30 POINTS PLS HELP AND DONT PUT ANYTHING IF U DK PLS
Explain what might have gone wrong in the following situation:
Sandra is putting together a new computer and network out of used parts. She has sufficient parts that should work together—NIC card,
cables, hub, etc.—and all of them are functional by themselves, but somehow her computer is not successfully able to connect to the
network. What might be going wrong
Answer:
The issues that may be wrong are;
1) Improper connections
2) The drivers for the Network Interface Card, NIC card is not properly configured, installed, or missing
3) Reset the network settings
4) IPv6and ipv4 Compatibility
5) Other IP related IP issue
Explanation:
From the question, we have that Sandra has the required used and functional hardware for putting a new computer and a network together but her computer is not successfully able to connect to the network, which may be due to the following reasons;
1) Improper connections
Ensure that the connections are properly made and that the network cables are straight through when connected to a network or hub or crossover cables when connected directly between devices used for computing
2) The drivers for the Network Interface Card, NIC card is not properly configured, installed, or missing
When the issue is due to the drivers for the NIC card, it can be resolved by uninstalling and deleting the driver software from the computer and then rebooting the computer for the operating system (Windows 10 etc.) to search for and install the correct drivers for the used NIC
3) Reset the network settings
When the network settings are improperly configured or configured to a setting used in another network, it can lead to not successfully being able to connect to a network
The network settings should be reset
4) IPv6and ipv4 Compatibility
Ensure that the hardware are compatible to IPv6 and/or IPv4 and adjust the settings of the network as required
5) Other IP related IP issue
An IP issue can lead to not being able to successfully connect to a network which can be resolved releasing the IP and flushing the DNS cache.
Which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a
PowerPoint presentation?
O WordArt gallery
O Shape Styles gallery
O Picture Styles gallery
O SmartArt gallery
Answer:Picture Styles gallery
Explanation:
I'm kinda lazy if anyone agrees with me. I couldn't write the question but I took a pic.
Answer:
eat the stick
Explanation:
because its long and juicy
Classroom content transaction
examples use of IT
Answer:
1. Online classes
2. Presentation
3. Account of books
which factors have led to the fast growth in IT
Answer:
Factors influencing population growth
Economic development. ...
Education. ...
Quality of children. ...
Welfare payments/State pensions. ...
Social and cultural factors. ...
Availability of family planning. ...
Female labour market participation. ...
Death rates – Level of medical provision
how will you format date so that dates appear in a format similar to 26-January-2022
Answer:
26/01/2022or01/22/2022
Computer has brought radical change in every field
Answer:
Yes it has brought change in every field
Explanation:
The list blocks that allow for storing and accessing a list of numbers and strings is called.
String manipulation
Arrays
Variable
Random
Hey so the answer to this is a variable because variables can store text and numeral values when an array can only store numbers
hope this helps
have a great day
-scav aka Toby
Answer:Array is the right option because array accessing the list of variables and integers like 1,2,4..etc variables just hold the data.
One problem with _______ is that often many copies of the same document are made.
HELPPP
Answer:
computer or internet is that often many copies of the same document .........
Why do guys get jealous when u hangout with another guy that's not them
Anyways what's 1+1 just putting this to not get reported by a mod
Answer:
pootin
Explanation:
yotub search terms:
putin behind putin assassination
Which field can be used to track the progress on tasks that a user has created? A. A. Subject
B. Start Date
C. Due Date
D. % Complete
Which of these is NOT an example of intellectual property? O a song you wrote O an article you published O hardware you purchased O a sculpture you created Question 5 9
Answer:
hardware you purchased
Explanation:
Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.
Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.
Generally, patents are used on innovation for products that are manufactured through the application of various technologies.
Basically, the three (3) main ways to protect an intellectual property is to employ the use of
I. Trademarks.
II. Patents.
III. Copyright.
An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.
Hence, a hardware you purchased is not an example of an intellectual property.
Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are completely customized?
Answer:
I just use the search bar in the app and type in shapes. Then you right click on the shape and click on edit points to shape it into whatever shape you want.
Explanation:
I went into the PowerPoint and did it myself.
I need this nowww!!!!
Answer:
b,c
Explanation:
Which hand does a user click and drag to simultaneously change the width and height of an object? A. corner sizing handle B. side sizing handle C. top sizing handle D. bottom sizing handle
Answer:
corner sizing handle
Explanation:
as you drag the top corners and opposite bottom corners, it will expand
What types of information should have their sources cited to avoid plagiarism? List at least 3
Answer:
Everything.It doesn't matter the information because there's always a way to plagiarize.No matter what the information, always, ALWAYS, cite the source.
Explanation:
Answer:To avoid plagiarism, cite your sources for statistics, opinions, quotes, and judgments.
Explanation:
Fill in the blanks
1. A group of computers connected with each other, make a ____________ .
2. A computer or a device connected to a network is called __________ .
Answer:
1.Local Area Network
2.network host
write a program that asks length,breadth and height of a room and calculate its volume
Answer:
cls
Input"enter length";l
Input"enter breadth";b
Input"enter height";h
v=l*b*h
print"the volume is";v
end
Explanation:
hope you got it
Entities allow us to capture specific information in the user input
True
False
Answer:
True
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
An entity can be defined as an object, thing, place, people, etc., that exists in a database. The data are captured and stored as workflow, tables and properties in a computer database.
This ultimately implies that, all entities must have a property and are identifiable from every other object.
Hence, entities allow us to capture specific information in the user input such as people, place, object, thing, unit, etc.
Why do companies implement new technology?Select all that apply.
1. to help their company work more efficiently and more effectively
2. to keep up with their competitors
3. to have the latest greatest technology out there
4. to grow their profits
5. to generate a lot of new work for their employees
What is IPO? Write down the steps involved in IPO cycle.
An initial public offering or stock market launch is a public offering in which shares of a company are sold to institutional investors and usually also retail investors. An IPO is underwritten by one or more investment banks, who also arrange for the shares to be listed on one or more stock exchanges
Answer:
An IPO is an offer of shares by a company in exchange for capital. The entire process is regulated by SEBI - the Securities & Exchange Board of India. To buy shares of any company in an IPO, you have to bid for these shares. If your bid is accepted, you are allotted shares.
Explanation: brainliest plz!
What is piracy? (1 point)
A.the use of copyright in federal court
B.copying, downloading, reproducing, or distributing materials without permission
C.exercising your intellectual property rights
D.giving others permission to use your tangible property
Answer:
B
Explanation:
what is a sending device
Answer:
A sending device that initiates an instruction to transmit data, instruction, or. information. e.g., Computer A, which sends out signals to another computer. □ A communication device that converts the data, instructions, or information. from the sending device into signals that can be carried by a.
Answer:
A sending device is an object that gives instructions to transmit information.
Which printing option results in a word document with images of the slides and an area to take notes
Answer:
handout is the correct answer
Explanation:
on edge
Answer:
It's C - Handout
on edge 2021
Explanation:
Write an algorithm and corresponding flowchart for a program that prints multiple of 5 starting with 100 and ending with 180.
Answer:
The pseudocode is as follows:
1. Start
2. total = 0
3. for i = 100 to 180 step 5
3.1 total = total + i
4. print total
5. Stop
Explanation:
This begins the algorithm
1. Start
This initializes the total to 0
2. total = 0
This iterates from 100 to 180 with an increment of 5
3. for i = 100 to 180 step 5
This adds up all multiples of 5 within the above range
3.1 total = total + i
This prints the calculates total
4. print total
This ends the algorithm
5. Stop
See attachment for flowchart
What does the narrator mean when she says Adnan and his friends were........
Answer:
he/she means that Adanan and his friend all were doing the ....
!!!!! 40 pts !!!!!
Select the correct answer from each drop-down menu.
Which words or statements complete the sentences given below?
Interference created by fatigue is called ___
noise. Interference created by strong negative emotions is called ____ noise.
Physiological noise
semantic noise
What is the purpose of the 300 Log?
Answer:
The OSHA Form 300 is a form for employers to record all reportable injuries and illnesses that occur in the workplace, where and when they occur, the nature of the case, the name and job title of the employee injured or made sick, and the number of days away from work or on restricted or light duty, if any.
Explanation: brainliest plzzzz!
Which of these is NOT a component of a packet? Choose the answer.
Header
protocol
body (payload)
trailer(footer)
Answer:it is protocol i just took a test with the same question and i got protocol right
Explanation:
arrange the following devices pendrive , hard disk , compact disc in descending order of storage capacity
Answer:hard disk compact disc
Explanation: