Identifying Responses and Replies
Use the drop-down menus to complete the sentences about message response options in Outlook.
v sends your response to everyone who received the initial email.
v creates a new message that includes the initial message to a new recipient.
v sends your response to only the sender of the initial message.
Answer:
Identifying Responses and Replies by using the drop-down menus to complete the sentences about message response is written below in detail.
Explanation:
A situation like this may be:
Someone receives a bike. They travel it and all, and then all of an unexpected they fall and get injured
If you only understood the first section of how the person received a bike when you draft a response, you would only draft about that piece, but getting harm after receiving the bike is also a huge portion of the "story". You could draft like how you were so pleased when you received your first bike, but you wouldn't remember to address the time you got injured when you were riding down a hill or something.
Answer:
Reply All
Forward
Reply
Explanation:
How important is the knowledge of ICT to a pupil like you?
Any device that uses light to read and write information.
A. Optical Drive
B. Peripheral Device
C. Laser Device
D. Optical Device
Answer:
Optical Storage Device
edhesive 6.8 lesson practice answers please
Answer: any more info yo can give me. i want to help i dont undestand
Explanation:
Answer:
import simplegui
import random
# global constants
WIDTH = 600
HEIGHT = 400
PARTICLE_RADIUS = 5
COLOR_LIST = ["Red", "Green", "Blue", "White"]
DIRECTION_LIST = [[1,0], [0, 1], [-1, 0], [0, -1]]
# definition of Particle class
class Particle:
# initializer for particles
def __init__(self, position, color):
self.position = position
self.color = color
# method that updates position of a particle
def move(self, offset):
self.position[0] += offset[0]
self.position[1] += offset[1]
# draw method for particles
def draw(self, canvas):
canvas.draw_circle(self.position, PARTICLE_RADIUS, 1, self.color, self.color)
# string method for particles
def __str__(self):
return "Particle with position = " + str(self.position) + " and color = " + self.color
# draw handler
def draw(canvas):
for p in particle_list:
p.move(random.choice(DIRECTION_LIST))
for p in particle_list:
p.draw(canvas)
# create frame and register draw handler
frame = simplegui.create_frame("Particle simulator", WIDTH, HEIGHT)
frame.set_draw_handler(draw)
# create a list of particles
particle_list = []
for i in range(100):
p = Particle([WIDTH / 2, HEIGHT / 2], random.choice(COLOR_LIST))
particle_list.append(p)
# start frame
frame.start()
Explanation:
a deque is a type of collection,but it is not automatically available when you open IDLE. What is missing that allows you to use the deque class?
Answer:
Import
Explanation:
The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.
The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.
What is Import instructions?When you transition to Shopify from another platform or need to make several adjustments to your products or inventory, importing products into your Shopify store using a CSV file might be helpful.
The data from the CSV file is transformed into products when you import products, and you can choose whether to publish your new products to all sales channels or only your web store.
You have the ability to overwrite any existing goods with the same handle when importing a CSV file. For any columns that are absent, the current values will be used.
Therefore, The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.
To learn more about CSV file, refer to the link:
https://brainly.com/question/29242949
#SPJ2
Identify and summarize the features of the Windows 7 backup utility.
Answer:it is slow
Explanation: slow
Answer:
IT can create a backup it can restore a backup and probably more
Explanation:
The role of the
protocol is to make sure communication is maintained.
FTP
IP
ТСР
HTTP
Answer:
Tcp
Explanation:
Based on the following passage on construction technology during the Middle Ages, why might a worker not be allowed to join a guild?
During the Middle Ages, a family worked in a trade for generations, with fathers training sons and passing knowledge along bloodlines.
Masons learned how to carve elaborate gargoyles; glaziers made intricate stained-glass windows. These skilled workers were organized into
guilds, and on a construction site, guild workers were highly esteemed while lower-level unskilled workers completed simple routine tasks.
All laborers were paid.
He did not pass the necessary exams to qualify for guild membership
He had signed a contract forgoing payment in exchange for on-the-job training.
He was not born into a family of skilled laborers
His specialty did not fall under masonry or glazing.
Answer:
He was not born into a family of skilled laborers
Explanation:
View which is used to specify the tables fields , their data types and properties
Answer:
i am hina i am grade 12 C
Explanation:
my siater name os sana
Answer:
There are 2 basic views when you work in a table: Design View and Datasheet View. Design View is used to set the data types, insert or delete fields, and set the Primary key.
Hope it helps..
Have a great day : )
What should you do first when designing a program?
Answer: talk about da progrm
Explanation:
Answer:
Step-by step Explanation:
Explicar en qué sectores están divididos los procesos de producción y su importancia para el desarrollo tecnológico y económico del país. Indique dos ejemplos en cada sector
Answer:
Un sector económico es una rama de la economía en específico, caracterizada por englobar dentro de sí una serie de actividades interrelacionadas según cómo cada una contribuye al desarrollo económico del país. Una clasificación general popular de la economía es la división en los siguientes cuatro sectores:
1) Sector primario. El sector primario es el sector económico que abastece de materias primas y alimentos. Este sector abarca los sectores de agricultura, ganadería, caza, pesca y extracción de minerales. El procesamiento de estas materias primas se realiza en el sector secundario.
2) Sector secundario. Este sector se conoce como industria. Esto incluye todas las empresas y actividades que procesan las materias primas del sector primario. Los productos suelen ser revendidos al consumidor por el sector terciario.
3) Sector terciario. Este sector incluye los servicios comerciales: empresas que quieren obtener ganancias vendiendo sus servicios. El sector terciario incluye tiendas, catering, teatros, peluquerías, mayoristas, empresas de transporte, arrendadores, agencias de empleo, contables, abogados, consultores y empresas TIC.
4) Sector cuaternario. El sector cuaternario es el de servicios no comerciales, el único sector económico sin ánimo de lucro. Este sector incluye los servicios gubernamentales y los servicios subvencionados por el gobierno. Los ejemplos son hospitales, hogares de ancianos, cuerpos de bomberos, defensa, salud, trabajo social, educación y cultura.
Answer:
hola
Explanation:
You created a two-dimensional array with the following code.
>>> A = [21, 'dog', 'red']
>>> B = [35, 'cat', 'blue']
>>> C = [12, 'fish', 'green']
>>> E = [A, B, C]
How do you refer to 'cat'?
E[1, 2)
E[1,2]
E[1][2]
E[1,2]
Explanation:
My answer is E[1][1]
but I don't see it here
Answer:
E[1][2] that is correct I just took t
.Explain how encrypting data during transmission protects it from being read by an unauthorised person who intercepts the transmission.
Answer:
Encryption is an effective and efficient technique used to prevent unauthorized access to informations transmitted over the internet.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
SSL/TLS are standard protocols that provides link encryption for the transmission of messages over the internet such as electronic mail (e-mail).
SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.
In the case of TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.
This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.
How much mail can be
stored in each mail box?
Answer:
Most mailboxes are 1 - 4 GB with one or two larger.
Explanation:
Which of the following programming languages were initially developed to teach programming techniques to students? Choose all that apply.
Answer:
BASIC programming language
Pascal programming language
Explanation:
C++ programming language
Java programming language
BASIC programming language
Pascal programming language
Answer:
it's C and D
Explanation:
An application's certificate indicates the application -
A is regularly updated
B cannot be removed
C is installed
D is authentic
Answer:
D. is authentic
Explanation:
Authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.
Biometrics, smart cards, digital certificates, and picture passwords are various methods that can be used to perform an authentication.
Hence, an application's certificate indicates the application is authentic. These certificates are generally referred to as digital certificates.
When an end user installs a software application or program, the computer or mobile device would automatically verify the digital signature contained in the software. If the authentication process is successful, the software would be installed. Else, the installation process would be terminated.
Question # 1 Multiple Select Which of the following shows the assignment of a string to a variable? Select 3 options. answer = "23" answer = (23) answer = '23' answer 23 answer = input("How old are you?")
Answer:
answer = input("How old are you?")
Explanation:
Answer is a variable The Input function takes a string
Answer:
answer = input("How old are you? ")answer = '23'answer = "23"Explanation: Correct on Edg 2020/2021.
Please help w/ Java, ASAP!!!!
Answer:
B
Explanation:
When you have a method that is copying values from one array into another, you first have to initialize a new array which you can copy the values into. This is done by using the provided value "count".
int [ ] nums = new int [count];
Second, you have a "for each" loop that iterates over each index in the first array, and assigns the value at that index to the same index location in the copy array. In a "for each" loop, the variable "val" represents the content of an index, not an iterated value itself. This is why we can just do this inside the loop:
nums[ j ] = val;
That said, you still need "j" to be there and increment because we still need a tracking value for the current index in the copy array.
int j = 0;
for (int val: array)
{
copyArray[j] = val;
j++;
}
Third, you return the copy version of the array.
return nums;
Source:
I am currently a second year Java student.
What are the first letters of each of the 3 main colors in javaScript? (seperate with commas)
Answer:
R, G, B
Explanation:
Red, Green, Blue
Megan wants to post a picture of her and her friend Jennifer on her social media page. What should Megan do before she posts the picture?
A. Add a caption.
B. Ask her friend for permission.
C. Make sure she looks good.
D. Edit the picture using Photoshop.
Answer:
B. Ask her friend for permission.
Explanation:
Answer: B ask her friend for permission
hope you do good on the test or quiz.. it would mean alot to be brainlEst
A histogram titled Greeting card sales has date on the x-axis and cards (millions) on the y-axis. January is 1 card, February: 11, March: 1, April: 1, May: 9, June: 7, July: 1, August: 1, September: 1, October: 9, November: 7, December: 12. The histogram shows the monthly sales for a greeting card company in one year. Which best describes the data for May–June and October–December? clusters no frequency gaps symmetry
Answer:
Clusters
Explanation:
Given
The histogram
Required
What does May-June and October-December represents
The data for May-June is:
[tex]May: 9[/tex]
[tex]June: 7[/tex]
For October-December, it is:
[tex]October: 9[/tex]
[tex]November: 7[/tex]
[tex]December: 12[/tex]
Notice that these data are close to each other.
This implies that they are clusters
Answer:
the answer is a
Explanation:
You are going to do a bubble sort on the following list. What are the missing members of the list? Select 3 options.
[10, 3,
12
0.005
dog
3,5
'cat'
Hellllpppp
[3,5,'dog', 'cat'] are the missing members of the list . Hence option d, e and f are correct.
What is bubble sort?Bubble sort is defined as the most straightforward sorting algorithm, which continually switches nearby elements if they are out of order. Until no swaps are required, the passing operation is repeated, signifying that the list is sorted. Bubble sort is well-known in computer graphics because it can find a very minor defect in almost-sorted arrays and fix it with simply linear complexity (2n).
This question would be something you would know since your teacher has taught you it previously, but until you show me the entire lesson, it will probably just be a guessing game. 11 12 22 25 34 64 90 is a sorted array, and I've seen "dog" and "cat" used in coding multiple times.
Thus, [3,5,'dog', 'cat'] are the missing members of the list . Hence option d, e and f are correct.
To learn more about bubble sort, refer to the link below:
https://brainly.com/question/13161938
#SPJ2
What might the Internet of Things do in the future?
The future of IoT has the potential to be limitless. Advances to the industrial internet will be accelerated through increased network agility, integrated artificial intelligence (AI) and the capacity to deploy, automate, orchestrate and secure diverse use cases at hyperscale.
HELP! WILL GIVE BRAINLYEST!
Complete the sentence describing an analog signal.
An analog signal is a continuous signal, transmitted in the form of sine waves of varying
______.
Answer:
An analog signal is a continuous signal transmitted in the form of sine waves of varying amplitude
Explanation:
An analog signal is a step varying analog waveform that conveys information in a manner that is continuous in both amplitude and time
An analog process is one whose signal continuously varies, maintains a basic shape, and is transferable between mediums such that information is conveyed by analog signals based on analogy, which is one quantity tending to mimic another quantity's behavior
Signals of sound, voltage, data, voltage, or electric current can be transmitted as analog signals
Use the drop-down menus to complete the steps to open the Lookup Wizard.
1. Open the table in ___
view.
2. Click in the ___
column of the desired field.
3. Click the ___
, and then click Lookup Wizard.
Answer: 1. design view 2. data type 3. arrow
Explanation:
I just did it :)
A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a later item.
greater than
less than
equal to
Answer:
greater than
i think
A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is greater than a later item. Thus, option A is correct.
What happens in a binary sort?Such a binary sort, in which we keep comparing the pairs of items, swapping them if they are not in order, until the smallest item bubble to the top of the list, therefore creating a sorted list which is known as bubble sort.
A Binary search tree (BST) is a type of data structure used in computer science that consists of nodes arranged in a hierarchical structure. Each node in a BST contains a value, and the left child node contains a value that is smaller than its parent, while the right child node contains a value that is larger than its parent.
This makes BSTs ordered, as the elements are arranged in a specific order. They are also sometimes called sorted binary trees, as the values are sorted in a specific order. BSTs are commonly used in computer algorithms, as they allow for efficient searching, insertion, and deletion of elements.
Thus, option A is correct.
Learn more about algorithms on:
https://brainly.com/question/22984934
#SPJ3
What function is used to return the results in column D?
What function is used to return the results in column E?
Vehicles that are $20,000 or less and are the color red describes the data in which column?
Answer:
abd
Explanation:
a,b,d
For which of the following situations would it be best to use a heuristic in order to find a solution that runs in a reasonable amount of time?
A Appending a value to a list of n elements, which requires no list elements be examined.
B Finding the fastest route that visits every location among n locations, which requires n! possible routes be examined.
c Performing a binary search for a score in a sorted list of n scores, which requires that fewer than n scores be examined.
D
Performing a linear search for a name in an unsorted database of n people, which requires that up to n entries be examined.
Answer:
The answer is "Option B".
Explanation:
In this question, determining the optimal path between several locations, which requires n!. It's also examining possible routes. It could just suggest here, designers need to do those equations as we have several forms. They have several methods to find the best and efficient path. Its basic idea is to use heuristic approaches for complex or uncertain issues so we do not provide proven solutions for linear programs.
The situation that should be best to use a heuristic in order to find a solution that runs in a reasonable amount of time is option B.
The following information should be considered:
For measuring the optimal path that lies between several locations that needs n!.It also examine the possible routes. It consist of various methods for determining the efficient path.Learn more: brainly.com/question/17429689
I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how to do that. Help would be greatly appreciated.
PS: Reposting my question because the answers I got previously were both only made for points, not to help in any way. :(
Answer:
You need to first use the Sum function to add up all the costs of September.
Then divide each September cost by the grand total that you got. After that format the last column to be percentages.
Look at the attached file for the formulas used.
HELP!!!!!!!!!!!
A program that converts a program to binary all at once and runs the entire program when finished with the conversion
Group of answer choices
Complication
Compiler
Function
No answer text provided.
Answer: Compiler
Explanation: