Answer:
A,B,D,E
Explanation:
Answer:
A- uses clearly and simply labeled links
B- is consistently styled and located
D- is intuitive and easy to use
E- is available on all pages in the site
Which of this isn't one of the three types of cryptograph?
A. Vegenere
B. Symmetric
C. Asymmetric
D. Hashing
Answer:
A. Vegenere
Explanation:
I think it's spelled Vigenère, I might be wrong.
The three types of cryptograph are:
Symmetric Key Cryptography (Private/Secret Key Cryptography)
Asymmetric Key Cryptography (Public Key Cryptography)
Hash Function
agree and tell why becoming a priest/nun is an honorable job PLEASE ASAP
The ideal hash function:
A. Should be unfeasible to find two inputs that map to the same output
B. Should be unfeasible to learn anything about the input from the output
C. Basically we don’t want people to figure out what was said
D. All the above
Explain two options you have in order to abide by the move over law??? PLEASE HELP ME ASAP!!
Answer:
you can either move over if on an interstate into a different lane safely. if there is only one lane you must reduce your speed
Which of the following is an example of gameplay in a video game
A: the art of a game
B: the player interacting with the game world and game mechanics
C: the personalities of all the characters
D:all of the above
Answer:
the correct answer is B. the player interacting with the game world and game mechanics
When a user modifies the fonts in a message and immediately sees the effect of a font change without actually selecting the font, which outlook feature is the user witnessing
Answer:
Live Preview
Explanation:
With Live Preview mode on in Microsoft Outlook while composing an email content, a user will be able to see effects of the when the mouse cursor is placed format for the text including, the text size, font of the text, the text color, which are immediately applied to the selected text to give a preview of what the effect of the editing function the cursor is hovering over can do.
Which of the following would be done outside of a control room?
programming a teleprompter
cueing camera operators
switching between multiple cameras
uploading camera footage on location
Answer:
a
Explanation:
Answer:
a
Explanation:
how many ones dose it take to get 9 tens
What are three print output options available in PowerPoint?
A. Handouts, Slides, Speaker Notes
B. Outline, Kiosk, Overheads
C. Overheads, Handouts, Slides
D. Kiosk, Handouts, Computer
Answer: .A
Explanation: i got it right
Answer:
'A' on edge 2020
Explanation:
Just took the test
A computer that provides special services to client computers on demand.
Answer:
A server?
Explanation:
I feel like this would be the answer but if it is multiple choice, reply with the possible answers. Hope this helps!
What are the steps to customize a slide show?
Go to Slide Show tab, select Hide Slide, select the slides to hide, and save.
Go to Slide Show tab, select Set Up Slide Show, select show type Custom, and save.
Go to Slide Show tab, select Custom Slide Show, select slides to be shown, and save.
Go to Slide Show tab, select Custom Slide Show, select Record Slide Show, and save.
Answer: Third one
Explanation: I got it right
Answer:
Third one
Explanation:
you are working on creating a business document with two other co-workers. Based on just information, which of the following pre-writing strategies would be the best for you?(A.P.E.X.)
Which line is most likely an error? A-“hello” B-hello C-“100” D-100
Answer: I think it is c
Explanation:
The error is most likely C. Hello quoted is proper. ("Hello") Eliminate A. Hello is proper as well so eliminate B. Now, we are at C. I Believe this is the answer since it is 100 quoted ("100"). 100 quoted does not make since unless used in a sentence such as "I bought 100 apples today for a good price!" D cannot be the answer since it is 100 all by itself. Thus, your answer should most likely be C, "100".
What are possible challenges of cyberbullying
Answer:
so,e challenges of cyber bullying is that,it could be a random person bullying u and u won't know who it is,another challenge of cyber bullying is that they can blackmail u or pretend to be u or threaten u
Answer:
Possible challenges of cyberbullying have to do with nonbelievers, or people who do not think cyberbullying is a real problem. Technology makes it hard to stop bullies, and some people do not want to take responsibility.
Collisions occur when one output is mapped to two inputs.
A. True
B. False
Answer:
true very true very true
Answer:
False
Explanation:
I honestly just guess ngl
but i believe it's right ;0
Read this passage from The Phantom Tollbooth. There was once a boy named Milo who didn't know what to do with himself--not just sometimes, but always. When he was in school he longed to be out, and when he was out he longed to be in. On the way he thought about coming home, and coming home he thought about going. Wherever he was he wished he were somewhere else, and when he got there he wondered why he'd bothered. Nothing really interested him--least of all the things that should have. The most likely reason the author begins this fantasy with a realistic element is to make the text more amusing. exciting. believable. interesting.
Answer:
I think its believable
Explanation:
^^
I think its believable
why make people act meaner online the. in person
Microsoft Word, Google Chrome, and Windows Media Player are examples of
Answer:
They are all examples of software.
Help me pls!!
Look at the following assignment statements:
food1 = "water"
food2 = "melon"
What is the correct way to concatenate the strings?
newFood = word1 == word2
newFood = word1 + word2
newFood = word1 * word2
newFood = word1 - word2
new food = word1 + word2 will connect both words together with no space in between. The value of newFood will now be "watermelon"
Answer:
new food = word1 + word2
Explanation:
Write a function that takes the name of a file with a .csv extension (a comma-separated value file), and writes a new file that is equivalent (same name and same data) but with a .tsv extension (a tab-separated value file: like a CSV but with tabs instead of commas separating the elements of the file). Note: the character used to represent a tab is ‘\t’.
Answer:
import pandas as pd
def convert_to_tsv( csv_filename ):
df = pd.read_csv("csv_file")
df.to_csv("csv_filename.tsv", sep='\t')
Explanation:
The python program uses the pandas' module to read in the csv file in the function "convert_to_tsv". The file is saved as a tsv file with the pandas to_csv method and the " sep= '\t' " attribute.
Documentary photographers strive to produce what type of image?
А.
Edited
B.
True
C.
Colorful
D.
Blurred
Answer:
B. :)
Explanation:
What is wrong in this python code import turtle bot = turtle.Turtle step = (50) turnAngle = (90) bot.Color("blue") bot.Begin_fill() bot.Forward(step) bot.Right(turnAngle) bot.Forward(step) bot.Right(turnAngle) bot.Forward(step) bot.Right(turnAngle) bot.Forward(step) bot.Right(turnAngle) bot.End_fill()
Answer:
The "Turtle" is a method and should be declared with parenthesis and every other method in the code (except the Turtle() ) should begin with lowercase letters like right, forward and begin_fill. The python file should not be saved as turtle.py to avoid import error.
Explanation:
The python turtle module is a graphical programming package created to introduce programming to children. It has several classes and methods to manipulate objects on the screen.
import turtle
bot = turtle.Turtle()
step =(50)
turnAngle =90
bot.color("blue")
bot.begin_fill()
bot.forward(step)
bot.right(turnAngle)
bot.forward(step)
bot.right(turnAngle)
bot.forward(step)
bot.right(turnAngle)
bot.forward(step)
bot.right(turnAngle)
bot.end_fill()
what are some tips to stay focused in school, and to complete work faster?
Answer:
Sometimes listening to music or chewing gum.
Explanation:
When I need to focus, I like listening to music and sucking on a hard candy or chewing gum.
Pls give Brainliest!!
Answer:
What I do to focus in school is to try and ignore everything that is going on around you. ( what your classmates are doing ) Drown out the noise with music if your allowed to listen to music. Ask the teacher is you can go somewhere quieter
Explanation:
Hope this helps, Have a Wonderful Day!!
____ a British mathematician devolved the concept of a programmable digital computer and worked with Ada Lovelace to design the first mechanical computer the Analytical Engine
A William Shockley
B Grace Hopper
C Charles Babbage
D Bill Gates
someone pls answer asap
Answer:
C: Charles Babbage
Explanation:
Charles Babbage
Charles Babbage (1791-1871), computer pioneer, designed two classes of engine, Difference Engines, and Analytical Engines.
The analytical engine is a comprehensive robotic computer system that's been fully programmed as well as automatically controlled, and the further discussion can be defined as follows:
The computer pioneer Charles Babbage (1791-1871), designed two engine classes, different engines as well as analytical engines.He was indeed the brain behind ideas and therefore is considered one of the best on two different computers.A British mathematician Charles Babbage has invented the notion of the digital programmable computer and has been working with Ada Lovelace to design an analysis engine's first machine.Therefore, the final answer is "Option C".
Learn more:
brainly.com/question/23422991
What action demonstrates unethical behavior?
A.
working overtime
B.
completing your work ahead of time
C.
taking credit for another person’s work
D.
keeping a tab on your organization’s carbon footprint
E.
leaving office on time
Answer:
taking credit for another person’s work
Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.
What is Unethical behavior?When a person, a professional, or an industry acts in a way that is deemed unethical because it goes against social norms, that behavior is referred to as unethical behavior.
Politicians, businesses, professions, and individuals all have the potential to act unethically.
There are other instances of deliberate deception, but they serve as illustrations of how damaging deception can be when it is used to violate someone's rights or security.
Therefore, Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.
To learn more about Unethical, refer to the link:
https://brainly.com/question/10174825
#SPJ2
Match the interface element with the corresponding examples. You will use the elements more than once.
Question 1 options:
List Boxes
Message Boxes
Accordion
Modal Windows
Search Field
Notifications
Buttons
Checkboxes
Tooltips
1.
Input Controls
2.
Navigational Components
3.
Informational Components
4.
Containers
(place each one of them under the 1.2.3.4 categories)
Answer:I’m nit sure sorry
Explanation:
..
look at the picture lol
Answer:
Zoom in more please and than i can help
Explanation:
Answer:
I would go with the first blue highlighted one... but i could be wrong
i hope i helped
if i didn't... i am sorry, i tried.
Select the protocol data units.
1. Bit
2. Segment
3. Frame
4. Data
5. Spoof
6. Pin
7. Packet
Answer: 4. Data 2. segment 7.packet 3.frame 1.bit
Explanation:
Answer:
segmet bit packet frame data
Explanation:
• Describe why you may have traveled to the same place many times. Why would this happen in nature?
4.8 Code Practice: Question 1
Instructions
Write a for loop to print the numbers 5, 10, 15 … 75 on one line.
Expected Output
5 10 15 20 25 30 35 40 45 50 55 60 65 70 75
I included my code in the picture below. Best of luck.
Loops are used to perform repetitive operations.
The for loop in Python is as follows:
for i in range(5,76,5):
print(i,end =" ")
The syntax used for the range in for loop is: (start,end+1,increment)
The start represents the first value to be printed.
So: start = 5
The end represents the last value to be printed.
So: end = 75
Because the end value will not be inclusive, the value is incremented by 1
The increment is 5
Read more about similar programs at:
https://brainly.com/question/21298406