Answer:
Input of printer - text
Output of Printer - text printed on paper
Input & output of digital Alexa - Voice/sound
Explanation:
Input for a printer is the text data entered into any of the file formats that can be printed.
Output of a printer is the text printed on a piece of paper.
Input of a digital assistant is in the form of voice
Output of a digital assistant in the form of sound
time to throw poggers xqc time to throw pogchamp time to throw pogchamp time to throw pogchamp time to throw pogchamp time to throw houhouhouhou time to throw poogcham
Answer:
yep
Explanation:
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?
Assignee
Client
Delegate
Manager
Answer:
I think it's B, Delegate
Explanation:
Cause the other options didn't seem to fit as the answer.
I really don't know though.
A delegate is someone who has been granted permission by another user to access. The correct answer would be an option (C).
What is a mailbox?A computer-simulated mailbox that stores email messages. Mailboxes are saved on a disc as a message file or a message database.
A delegate is someone who has been granted permission by another user to access and manage their mailbox, including sending and responding to email messages on their behalf.
When you grant delegate access to another person, you are giving them the ability to access specific folders within your mailbox and perform specific actions, such as reading, sending, and deleting email messages.
Assignee, client, and manager are not terms typically used in the context of delegate access in email systems.
Thus, the correct answer would be option (C).
Learn more about the mailbox here:
https://brainly.com/question/28430685
#SPJ6
Create a file name that to ensure the that the file is easy to find
Answer:
I always name mine something like HI
or YEET i dont know
why but it works
Explanation:
Which actions changed the look of the following word?
A. The Spelling & Grammar function marked the word as an error.
B. The style of the word was set to underline.
C. The user changed the font size.
D. The word was set in italics, and then underlined.
Answer:
D
Explanation:
The actions applied to change the look of the word are:
1. It was set to italics. This can be done easily by highlighting the word => press Ctrl + I together on the keyboard.
2. Next is to set to underline. While still highlighted => press Ctrl + U together in the keyboard.
Answer:
D
Explanation:
Which finger is used to press SHIFT key while typing!
A. Little finger
B. Thumb
C. Index finger
D. Ring Finger
Answer:
Little Finger (A)
Explanation:
What type of device is a keyboard?
Input
Memory
Output
Storage
Answer:
a keyboard is an input device
it's an input
Explanation:
There are three different types of peripherals: Input, used to interact with, or send data to the computer (mouse, keyboards, etc.) Output, which provides output to the user from the computer (monitors, printers, etc.) Storage, which stores data processed by the computer (hard drives, flash drives, etc.)
what is the meaning of HML
Answer:
Explanation:
Hit my line
Write a program to allow user to perform any of these list operation given in a menu. The menu is: a) Append an element b) Insert an element c) Modify an existing element d) Delete an existing element with a given value e) Sort the list in descending order f) Display the list.
Answer:
c
Explanation:
Reading a news release about a product is an example of
research.
Answer:
Yes, it is true, because it informs you
Explanation:
Choose all items that are true about the two example of HTML shown on the right.
Example 1 will display differently than example 2 in a web browser.
They are styled differently, but will look the same in a web browser.
Example 2 is easier to analyze and repair.
The styling in example 2 is required by modern web browsers.
Answer:
2
Explanation:
Answer:
B and C
Explanation:
this site isn't letting me add my ans and wut should I do?
Wiliam would like to sort a list of items after the data is already entered
Which method is NOT an available sort option?
number
date
text
symbol
Answer symbol
Explanation:
what have very strong chemical bonds and cannot be reshaped when heated.
Answer:
Thermosets
Explanation:
What are Layers in computer class 7. no scams please
Answer:
It means and organisation programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
What is the name of the function below?
function go(){
alert("hello everybody");
}
Answer:
It’s Java script I think and it makes something say hello everybody
Explanation:
What is programming?
Answer:
using code etc to change how something works out make it work how you want it to. mostly code but sometimes circuit boards and stuff like that.
Explanation:
see above
Answer:
Programming is the process of creating a set of instructions that tell a computer how to perform a task.
Enumerate the steps on how to set-up the CD-ROM as the first boot device.
Answer:
Explanation:
1)Press boot key ( Del or specified key)
to enter BIOS setup utility.
2) using the direction keys, make selection of "Advanced BIOS Features"
3)then access Advanced BIOS setting by pressing Enter key
4. Using up/ down arrow keys Select "First Boot
Device"
.
5) Using up and down keys, select "CD-ROM "
6. go back to "BIOS setting screen" by Pressing ESC key
7. Select " Save & Exit Setup"
.
Which option is the default when creating appointments and meetings in a user’s own calendar as it relates to Free/Busy information that others will see when looking at the user’s calendar?
a. Free
b. Working Elsewhere
c. Busy
d. Tentative
I only have 10 minutes left so please help fast!
Answer:
C !
Explanation:
Answer:
Busy
Explanation:
What is the difference, if any, between a social media strategist and a social media specialist?
A. They are very similar occupations, except that social media specialists tend to have more training.
B. A social media strategist determines how an organization will maintain a social media presence, and the specialist creates the content.
C. There is no difference—these are the same job with slightly different titles.
D. A social media specialist determines how an organization will maintain a social media presence, and the strategist creates the content.
Thank you!
A social media strategist is an expert who is involved in determining the presence of an organization over the social media; whereas, a specialist is involved in creating the content for social media.
What is social media?The use of computer networks and internet for the purpose of sharing and expressing one's views with the connections over such platform is known as a social media.
A social media strategist, for an organization, will be involved in maintenance of the social media activeness of the organization; whereas, the content for such presence is in the hands of a specialist.
Hence, option B holds true regarding the roles of handling social media of an organization.
Learn more about social media here:
https://brainly.com/question/18958181
#SPJ2
Write the Python programs for the
following:
To input a number and check if it is
even or odd number
Answer:
num = int(input("Enter a number: "))
if (num % 2) == 0:
print("{0} is Even number". format(num))
else:
print("{0} is Odd number". format(num))
Question #6
Multiple Choice
What tag is used to contain information about a web page, such as the title and related pages?
O
O
Answer: b; head
Explanation:
Answer: <head>
Explanation: EDGE '23
which of the following can be represented by a sequence of bits. 1. An integer 2. An alphanumeric character 3. A machine language instruction
Answer:
all of them
Explanation:
In a computer program, this is how numbers, text and program instructions are stored.
Choose the correct qurey to remove a record with names "John" in the persons table
(a) Delete from persons where name="John";(b) Delete from table1 where name="John";(c) Delet from persons where name="John";(d) Delet from persons where name="Alex";
Answer:
a
Explanation:
The correct syntax would be:
DELETE FROM persons WHERE name='John'
i.e., use single quotes. Uppercase keywords is not required but preferred by many.
Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection method for each of the following categories:
Data collection on the internet
Digital data collection from a source other than the internet
Analog (non-digital) data collection being performed in physical places
For each of these data collection practices: Describe how the data collection occurs. Analyze the data collection process by answering the following five questions in complete sentences and to the best of your ability:
What data is being collected?
Why is this data being collected?
What are the likely benefits of this data collection?
How might this data collection cause harm?
How likely is it that this data can be accessed by others?
You may use the internet or any other available resources to identify and analyze these data collection strategies.
Answer:
Data is one of the most valuable resources today's businesses have. ... There are various data-gathering methods you can use with the help of your ... When it comes to data businesses collect about their customers, ... Third-party data offers much more scale than any other type of data, ... Big White Cursor.
Explanation:
The data is one of the most essential and the most important aspects of the modern world and s collected each and every hour. The data forms an essential element of the internet and digital media.
The data is held soly responsible for the generation of numerous possibilities.The data collected can be used for further processing and creation of new contents.Learn more about the tasks to identify.
brainly.com/question/20688743.
Which area of government regulations do the Fair Credit and Reporting Act
(FCRA) and the Gramm-Leach-Bliley Act (GLB) relate to?
A. Advertising
B. Health and safety
C. Privacy and security
D. Employment and labor
Answer: C. Privacy and security
Explanation: 100% correct
My friend wants to use my findSmallest() function in her program. Is this function ready to be shared in a library?
Answer:I would think that it would be.
Explanation:
create html code showing heading tags
Answer:
Assuming you mean the HTML5 head tag, then this may work for you:
<!DOCTYPE HTML>
<html lang="en">
<head>
<title>My Very Awesome Website</title>
<link href="./css/main.css" rel="stylesheet" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
</head>
<body>
<h1>Hey look</h1>
<p>This is my awesome website!</p>
<h3>Note</h3>
<p>This website is supposed to be 100% awesome!</p>
</body>
</html>
Explain in not less than 3 Sentences
1. Decimal Number System
2.Binary Number System
Answer:
The Decimal Numeral system :-
It is the standard system for denoting integer and non-integer numbers. It is the extension to non-integer numbers of the Hindu–Arabic numeral system.
Binary Number system :-
It is a number expressed in the base-2 numeral system , which uses only two symbols: typically "0" and "1". The base-2 numeral system is a positional notation with a radix of 2. Each digit is referred to as a bit, or binary digit.
hope it helps you...
What is block palette
How can identity theft be prevented?
Answer:
Identity theft can be prevented by using proper security measures
Explanation:
Identity theft can be prevented by using proper security measures such as stronger passwords and VPN. It can also be protected by making sure your system security is up to date.