Answer:
manufacturing
improving
customer care
transportation
human resource management
Explanation:
business communication use technology to improve their services or products as a way of gaining competitive advantage.
A school principal trying to find out if parents will help buy new playground equipment shows digital leadership by
Answer:
I would say either working for money to help or ask your parent to help but you should do chores in return
Explanation:
its nice to help
ASKING AGAIN CAUSE I GOT A WEIRD LINK
¸ . ★ ° :. . • ° . * :. ☆¸ . ★ ° :. . • ° . * :. ☆ ¸ . ★ ° :. . • ° . * :. ☆ ¸ . ★ ° :. . • ° . * :. ☆
the purpose of the ___________ element is to group together a set of one or more [h1] element so that theyre treated as a single heading
a. header
b. hgroup
c. h1group
d. group
Using a trick or fraud to steal personal information is called (5 points)
A. hacking
B. identity theft
C. netiquette
D. scamming
Answer:
its D
Explanation:
ive done this before i remeber i got d
This OS integrated the processing power of Windows NT with the easy-to-use GUI of Windows 98.
Windows Millennium Edition
Windows 2000
Windows for Workgroups
Windows 3.11
In your email software the address book allows you to
To put it simple, an Address Book is basically where you can store peoples names, addresses and most importantly emails so you can easily contact them. Its pretty much like your contacts on your phone.
list the first prime minister of St Vincent and the grenadines
Robert Milton Cato (June 3rd, 1915 - February 10, 1997)
Describe the home keys
Bernard is creating an inventory of his comic book collection. He has documented the title, publisher name, production year, and
series number for each comic in his collection. He creates a spreadsheet of this information. Typically, each one of these
categories, such as production year, would be contained in:
A: a formula bar.
B: a cell.
C: a row.
D: a column.
Answer:
D: a column.
Explanation:
Since in the question it is mentioned that Bernard wants to develop an inventory. Now he created a spreadsheet of the given information
The categories like production year, publisher name, etc would be contained in a column as it represent the heading under these the year, name of the publisher are written
Therefore the option d is correct
Answer:
D: a columnExplanation:
Typically, each one of these
categories, such as production year, would be contained in a column.
The Find and _______ commands allow you to easily locate and replace text. Bookmarks allow you to easily navigate to other parts of a document while _______ allow you to easily navigate to places within or outside the document. Use the _______ _______ to find out if your document contains personal information and comments. If the person receiving your document has a pre-2010 version of Microsoft Word, it makes sense to use the _______ _______. To make sure your document can be read by devices for the visually impaired, run the _______ _______.
Answer:
(a): Replace
(b): Hyperlinks
(c): Document Inspector
(d): Compatibility checker
(e): Accessibility checker
Explanation:
You will get the brief explanation of what each of the answers in the answer section does, when you complete the blanks with the answers.
However, further explanation is as follows;
(a): The find and replace tool or command allows the user to quickly replace a certain character or word or group of words with another character or word or group of words.
(b): Hyperlinks are used to link to a new document entirely or a point in the current document. Hyperlinks in Microsoft Office Word, are often in blue, and they are always double underlined.
(c): Document inspector checks hidden data such as personal information.
(d): Compatibility checker checks if a Word document is compatible with a previous edition of Microsoft Office Word.
(e): Accessibility checker checks if the people living with disabilities can use the Word document without issues.
The correct answer for each of the blanks in the given paragraph about commands and tools in computer are;
REPLACEHYPERLINKSDOCUMENT INSPECTOR COMPATIBILITY CHECKERACCESSIBILITY CHECKERA) The commands that allows the user to quickly locate and replace a text are called find and replace commands because they are used to replace a certain character or text or group of texts with another.
B) The means by which you are allowed to easily navigate to places within or outside the document is called Hyperlinks. This is because that are used to give us a link to a new document or a related one outside of the current document.
C) The tool used to find out if your document contains personal information and comments is called Document inspector. This is because it aids in checking personal information and other hidden data information.
D) The tool to use if the person receiving your document has a pre-2010 version of Microsoft Word, is called Compatibility checker. This is because a compatibility checker would help to find out if a particular Word document is compatible with a previous version of Microsoft Word.
E) The tool to run to make sure your document can be read by devices for the visually impaired is called Accessibility checker as it has inbuilt codes to assist in checking if the document can be effectively utilized by people living with disabilities.
Read more about tools and commands in Microsoft Word at; https://brainly.com/question/1323179
1. What is used to change the appearance of a cell's value based on parameters set by the user?
SOMEONE PLS HELP ME
Alright so in problem solving class which I think is basically compsci we are working with Karel and conditional loops. The world we are using rn is called cleanUp. I need someone who is good at this stuff to help me ASAP!!!!!!! It’s due at 8:30 am tomorrow!!
HELPPPPPPPP
what helps users focus on the key messages that draw peoples attention to key areas of a site
a. site content
b. visual hierarchy
c. wireframe
d. group block
What do fair use and copyright laws help you understand ?
Explanation:
we can understand about the systematic laws and surely we can be aware of such things also it promotes the correct use of our technology and innovations.
what is a major difference between cyber vandalism and online priacy
Answer:
There really isn't a significant difference; two terms for the same things. B. Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.
Answer:
Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.
Explanation:
a p e x
If someone wanted to talk to a financial institution representative in person they would need to _____.
Answer:
I am pretty sure its log in onto the websitre but im not sure if its that or go to the financial institution.
Explanation:
9.6 Code Practice
Instructions
1
Declare a 4x 5 array called N
Please helppp
Answer:
See Explanation
Explanation:
The question lacks so many details, as the array type and the programming language is not stated.
Assume that, it is Java:
The rule to follow is:
Data-Type[][]Array-Name = new Data-type[rows][columns]
If the given information is for an array of type integer, the code will be;
int[][] N = new int[4][5]
Where
N = Array-Name
int = Data-type
4 and 5 are the dimensions of the array
What is computer task bar
Answer:
It is a bar where you can see all of your tasks or pinned items.
Explanation:
31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure
Answer:
31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;
a) Something the individual knows;
The Personal Identification Number (PIN)
The password to an account
Answer to a (complete) set of questions
b) Something the individual possesses
An ATM card
A SIM card
Other examples includes;
Physical keys to a lock
Smart cards
Electronic Key-Card used for physical entrance into an apartment
c) Something the individual is (Static biometrics)
The fingerprint
Face recognition
Retina recognition
d) Something the individual does (dynamic biometrics);
Recognition of typing rhythm
Characteristics of the users handwriting
Voice pattern recognition
32) a) Specific account attack
A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password
Countermeasure;
Limiting the number of password guesses
The use of strong passwords having over 8 characters that includes special characters
Use of multi-factor authentication
b) Workstation Hijacking
The attacker takes advantage of an logged-in unattended workstation
Countermeasure;
The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device
c) Password Guessing
Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password
Countermeasure;
The use of a two or more of authentication method also known as a multi-factor authentication MFA
Explanation:
Write a pseudo code to complete the factorial of 5 recursively and print the value on the screen. I’ll mark brianliest
Answer:
number = int(input('Enter number: '))
factorial = 1
for i in range(1, number + 1):
factorial = factorial * i
print(factorial)
You will need to input 5 when you run the code. Or you can add change the "number" to "number = 5"
What is the output from main (below) after the following function is called. void calculateCost(int count, double& subTotal, double& taxCost) // definition { if ( count < 10) subTotal = count * 0.50; else subTotal = count * 0.20; taxCost = 0.1 * subTotal; } int main() { double tax = 0.0, subTotal = 0.0; calculateCost(15, subTotal, tax); // function call cout << "The cost for 15 items is " << subTotal << ", and the tax for "<< subTotal << " is " << tax << endl; return 0; }
Answer:
Explanation:
You should contact your references _____ a job interview.
only if the interviewer asks for your references
before and after
before
after
Answer:
My research suggests that it is before and after.
You should contact your references before and after a job interview.
What is Interview?A planned interaction in which one party asks questions and the other responds is known as an interview. A one-on-one chat between an interviewer and an interviewee is referred to as a "interview" in everyday speech.
The interviewee answers the interviewer's questions by typically supplying information. Other audiences may utilize or receive that information right away or later.
This characteristic is common to many different types of interviews; even though there may not be any other people present during a job interview or an interview with a witness to an occurrence, the answers will still be given to other people later on in the hiring or investigative process.
Therefore, You should contact your references before and after a job interview.
To learn more about Interview, refer to the link:
https://brainly.com/question/13073622
#SPJ2
What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?
A separate data sheet opens in which to enter data for the chart.
The user is prompted to link to an external Excel spreadsheet
The user can edit the chart directly
Nothing happens
Answer:
A (because you can't have a chart without information, right?)
brainliest plz
Explanation:
Select the correct answer from each drop-down menu.
Nancy suffers from Repetitive Strain Injury (RSI), a condition that results from repetitive hand movement on a computer. What can help Nancy to reduce the strain from RSI?
To reduce the strain from RSI, Nancy can use___
and ___ regularly.
Answer:
To reduce the strain from RSI, Nancy can use an ergonomically designed keyboard and exercise regularly.
Explanation:
Just makes the most sense dude.
Jason is working on a Microsoft Excel worksheet and he wants to create a Print Preview shortcut. His teacher asks him to access the Customization option to create the new shortcut. Which two tabs should Jason select to place the Print Preview shortcut on the worksheet toolbar?
Answer:
New Tab (Custom) and New Group (Custom)
Explanation:
In order to accomplish this Jason needs to use New Tab (Custom) and New Group (Custom). The New Tab (Custom) will allow Jason to add a new tab with the Print Preview shortcut as a brand new tab in the software. Then using the New Group (Custom) tab, Jason can group the Print Preview shortcut with the worksheet toolbar so that it appears as part of the original toolbar with the rest of the tools available in the toolbar.
im timed!!!!!!!!!!!!!!!!!!
I NEED HELP ASAP
THANK YOU SO MUCH
Answer:
C.
Explanation:
GUYS!
YOU GOTTA HELP ME CAUSE IM FLIPPIN OUT
OK SO EARLIER TODAY MY LAPTOP WASNT WORKING SO MY DAD SAID I COULD USE HIS
I HAD TO LOG INTO MY WORD ACC TO DO WORK
AND IT WOULDNT LET ME IN HIS SO I USED MINE
MY MOM HAS SAFTEY SETTINGS ON MY OUTLOOK ACCS
BUT I DIDNT KNOW IT WOULD LOG INTO EVERYTHING I THOUGHT IT WOULD ONLY LOG INTO WORD
S O O IM TRYING TO LOG OUT OF MY ACC
BECAUSE MY DAD IS VV PARTICULAR ABOUT HIS COMPUTER
HES GONNA BE MAD
SO
MY QUESTION IS
DOES ANYONE KNOW HOW TO LOG OUT OF LIKE MICROSOFT ACCS
Attached is the answer, please look.
Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless anti-virus software and the latest operating system patches are installed. Which solution should you use
Answer: Network access control (NAC)
Explanation:
The solution that should be used is the network access control. Network access control helps in keeping devices and users that are unauthorized out of ones private network.
In this case, since one will like to prevent the laptops from connecting to the network unless anti-virus software and the latest operating system patches are installed, then the network access control can be used. One can only give access to the device that it wants to give access to and prevent others from connecting.
Write a program that accepts an integer value called multiplier as user input. Create an array of integers with ARRAY_SIZE elements. This constant has been declared for you in main, and you should leave it in main. Set each array element to the value i*multiplier, where i is the element's index. Next create two functions, called PrintForward() and PrintBackward(), that each accept two parameters: (a) the array to print, (b) the size of the array. The PrintForward() function should print each integer in the array, beginning with index 0. The PrintBackward() function should print the array in reverse order, beginning with the last element in the array and concluding with the element at index 0. (Hint: for help passing an array as a function parameter, see zybooks section 6.23) As output, print the array once forward and once backward.
Answer:
The program in C++ is as follows:
#include <iostream>
using namespace std;
void PrintForward(int myarray[], int size){
for(int i = 0; i<size;i++){ cout<<myarray[i]<<" "; }
}
void PrintBackward(int myarray[], int size){
for(int i = size-1; i>=0;i--){ cout<<myarray[i]<<" "; }
}
int main(){
const int ARRAY_SIZE = 12;
int multiplier;
cout<<"Multiplier: ";
cin>>multiplier;
int myarray [ARRAY_SIZE];
for(int i = 0; i<ARRAY_SIZE;i++){ myarray[i] = i * multiplier; }
PrintForward(myarray,ARRAY_SIZE);
PrintBackward(myarray,ARRAY_SIZE);
return 0;}
Explanation:
The PrintForward function begins here
void PrintForward(int myarray[], int size){
This iterates through the array in ascending order and print each array element
for(int i = 0; i<size;i++){ cout<<myarray[i]<<" "; }
}
The PrintBackward function begins here
void PrintBackward(int myarray[], int size){
This iterates through the array in descending order and print each array element
for(int i = size-1; i>=0;i--){ cout<<myarray[i]<<" "; }
}
The main begins here
int main(){
This declares and initializes the array size
const int ARRAY_SIZE = 12;
This declares the multiplier as an integer
int multiplier;
This gets input for the multiplier
cout<<"Multiplier: "; cin>>multiplier;
This declares the array
int myarray [ARRAY_SIZE];
This iterates through the array and populate the array by i * multiplier
for(int i = 0; i<ARRAY_SIZE;i++){ myarray[i] = i * multiplier; }
This calls the PrintForward method
PrintForward(myarray,ARRAY_SIZE);
This calls the PrintBackward method
PrintBackward(myarray,ARRAY_SIZE);
return 0;}
plz help me I have to submit the work before the day ends
13. (a) State one area where computers are used.
(2 marks)
(b) Give any two advantages of using computers in this area
(4 marks)
(c) Explain three effects of computer technology in the following areas:
(i) Job opportunities
(3marks)
Answer:
13. (a) One area where computers are used is in the creation of a record of auxiliary workers, doctors, nurses, patients, vendors, and payments that can be easily retrieved at an hospital
(b) Two advantages of using computers in an hospital are;
1) The ability to easily access the health record of a patient by a member of staff involved in treating the patient from any location
2) The reduction in the number of physical files and document kept at the counter or record storage which takes up more space as new patients are registered, even when the number of active patients remains the same
(c) Three effects of computer technology in the following area are;
(i) Job opportunities
1) The introduction of the desktop computer, increased the number of job opportunities in desktop publishing, administrative assistance and secretarial role
2) Computer technology has made more people able to work from home
3) Computer applications use with computer technology and developed to work with production machines has created a large number of machine operator job opportunities
Explanation:
Your aunt owns a store and hired you to analyze the customers. You recorded the estimated ages of customers who shopped in the store and whether they made a purchase. Some of your data values are followed. What types of analysis could you do with this data? Select 4 options.
Answer:
-percentage of customers who made a purchase
-minimum age
-average age
-maximum age
Percentage of customers who made a purchase, minimum age, average age and maximum age are the types of analysis could you do with this data. Hence, option A, B, C and E are correct.
What is data values?A data value is the material that fills the space of a record. For instance, one of the database's numerous data fields might contain a number that indicates the weight of a certain integer.
Data, such as statistics, phone numbers, or inventory counts, are undoubtedly pieces of information that a person would understand as numbers.
Data provides useful information that enhances business decisions. This information is the result of an effective data analytics strategy. Businesses may create a data culture far more easily because of the monetary worth of data.
Thus, option A, B, C and E are correct.
For more information about data values, click here:
https://brainly.com/question/16612044
#SPJ2