When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides or bottom of an image?

B will resize but not maint aspect ratio was correct

When Resizing Images Or Objects In A Presentation, Why Should A User Not Utilize The Sizing Handles In
When Resizing Images Or Objects In A Presentation, Why Should A User Not Utilize The Sizing Handles In

Answers

Answer 1

Answer:

b. It will resize the image but not maintain aspect ratio

Explanation: is correct. post protected

Answer 2

Answer:

b

Explanation:


Related Questions

Which process refers to the process of translating between a set of private addresses inside a network and a set of public address outside the network

Answers

Answer:

The process of translating between a set of private addresses inside a network and a set of public addresses outside the network is called

IP pulling through use of a subnet mask bypass

A(n) _____is a small application that cannot run on its own but can be used with other software products.

Answers

Answer:

emulador

Explanation:

it need apps to run

A shared feature is a small application that cannot run on its own but can be used with other software products.

What is software?

A device's running programs, scripts, and applications are collectively referred to as "software" in this context. It can be compared to the variable component of a computer, whereas the invariable component is the hardware.

Application software and system software are the two main subcategories of software. System software and application software are the two categories of software. System software is employed to direct operations as well as a computer's internal processes and hardware components.

Therefore, a little program known as a shared feature can be utilized with other software items but cannot be used independently.

To learn more about software, refer to the link:

https://brainly.com/question/1022352

#SPJ5

___1. What is the first thing you should do if you received a package?
a. count the number of items c. accept it immediately then leave

b. check out the whole package d. check for the delivery receipt

________2. What should you do with the copy of your request for inspection?

a. return to the delivery man c. dispose it immediately

b. keep the copy of your request letter d. do not accept the letter

________3. What form is used to request for tools and equipment to be used for a

particular job written instruction to perform a work?

a. job order / order forms c. inventory of Materials forms

b. borrower’s forms d. purchase requisition

Answers

1.C
2.D
3.D
4.B
5.A
6.A
7.C
8.D
9.A
10.C

5G can support more users simultaneously than LTE, but it may not provide any improvements in terms of data rates. True or False

Answers

It looks like it should be true because I learned it from my dad

Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system.

Answers

Answer: Open-source CRM

Assume that the method call slope(1, 2, 5, 10) appears in a method in the same class. What is printed as a result of the method call

Answers

Answer:

8\4

Explanation:

hope it hepl

According to the question, the answer would be 8/4.

What is the Result?

something that happens as a result of a cause, problem, or conclusion; a positive or observable result.

The modifications or consequences that are anticipated to occur once the project is implemented are referred to as project results. The recipients' lives have typically improved as a result of the results. Three categories of results are presented: Outputs. Outcomes.

Results reflect how successful we are as people. In project management, it's very crucial to track your progress. The results of a project should always be evaluated. How would we recognize our accomplishments and draw lessons from our mistakes if we didn't measure?

To know more about the Results follow the link.

https://brainly.com/question/27751517

#SPJ5

A computer game allows a player to repeat a level until they run out of lives. Which two of the following loops would work correctly?

Answers

Answer:

c.

Explanation:

because this is the right syntax for the following loops

____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

Answers

Answer:

Secrecy

Explanation:

Options:

A) Necessity.

B) Secrecy.

C) Integrity.

D) Encryption.

B) Secrecy Is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

3.5 code practice python

Answers

Answer: This chapter is about variables in Python. So a variable can be any data type. And to find the datatype of a variable we need to use below code: x =10 print (type (x)) This will output: integer Now we can covert a string into integer as below:x=input("Enter X:")But above x is considered as string, and we need to convert it to integer to make use in for loop or any calculation.we can use:int(x), and this will convert x to int from string.Also, we have operators to change the variable values like =. +=, -=, /=, *= etc. So you need to remember these, and you will be up with all that is required for understanding variables. And rest is self explanatory certainly.

Explanation:

The answer is self explanatory

AND, NOT and OR are comparisons of values included in which type of operation?

Answers

Answer:

Comparison Operators

Explanation:

Answer:

comparative operation

Explanation:

not need

Which feature in early networks made aggregating threat intelligence difficult?.

Answers

Considering the computing troubleshooting historical records, the feature in early networks that made aggregating threat intelligence difficult is "Point Solution."

What is a Point Solution?

Point Solution is a term used in engineering and computing processes that involve the use of tools or machines to solve one issue or problem at a time within operations.

This situation leads to time-consuming and complicated means of solving multiple problems in operation.

Present Methods of solving aggregating threat intelligence

Today there are various means or formats for solving these problems which include the following:

STIX/TAXII, JSON, XML,PDF, CSV

Hence, in this case, it is concluded that the correct answer is "Point Solution."

Learn more about Point Solution here: https://brainly.com/question/17748237

Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches

Answers

Wireshark. It’s a free tool used to analyze packets.

The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the implementation stage and what happens in this preceding stage

Answers

The stage that precedes the implementation stage of SDLC is testing and it involves checking the functionality of the system.

System design involves the process of determining an overall system architecture, which typically comprises the following:

Hardware.End users.Physical processing components.Software.Communication channel.

Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:

1. Planning.

2. Analysis.

3. Design.

4. Development.

5. Testing.

6. Implementation.

7. Maintenance.

From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.

During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.

Read more: https://brainly.com/question/20813142

Fill in the blank: A data analyst is creating the title slide in a presentation. The data they are sharing is likely to change over time, so they include the _____ on the title slide. This adds important context.

Answers

The title of a presentation often gives a meaning and closure to what the presentation is all about. The data they are sharing is likely to change over time, so they include the date of the presentation on the title slide.

A title slide in PowerPoint often has a lot of different meaning. The date on a title slide is usually placed in the Header and Footer box, you have to click on the Slide tab, select the Date and time check box.

The Layout option to title a slide is simply the following steps below

The first you click Home and select Layout. Select Title Slide for a standalone title page or select Title and Content for a slide that contains a title and a full slide text box. There are a lot of other layout options include titles, too. Pick the one that's best suited for your presentation.

Learn more from

https://brainly.com/question/11068366

You have installed Windows Server 2016 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server

Answers

Answer:

Directory Service

Explanation:

The type of software that you should need to install and configure on this server is known as the directory services such as Microsoft office.

What is Software?

Software may be defined as a set of instructions, data, or programs which are considerably utilized in order to operate computers and execute specific tasks with respect to the instructions. The function of the software is absolutely the opposite of the hardware.

According to the context of this question, each and every directory service have some special class of software that enables the window to install and configure Microsoft's proprietary. These proprietaries mutually support the window and execute the function with respect to the user's instructions.

Therefore, the directory service is a type of software that you should need to install and configure on this server.

To learn more about Software, refer to the link:

https://brainly.com/question/28224061

#SPJ2

If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.

Answers

Answer:

Business continuity

Explanation:

The disaster is affecting business functions and needs to be urgently remedied.

Recursive functions are ________ iterative algorithms. as efficient as less efficient than more efficient than impossible to compare to

Answers

Based on computer programming, Recursive functions are less efficient than iterative algorithms.

Recursive Function vs. Iterative Algorithm

During implementation, the Recursive functions require the module to call itself multiple times till the base condition is satisfied, thereby making the line of codes longer and slower to execute.

In contrast, the Iterative algorithm utilizes looping statements such as for LOOP, WHILE LOOP, or DO-WHILE LOOP to repeat the same steps, thereby making the line of codes shorter and faster to execute.

Hence, in this case, it is concluded that the correct answer is "less efficient than."

Learn more about Recursive Functions here: https://brainly.com/question/25647517

the correct banner marking for a commingled document

Answers

Answer:

The correct banner marking for a commingled document is Headers and footers are mandatory and must be identical All sections or portions must be marked or portion marked CUI markings and Limited Dissemination Control markings appear after all classified marking in both Banner Lines and Portion Markings

Hope this helps :D

Please Mark Brainliest :D

When a single physical computer runs this type of software, it operates as though it were two or more separate and independent computers.

Answers

Answer:

Virtualisation

Explanation:

The correct answer would be virtualisation software, this is because it allows more computers to be "created" in the form of virtual machines. These virtual machines contain everything that a regular computer would have, i.e networks, storage devices, and processors except that it is virtual. You just need to have hyper v enabled in system settings.

Hope this helps!

Choose the response that best completes the following statement.

"If you're not sure if you should be on a site or signing up for a profile, ________."

ask permission
consider the outcome
don't say it online
use the 5-second pause

Answers

Answer:

probably the 5 second pause

consider the outcome?

A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called

Answers

A web-based program that uses artificial intelligence (AI) techniques to automate tasks such as web searches is called a: bot.

Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which involves the process of using computer algorithms to build a smart computer-controlled robot that is capable of automatically performing and handling tasks that are exclusively designed to be performed by humans or using human intelligence.

In the field of artificial intelligence (AI), a bot is an abbreviation for robot.

A bot is a web-based software program that assists an end user, or acts on his or her behalf, in the automatic performance of repetitive computer-related tasks such as web searches.

Read more: https://brainly.com/question/21656851

5.23 LAB: Contains the character
Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. The output of the program is every word in the list that contains the character at least once. For coding simplicity, follow each output word by a comma, even the last one. Add a newline to the end of the last output. Assume at least one word in the list will contain the given character.

Ex: If the input is:

4 hello zoo sleep drizzle z
then the output is:

zoo,drizzle,
To achieve the above, first read the list into a vector. Keep in mind that the character 'a' is not equal to the character 'A'.

Answers

Answer:

In C++:

#include<iostream>

#include<vector>

using namespace std;

int main() {

int len;

cout<<"Length: ";  cin>>len;

string inpt;

vector<string> vect;

for(int i =0;i<len;i++){

  cin>>inpt;

  vect.push_back(inpt); }

char ch;

cout<<"Input char: ";  cin>>ch;  

for(int i =0;i<len;i++){

  size_t found = vect.at(i).find(ch);  

      if (found != string::npos){

          cout<<vect.at(i)<<" ";

          i++;

      }

}  

return 0;

}

Explanation:

This declares the length of vector as integer

int len;

This prompts the user for length

cout<<"Length: ";  cin>>len;

This declares input as string

string inpt;

This declares string vector

vector<string> vect;

The following iteration gets input into the vector

for(int i =0;i<len;i++){

  cin>>inpt;

  vect.push_back(inpt); }

This declares ch as character

char ch;

This prompts the user for character

cout<<"Input char: ";  cin>>ch;  

The following iterates through the vector

for(int i =0;i<len;i++){

This checks if vector element contains the character

  size_t found = vect.at(i).find(ch);  

If found:

      if (found != string::npos){

Print out the vector element

          cout<<vect.at(i)<<" ";

And move to the next vector element

          i++;

      }

}  

Choose the correct function to yield the shown result.
>>>____(3)
3.0

- int
-round
-float
-str

Answers

Answer:

int

Explanation:

Correct on edg test 2021

NO LINKS Please
Based on the information presented in the article, do you think that schools should invest in technology to improve academic outcomes for their students? Explain.

Answers

Answer:

ok po majsbejwwlaodhd susbvskwmoskwaubsbsiwnwis sisbsbsb is a good 2AM 2AM 2nd edition 2and I am a nanny 2and and u 2122feet 225feet to see how 2nd grade are you 22feet but not yet a lot more because it has alot of people who is the key to the girl in your life of your own life NATO is the most powerful and I was a great person in a sentence and a very nice meeting you had to do nothing babe and she had an affair in a way maker that I am in a relationship with u are in bed now babe and my mom and my dad a lot of my cousn and my kids in the morning and my kids were in the same boat and 5PM was the first of my two 5th grade boys in school to be with u at work now babe on my messenger then the Lord was in bed and she had no probs and no babe to be in Philippines and my kids had to be a good 58 and a little more because I was so happy bday sis had a lot to say about the girl and she was busy with me I will be having dinner with the kids on me sometime next time because she is very good at home now babe ruth is it ur wife is still single forever ni mama ne is a good girl also a big part in her to be the center babe if I will be a good person and I think they 5th 5 and 5 and u have a lot more to lose than me if u have a lot

Answer:

Yes because using technology in classrooms has the potential to create increased student motivation, increased social interactions, positive outcomes, enhanced student learning, and enhanced student engagement.

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure

Answers

Answer:

Ransomware

Explanation:

"Ransomware is malicious software that threatens to reveal sensitive data or prevent access to your files/systems until you pay a ransom payment within a set timeframe."

You often travel away from the office. While traveling, you would like to use your laptop computer to connect directly to a server in your office and access files. You want the connection to be as secure as possible. Which type of connection do you need

Answers

Answer:

You will use a secure connection

Explanation:

You need VPN so that your IP cant be tracked which will help hackers to find you

A secured connection is a connection which is encrypted and secure the data from both the ends. A VPN (Virtual Private Network) is a secured connection.

What is Secured connection?

A secured connection is a connection that is encrypted by one or more security protocols to ensure the data security which is flowing between two or more ends.

A secured connection can help someone from stealing or changing information that has been sent online. To create a secured connection, the device and website's server use an SSL protocol. SSL protocol is a set of encryption rules that both computers understand and keep the data secured.

VPN stands for "Virtual Private Network". It is used for the opportunity to establish a protected network connection when using public networks. VPNs encrypt the internet traffic and disguise online identity of an individual. This makes it more difficult for third parties to track the activities online and steal data of an individual.

Learn more about Secured connection here:

https://brainly.com/question/25556545

#SPJ2

Sort the options for formatting a table under the tab where they are located.

Answers

Answer:

yes those are the correct order

Explanation: post protected

write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'

Answers

Answer:

//check which string is greater

if(strcmp(name1,name2)>0)

//assign name1 to first, if the

    //name1 is greater than name2

    first=name1;

else

    //assign name2 to first, if the

    //name2 is greater than name1

    first=name2;

5)

//compare name1 and name2

    if(strcmp(name1,name2)>0)

   

         //compare name1 and name3

         if(strcmp(name1,name3)>0)

       

             //assign name1 to max, becuase

             //name1 is greater than name2 and name3

             max=name1;

       

Explanation:

Most general-purpose applications use a(n) ________ that displays graphical elements called icons to represent familiar objects.

Answers

A general purpose application is often called a 'off-the-shelf'. It is a kind of software that one can use at home and school. Most general-purpose applications use a graphical user interface that displays graphical elements called icons to represent familiar objects.

The graphical user interface is simply defined as a type of user interface that gives users permission to interact with electronic devices via the aid of graphical icons and audio indicator such as primary notation.

General purpose application software is simply defined as a type of application that is used for different kind of tasks.

It is not known to be able to perform more than one function. For example, a word processor.

Learn more from

https://brainly.com/question/2919813

Technical security measures like anti-virus (anti-malware), firewalls, and keeping browsers up-to-date will:

Answers

prevent malware from old exploits

Other Questions
select the appropriate historical/musical periodoptions:1. Romantic2. Modern/20th century3. Baroque4. Classical In The Red Badge of Courage, the lieutenant says, If I had ten thousands wild cats like you I could tear th stomach outa this war in lessn a week! Who is he referring to in this quote?A. Jim ConklinB. HenryC. WilsonD. The tattered soldier What is the equation of the line that passes through points (10,6) and (2,2) ? Which sentence uses a comma correctly to set off a introductory phrase? O A. My best subjects are, math, music and spelling. O B. To begin, my aunt is making me babysit my cousins that day. O C. For example, I always turn in my homework on time and study for tests. O D. "Leave me alone!" he said, slamming the door. The cost of a blue balloon is 4 times the cost of a yellow balloon. Rashmi spent 910 in buying both blue and yellow balloons, find the cost of a blue balloon? Choose the word or phrase among A, B, C or D that best fits the blank space in the following letter:Tra Co beach in QuangNinh province is 9 kmsfrom MongCai. It has the (1)and the most romantic beach in Viet Nam. Tourists can enjoy the (2).of white sand beaches and green sea water all year (3).. . Visitors can (4)..enjoy the sunset or sunrise in Con Mang islet. You can visit Tra Co Communal House, LinhKhanh Pagoda, and Tra Co church. If tourists want some fresh (5).., they can find it from fishing boats. They can take part in Tra Co festival from May 30 to June 6.1. A. long B. longer C. longest D. much longer2. A. beauty B. beautiful C. of beauty D. pretty3. A. over B. long C. round D. longer4. A. be B. be able C. then D. also5. A. seafood B. menu C. air D. water Dan received 64 dollars for his birthday. He went to a sporting goods storeand bought a baseball glove, baseball, and bat. He had 31 dollars left over,how much did he spent on the baseball gear? PLZ HURRY Respond to D.H. Lawrence Piano What was the experience of North Carolina soldiers throughout the war?A.They fought with enthusiasm at first but became weary, disillusioned and began to desert.B.They were frustrated that Confederate leaders failed to trust them to fight in important battles.C.They became increasingly passionate that the Union be kept from invading their homeland.D.They guarded key cities and rail lines along the Mississippi River, but wanted to fight in Virginia HELP FAST 100! POINTS AND BRAINLIEST!Surface Water Lab ReportIntroductionUsing models is very important in science. In this lab, you will design a model that will help you investigate the relationship between land surfaces and water on Earth. Problem: How can we use the relationships between land surfaces and water to understand conservation of resources and pollution?Hypothesis: After completing steps 1 through 5 in your procedures, predict the number and locations of watersheds that will form in your watershed model. For example:Based on the positions of landscape features in my watershed model, I predict there will be ________ number of watersheds located at these locations in my model: __________________________________.Materials: If you would like to create your watershed model by hand, you will need the materials listed. Note: There are alternative procedures that do not require these materials.one sheet of plain white paperseveral sheets of old newspaper, or wax paper if availableone water-based marker (Note: do not use permanent marker)one spray bottle containing water (place on mist setting)digital camera, if availableProcedures:Place several sheets of newspaper or wax paper over a large flat surface, such as a kitchen counter. Use at least five sheets of paper so that you can protect your work area. Crumple the sheet of white paper into a loose wad.Uncrumple the sheet of paper so you can lay it on your work surface. The paper should not be flat but should be wrinkled and puffed up from the crumpling.Imagine the paper as a miniaturized version of mountains, hills, valleys, and other landscape features. If your paper is so flat that you can't imagine these features, you should recrumple it.Use the marker to color the major folds or ridges in the paper, as well as some of the minor folds or ridges. Do not allow the marker to color any other part of the paper.Place the paper on top of the newspaper on the counter, and then lightly mist the piece of paper with the spray bottle. Don't spray too heavily: Three to seven squirts will probably do the job.Stop misting as soon as you see some of the colored water starting to collect in some of the valleys. Watch for a few moments as stream patterns develop over the paper.If you have access to a digital camera, take a photograph of your work and include it in your Data and Observations.Record your observations of each watershed that forms in Table 1. Take note of headwaters, channels, divides, tributaries, mouths, floodplains, precipitation, and infiltration in your descriptions. Complete the Questions and Conclusion section of the lab report. Procedures without materials:Use the video demonstration of a watershed model linked on the lesson assessment page to complete the information below and answer the questions.Data and Observations: If you were able to take a photograph of your paper, or a screenshot of the demonstration, include a copy of this photo and label each of your watersheds in the model.Table 1: Observations of Watershed ModelObservationsSource of Surface WaterLocation on ModelWatershed 1Watershed 2Watershed 3Questions and ConclusionView the surface water animation clip of the Mississippi watershed in the lesson. Compare what is happening in this animation to what occurred to your watershed model. Identify and describe all the ways water moved in your watershed model. Be sure to include headwaters, channels, divides, tributaries, mouth, floodplains, precipitation, and infiltration in your description. How many different watersheds were in your model? How were you able to identify them?Earths landscape can change over time. What can happen to a watershed as a result? Based on what you observed in the lab, why does pollution become more than a local problem?In conclusion, how did your prediction of watershed locations match the watersheds in your model? In what ways could you continue to investigate the behavior of surface water and the creation of watersheds? How would further investigation provide research for strategies to solve the spread of water pollution? Mr. Lainson died this year on a date when the total FMV of his property was $12 million and his debts totaled $450,000. His executor paid $15,000 of funeral expenses and $50,000 of accounting and legal fees to settle the estate. Mr. Lainson bequeathed $1 million to Villanova University, $200,000 to the Lutheran church, and $3.5 million to his surviving spouse. He left the remainder of the estate to his children. Compute Mr. Lainson's taxable estate. X=6 and 6=K so x=Use the transitive property of equality to finish the equation Fifty-four percent of the students in your class have moved at least onetime. Write this percent as a decimal. Solve for x.4/5(x3/10)=2 1/4Enter your answer as a mixed number in simplest form in the box. g. The net income attributed or residual to the land is estimated to be $44,000. Land value is estimated to be stable. What is the value of the land if the yield rate is 8% pleaseeeee helpppppppppppppp Based on the passage, which of the following would the Supreme Court most likelydecide?Aif a state immigration law could contradict a federal lawBif a robbery was committed at a local grocery storecif a brother accidentally hit his sibling and caused an injuryDif a camper trespassed on a farmer's private property On January 1, 2021, the Marjlee Company began construction of an office building to be used as its corporate headquarters. The building was completed early in 2022. Construction expenditures for 2021, which were incurred evenly throughout the year, totaled $9,600,000. Marjlee had the following debt obligations which were outstanding during all of 2021: Construction loan, 9% $2,400,000 Long-term note, 8% 3,200,000 Long-term note, 5% 6,400,000 Required: Calculate the amount of interest capitalized in 2021 for the building using the specific interest method. help me plssssssssssssssss the total number of shares that a company may sell is referred to as