

Answer:

Text watermarking involves adding the imageer’s name at the corner of the image

tiled watermarking, which involves placing his company logo in a pattern spread across the image

Explanation:

on edmentum

A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more than thirty used car dealers who all share a huge car lot. Name two features that that would be useful to potential customers.

Answers

Answer:

the gps and a map

Explanation:

Answer:

I think. it could be GPS and maps to but I may be wrong so yeah

A client in Nebraska asks you to create a cover image that is 2000 pixels high by 1200 pixels wide for catalog that will be displayed on its website. Which of the following new documents types will you select for this new project?


Select one:
Art & Illustration
Web
U.S. Paper
Photo

Answers

Answer: WEB

Explanation: this is the correct answer.

Hi I will Venmo or cash app 50$ to whoever can get all my school work in a week 8th grade btw.

Answers

Answer:

i gotchu dawg

Explanation:

Answer:

UwU Can't, thanks for le points sowwy

Explanation:

What is a product of respiration

Answers

Answer:

carbon dioxide and water

Explanation:

Sharl downloads images from an online library and uses them in her work. The images are shared under the Creative Commons Attribution (CC BY) license. What is she required to do to comply with the terms of the license?
A. share derivatives of the images on identical terms

B. acknowledge the sources of the images

C. use the images for noncommercial purposes

D. use the images in their original form, without modification​

Answers

Answer :

She needs to B. acknowledge the sources of the images

Why ?

As it is stated on the creativecommons . org :

"Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.

No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits."

Select each of the tasks that you could complete using a word processor.

Create a table that lists your favorite movies and actors

Make a list of homework assignments

Take notes for science class

Search for information on the Internet

Write a manuscript of a book

Schedule a meeting

Answers

Answer:

Create a table that lists your favorite movies and actorsWrite a manuscript of a bookMake a list of homework assignments

Explanation:

Word processing tool is used for different purposes such as typing reports, preparing notes and books etc.

Now from the given options, following tasks can be performed using a word processor

Create a table that lists your favorite movies and actorsWrite a manuscript of a bookMake a list of homework assignments

Create a table that lists your favorite movies and actors

Write a manuscript of a book

Make a list of homework assignments

(Yes I did copy the person above me)

what are yall favorite songs mine are all the stars by Kendrick Lamar, SZA


Clouded by Brent Faiyaz


Sundress by A$AP rocky


Broken clocks by SZA


drama by roy woods and drake


swimming pools Kendrick Lamar


Trust by Brent Faiyaz


B***h, Don’t Kill My Vibe kendrick lamar


they all made me feel like im in a movie yk

Answers

Answer:

Rehab by brent faiyaz

Hell by asap rocky

teen spirit by sza

fish by tyler the creator

snow by xxxtentacion

some of my favorites

also sundress is a great song

element by kendrick lamar

Explanation:

Answer:

What You Head Brent Faiyaz

Lost Kidz get money Brent Faiyaz

In Lust we trust Steve Lacy

Speed Kali Uchis

Body Language Kali Uchis

Lovely Brent Faiyaz

Hit Different Sza

and more

Explanation:

Describe the scope of the variables in this code.

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

def __str__(self):
return self.species + " named " + self.petName

def changeName(self, newName):
self.petName = newName

class petCarrier:
size = 'medium'
color = 'red'

The scope of petName ______.

The scope of color is ______.

Accessible to the entire program
limited to the petCarrier class
limited to the pet class


(both of the blanks need one of those answers)

Answers

The scope of petName is local to the class pet.

The scope of color is accessible by all parts of the program.

How to interpret programming variables?

The variable petName is local to the class; This isdue to the fact that the variable was created in a function whose name begins with two underscores.

The variable color; This is created in the petCarrier class and is accessible to the entire function. This was not created in a function whose name begins with an underscore.

Read more about programming variables at; https://brainly.com/question/9238988

#SPJ2

Answer:

The scope of petName limited to the pet class

The scope of color is accessible to the entire program

Explanation:

edge

what is electro magnetism

Answers

Answer:

Electromagnetism is a branch of physics involving the study of the electromagnetic force, a type of physical interaction that occurs between electrically charged particles

Explanation:

Answer:

malay ko di ko alam sagot dyan eh kaya isip ka rin ghourl

As a result of the Internet, people today

use more mobile devices.

go to the movies more often.

no longer read newspapers.

no longer need computers.How long has the environment been a major issue in the United States?

Answers

Answer:

hi there, the answer is

a. use more mobile devices

hope this helps :)

have a good day!

Explanation:

i just took the quiz rnnn

Answer:A

Explanation:

edge 2023

Which one of the following four words is odd?

Peripheral
Programme
Application
Software

Answers

Answer:

Peripheral

Explanation:

It has nothing to do with the other words because it means that something is not as important as something else

Peripheral seems off since it’s unrelated to the other words and has no connection

What does the following loop do?

val = 0
total = 0

while (val < 10):
val = val + 1
total = total + val
print(total)

Prints the numbers backwards from 10 to 1.

Prints the sum of the numbers from 1 to 10.

Finds the average of the numbers between 1 and 10.

Prints the numbers from 1 to 10.

Answers

Answer:

Prints the sum of the numbers from 1 to 10.

Explanation:

YOU NEED BETTER INDENTATION

Total is the sum.

Each loop it's added

:)

Question 8 of 10
What can be defined as an information technology environment?
A. The tools and processes that surround us to gather and interpret
data
O B. The rules and regulations that government and businesses must
follow to be secure from hackers
C. The energy used to create and maintain technology
D. The buildings and materials that house computer services
SUBMIT

Answers

Answer:

C. The energy used to create and maintain technology

#Carry on learning po

In full verbatim, a person wants to say that they admitted him to a hospital last month. He makes a mistake about the date and quickly corrects himself. How should a correct sentence look like?

Answers

He should cancel the date and move to another country semis how he screwed up his work, hope this helped

How would a person giving a persuasive speech use projection to make a key point?

a. by talking at a faster pace
b. by using a louder voice
c. by pronouncing words clearly
d. by using an upward intonation

Answers

Answer:

B: by using a louder voice

Explanation:

if Edge quiz then B

Answer:

B: by using a louder voice

Explanation:

correct on e2020 :)

What do microphone means

Answers

Answer:

A tiny phone

Explanation:

It means a tiny phone

ten(10) examples of wearables or wearable technologies?​

Answers

Answer:read

Explanation:

airpods

headphones

earbuds

AirPods  pro

watch

fitbit (type of watch that counts your miles) &you can say workout watch&

VR set

technology bracelet

smart glasses

Smart ring

Wires,plugs,speakers, chis are all examples of what

Answers

Answer:

Ch1kenT3nders

Explanation:

Selena made a diagram to compare and contrast transmitters and receivers.

A Venn diagram of two ovals. The left oval is labeled Transmitters. The right oval is labeled Receivers. There is an X inside the overlap.

Which label belongs in the area marked X?

Amplifies radio waves
Demodulates radio waves
Sends out radio waves
Captures radio waves

Answers

Answer:

A. Amplifies radio waves

Explanation:

e2021

Answer:

its A on ED

Explanation:

What is missing in the following program?
count = 0
1for numA < 3:
count = count + 2
print(numA)

answer:

Answers

Answer:

Replace for with while or if

Explanation:

The question has been answered by you before posting. However, I'll help with the explanation.

In python, for is used to iterate through a particular range. So, the for statement as used in the given program is incorrect.

Now, with what do we replace for?

The function of the program is not stated. So, I'll answer with likely options.

1. Replace for with while:

This will repeat the code in the while block as long as the condition numA<3 is true

2. Replace for with if statement:

This checks if numA is true and performs the operations in the [if] block.

The representation would be:

if numA < 3:

     count = count + 2

     print(numA)

After either of the above has been implemented, variable numA has to be initialized properly before the program functions well.

Answer:

The answer is while. Have a wonderful safe day.

Explanation:

What is a composite primary key made up of?
O an autonumber field/
a reference to a different table
more than one field
multiple records in the table

Answers

Answer:

what

Explanation:

PLEASEEEEEEEEEEE HELPPPPPPPPPP MEEEEEEEEEEE
This software application can be used to organize, analyze, and illustrate data. Which one is it?

a.Excel
b.Outlook
c.PowerPoint
d.Word

Answers

The answer is excel

Hope this helps

1 Which of the following could work as bits for a binary system?
А The flip sides of a coin
B The fingers on one hand
C The days of the week
D The colors of the rainbow​

Answers

It’s B you can count it on ur fingers

What is output? Select all that apply. c = 3 while (c < 10): c = c + 2 print (c)

Answers

Answer:

5, 7, 9, 11

Explanation:

its on quizlet

The copy mouse pointer looks like a
white plus sign
O white arrow
white arrow with a small plus sign
black cross

Answers

I’m confused?????????

You want to use the dist() method. Which line will allow you to enter the following code in IDLE?
>>>dist([2.5).(5.9))
5.0
from dist import math
from math import dist
from random import dist
from dist import random

Answers

Answer:

from math import dist

Explanation:

The dist() method is a part of the math module. So, to include it you have to use the following line of code:

from math import dist

hope this helped :D

The line which will allows you to enter the following code in IDLE is from math import dist.

What is dist() method?

The dist() function can be used to calculate a distance matrix, which shows the distances between the rows of a matrix.

The dist() method is a part of the mathematics module. Then, for

>>>dist([2.5).(5.9))

5.0 ,

we have to use code in IDLE as;

from math import dist

Thus, the line which will allows you to enter the following code in IDLE is from math import dist.

Learn more about dist() method.

https://brainly.com/question/25373810

#SPJ2

True or False, A variable can be called or referenced before it has been defined.

Answers

Answer:

false?

Explanation:

im 99% sure

La sección de lectores de un diario de la ciudad impone como única restricción para la publicación de las cartas, que el texto debe ser de 1500 caracteres. ¿Cuál será el tamaño en KB de un archivo txt que contenga ese texto?

Answers

Answer:

El tamaño de un archivo .txt que contenga esa cantidad de texto será de 1.46 KB.

Explanation:

Se entiende que todo caracter informático posee un tamaño de 1 byte, con lo cual en total el texto no puede superar los 1,500 bytes de tamaño.

Ahora bien, un kilobyte es una unidad de medida informática superior, que se compone de 1,024. Por lo tanto, dado que 1,500 - 1,024 es igual a 474, el tamaño del archivo será de 1 KB y 474 bytes. Así, para calcular el tamaño total del archivo en KB, se debe realizar el siguiente cálculo:

1,024 = 1

474 = X

((474 x 1) / 1,024) = X

0.46 = X

Así, el tamaño de un archivo .txt que contenga esa cantidad de texto será de 1.46 KB.

Other Questions
1. A rocket is launched straight up into the air. If its entire flight takes 5 seconds....A) What is the initial velocity of the rocket? There are 14 green crayons and 28 red crayons in a bin. What is the ratio of green crayons to red crayons in simplest form? 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.attackware D. malware Answer:2. Some examples of malware include: A. robots, viruses, and worms B. trojans, worms, and bots C. computerware,worms, and robots D.worms, system kits, and loggerware Answer:3. Viruses and worms can affect a system by A. deleting hard drives B. slowing down the system C. improving systemfunctions D. producing fake applications Answer:4. One tool that hackers use to get sensitive information from victims is/are A. loggerware B. keyloggers C.robots D.phishing Answer:5. One key feature of malware is that it A. can only work individually B. can only work on certain operating systems C.can work jointly with other malware types D. can always be stopped by anti-malware software Answer:6. One vulnerability that makes computers susceptible to malware is A. using anti-malware software B. using passwordprotection C. using old versions of software D. using encryption on sensitive files Answer:7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gatheringpersonal information C. give an attacker full control over a system D. all of the above Answer: -8. Malware is a combination of which two words? A malevolent and software B. malignant and software C.maladapted and software D. malicious and software Answer:9. The most common way that malware is delivered to a system is through the use of A USB sticks B. damagedhardware C. emails/attachments D.updated software Answer:10. Mobile malware is A. malware that moves from one device to another B. malware that moves to different areas inone system C. malware that deactivates after a period of time D. malware that infects smartphones and tabletsAnswer: A person would never have pure water put into their veins in a hospital because their cells would what? Libertarians have had candidates elected to all of the following offices EXCEPT: True or false are all structures made by humans and why Why are jails referred to as the "shame of the criminal justice system"? A. because jails are smaller than prisons B. because most jails are old, poorly funded, and understaffed C. because jails only serve food that is cold D. because jails are run by local town organizations 40 Answered In The Pearl, how does Kino react to the doctor's rejection? PLZZZZZ ANSWER ASAPPPPP 1. Calculate the unit rate: 324.8 meters in 28 seconds The length of a rectangle is twice its width, while theperimeter of the rectangle is 36 units. . Which system ofequations can be used to find the length ( and the width wof the rectangle? A pool is being filled at a constant rate of 5 gallons every 2 minutes. Which graph has a slope that best represents this rate? Please help!! Will mark brainilest I need help with this question pleaseeee A store sells grape jelly in 16-ounces jars for $ 4.68. How much is the jelly per ounce? How may the introduction of the slave data change the discussions over representation? Explain how you got that answer...Emma is scrapbooking. She has 9 inches of paper and needs to cut it into 2/5 inch stripes of paper. How may strips will she be able to make have any of yall ever drew a mineral/gemstone? if u have tell me if it was hard or easy. Use the drop-down menus to identify different parts ofthis procedure.The goal:The title:A material:A specific detail: Gas prices are expected to rise 5% each week for the next six weeks. Kevin spent $52.50 to fill his tank this week.Which of the following represents the total amount Kevin can expect to spend to fill his tank over the next threeweeks, if he fills his tank once a week?$52.50 + $55.13 + $57.76$52.50 - $55.13 + $57.88$55.13 + $57.76 - $60.39$55.13 - $57.88 + $60.78 Decomposers _______O add nutrients to the soilO feed on dead animalso include bacteriaall of the above