Answer:
D
Explanation:
Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets
How can she change that value so it is reflected in the chart in her presentation?
Answer:
She can change the value in the mini- spreadsheet for the chart in PowerPoint.
Explanation:
Answer:
What she said above or below me
Explanation:
Which Amazon device can be used to control smart devices (such as lights) throughout a home using voice commands
Answer:
Alexa device
Explanation:
You can build smart home and other products that customers from millions of Alexa devices with just their voice .
How do people get in your computer
Answer:
????
Explanation:
This is absurd, you cannot enter your computer. it is to tiny for you to fit in.
Answer:
Explanation:
I don’t know
You are running the Chrome Web browser and try to open a Web site when you are prompted for login credentials. What TCP/IP model layer is at work that requires you to logon to the Web site
Considering the situation described above, the TCP/IP model layer that is at work that requires you to log on to the Web site is known as the "Application layer."
The application layer, otherwise known as the abstraction layer, is defined in the Internet Protocol Suite (TCP/IP) and the OSI model.
Also, the application layer determines the shared communications procedures and interface modes utilized by the hosts in a communications network.
Some of the common examples of application layer include the following:
Hypertext Transfer Protocol (HTTP),File Transfer Protocol (FTP),Domain Name System (DNS), etc.Hence, in this case, it is concluded that the correct answer is "Application layer."
Learn more here: https://brainly.com/question/25278036
Which insert image option allows a user to insert images from the internet?
Answer:
d. Online Pictures
Explanation: is correct
Answer:
online pictures
Explanation:
The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext
Who plays a role in the financial activities of a company?
____ is Windows XP system service dispatch stubs to executables functions and internal support functions.
Answer:
Ntdll.dll is Windows XP system service dispatch stubs to executables functions and internal support functions.
prepare a short report of some technological devices??
please help me brainliest
Answer:
Technology is the most useful form of science for the general population. In simple words, technology is when we take the concepts of science and transform them into gadgets and devices that are useful to us as human beings. When we look around us, almost everything is a result of or a form of technology.
For example, the device you are using right now is a form of technology made for communication, or the refrigerator in your kitchen is a use of science that helps to keep your food fresh and cool. With these examples, we see how dependent we are on technology and how important it is for us in our daily lives.
It isn’t easy to imagine our lives without using any form of technology. For the smallest of communications, we tend to turn to our mobile phones. Even most of the food we eat is packaged in factories using various technologies. Thus, imagining a life without technology is impossible. It is not only a fact of life but also a necessity for all of us.
In fact, the smartphone, that is, a mobile phone which can connect to the internet, is becoming one of the fastest-growing and most accessible forms of technology around the world. On a smartphone, you can click photographs, browse the internet, listen to music, and use social media. With the advent of smartphone technology, the practical purpose of not only communicating with your friends is met, but also so many others, as mentioned.
Thus, in today’s world, the importance of technology becomes more and more as the years pass. Scientists have done so much to advance humans using technology, and we still have a long way to go.
Explanation:
You are welcome! ;D
What is disadvantages of disk maintenance
Answer:
The torque generated on the axle (for a normal rear mounted disk caliper) is down - the same direction as the dropouts.
one big disadvantage of disks is that has yet been mentioned is their ability to eject the front wheel when using a tradition QR axle.
Explanation:
CAN I GET BRAINLIST
What is row and column? class 9
Answer:
just click the picture
Explanation:
plz mark me a BRAINLEST plss I just need it
Shad has been finding himself unable to focus lately. Sometimes, he feels a knot in his stomach accompanied by nausea. As a result, he rarely has an appetite and is eating less than he should. These symptoms coincided with Shad being selected for the lead role in the school play, which now adds a new responsibility to an already challenging academic schedule and part-time job. What might be an effective strategy for Shad to manage this stress? Add daily workouts to his schedule, at least 20 minutes each, to increase his energy and reboot his focus on his own health. Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments. Change his options for meals and select more appealing "comfort" foods that will make him enjoy eating again and increase his appetite. Quit the school play so that he can return to a schedule that is more manageable and will cause him less stress and anxiety.
Answer: change the food he eats to a comfort food so that he eats more
Answer:
The answer to this question is **Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments.
Explanation:
This answer makes sense because Shad wanted the the lead role, so he just needs to organize his other responsibilities and create a schedule that works without being stressed. Time management.
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us
Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.
Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.
Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.
Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.
Read related link on:
https://brainly.com/question/25522987
What is the advantage of learning through story compared to learning through personal experience?
A.
stories are “more real” than personal experience
B.
stories are easier to remember than personal experiences
C.
stories have no rules to follow
D.
you can learn from countless other lifetimes through stories
This is game design
Answer:
I think the answer would be D
Explanation:
it just seems to make the most sense
Answer:
Is D
Explanation:
Stories open doors which ususally take time to open and to explore in real life, the same thing happens when you use a book to do your homework. You use the book to get information which you don't know. The same is with reading stories, stories can be helpful since they can talk about a characters life mistakes, and experiences that the character has gone throught their life, which usually might be helpful on real life.
________ consists of programs designed to work behind the scenes to handle detailed operating procedures.
what should you consider when using a wireless keyboard with your home computer cyber awareness
A good practice is to protect data on your home wireless systems. What one should you consider when using a wireless keyboard with your home computer is Reviewing and configuring the available security features, including encryption.
An individual need to protect their information when using wireless technology. It can be done through avoiding the use of non-Bluetooth-paired or unencrypted wireless computer peripherals.The kind of information sometimes cause serious damage to national security in the event of unauthorized disclosure.
Learn more from
https://brainly.com/question/25349554
: Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).
Answer:
Computer scientists began building rudimentary games and simulations on mainframe computers in the 1950s and 1960s, with MIT's Spacewar! in 1962 being one of the first such games to be played with a video display. The first consumer-ready video game hardware arrived in the early 1970s, with the Magnavox Odyssey, the first home video game system, and the first arcade video games from Atari, Computer Space and Pong, the latter of which was later transformed into a home console version. Pong's success in arcades and at home prompted numerous firms to create clones of the game, resulting in a market contraction in 1978 owing to oversaturation and a lack of innovation.
The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.
Twitch is an online service that comprises original content in the form of live or recorded streams and it is typically focused on showing various individuals that are playing video games.
Twitch is an online (web) service that was launched in June 2011 and it derived its name from twitch gaming such as video games that are mainly about fast action and the use of reflexes by the game players.
The main purpose of Twitch is to avail game players the opportunity to stream or show live or recorded videos of themselves playing video games.
Read more: https://brainly.com/question/21694571
how do you play pokemon go
Answer:
download the app then tap your screen for the rest of your life
(And I'm being serious)
WILL MARK A BRAINLIEST!!! PLS HELP!!!
Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you
Answer:
man, just got rick rolled brb going to cry
Explanation:
Daijōbu desho. Datte Kimi yowai mon.
Which of the following can be considered as peripheral devices?
A). Primary storage media
B). User interfaces
C). Secondary storage media
D). Operating systems
The option that can be considered as peripheral device's is Primary Storage Media. Thus, option A is correct.
What is a peripheral device?A peripheral, also known as a peripheral device, is an auxiliary device used to input and output data from a computer.
Terminals, printer, outside floppy hard disks and other data storage devices, video displays, keyboards, interfaces cards, external memory adapters, and other input/output gadgets that might or might not contain digital circuitry are examples of peripheral devices.
The computer retrieves and stores the data in the primary storage device until the procedure is done, or the data is no longer needed. Primary storage devices include random-access memory (RAM), graphic card memory, and cache memory.
A computer peripheral is any outside device that allows the computer to receive and send data. Therefore, it can be concluded that option A is correct.
Learn more about peripheral device here:
https://brainly.com/question/21080721
#SPJ2
what is one benefit of utilizing social media to deliver advertising messages?
Answer:
Increased Brand Awareness.
Explanation:
Social media is one of the most cost-efficient digital marketing methods used to syndicate content and increase your business' visibility. Implementing a social media strategy will greatly increase your brand recognition since you will be engaging with a broad audience of consumers.
Answer:
An organization can test ads and promotions before bringing them to traditional media.
Explanation:
The USGS and National Weather Service have many sensors collecting data about natural events.
That data can be used to create a weather map.
Identify the parts of the Input-Process-Output model for each step.
(output, input, process): weather map displayed on a web page
(output, input, process): determination of color to be used on the map
(output, input, process): sensors collect temperature and precipitation data
Answer:
Explanation:
Throughout many regions on the chart, a standard plotting code demonstrates air currents speed and direction, average temperature and relative humidity, barometric pressure and its change over the previous hours, the number and variety of clouds, the weather type, including visibility restrictions, and the amount and type of precipitation.
USGS and National Weather Service
As per the question, the USGS and National weather services are mapping out the region to collect the data for the natural events. The data is collected in the form of maps and is used for the identification of the input and the output model steps.
The answer is precipitation data, visibility data.
The NWS is a federal agency of the united stated that is tasked to prove the forecasts and for the formation of hazardous weather events and warns the public of the related events.Learn more about the National Weather Service
brainly.com/question/17774978.
what are the different forms of auto form?
Answer:
There are two types of AutoForm—the New Object: AutoForm and the builder-based AutoForm. The New Object: AutoForm generates a very simple and uninspiring data entry form. The builder-based AutoForm creates five different types of forms: Columnar, Tabular, Datasheet, PivotTable, and PivotChart.
Printers can use ________, which enable the printer to automatically print on both sides of the paper.
Answer:
Duplex
Explanation:
Changing printer setup to print duplex will enable the printer to automatically print on both sides of the paper.
how do viruses spread from one computer to another computer?
Answer:Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.
Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).
- BRAINLIEST answerer
In every programming language, when you access data stored in an array, you must use a ____ containing a value that accesses memory occupied by the array. a. condition b. key c. subscript and. superscript
Answer: this app allow u to have answers made for students 5 star ap but there are some ads that get in the way
Explanation:
but it is good
Apple computers ship their computer parts to India to be made, and station their tech support in India. This is an example of a:
Companies are known to set up different branches. This is an example of a Global assembly line.
An assembly line is known to be a production process that breaks down the manufacture of goods into different steps that are completed in a known sequence.
These lines are often used method in the mass production of products as they reduce labor costs.
Global Assembly Line is simply known as distributed manufacturing method that entails the product research and development in wealthy countries and assemblage in poorer countries.
Learn more from
https://brainly.com/question/2954967
Answer:
Shipping?
Explanation:
No options sooo
________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
Answer:
Social engineering is a process of manipulating people into breaking normal security procedures or divulging confidential information.
Explanation: