Explanation:
My answer is E[1][1]
but I don't see it here
Answer:
E[1][2] that is correct I just took t
Application software consists of programs that perform a specific task for users. Examples include microsoft word internet explorer and micro type 5.
A.true
B.false
Answer: verdadero
Explanation:
In Outlook 2016, the Tell Me function can be accessed by
O pressing F1 on the keyboard.
clicking on the File tab, then the question mark button.
typing a query in the textbox on the ribbon.
typing "help" in the search box in the message pane.
In Outlook 2016, the Tell Me function can be accessed by
O pressing F1 on the keyboard.
clicking on the File tab, then the question mark button.
typing a query in the textbox on the ribbon.
typing "help" in the search box in the message pane.
Explanation:
I think it should be typing a query in the textbox on the ribbon.
In Outlook 2016, the Tell Me function can be accessed by clicking on the File tab, then the question mark button. The correct option is B.
What is Outlook?The preferred email client for sending and receiving emails from Microsoft Exchange Server is Microsoft Outlook. Accessibility to contact, email, calendar, and task management tools is also provided by Outlook.
You can send and receive emails, manage your calendar, save the names and phone numbers of your contacts, and keep track of your projects using Outlook.
Even if you utilize Outlook on a daily basis, you might not be aware of all the wonderful things it can do to boost your productivity.
By selecting the File tab, then the question mark button in Outlook 2016, you may open the Tell Me feature.
Thus, the correct option is B.
For more details regarding Microsoft outlook, visit:
https://brainly.com/question/26695071
#SPJ2
a man takes 30 step to cover 18 metre l,how many step he will needed to cover 3003m distance
Merle wants to change the formatting of all bold cells to be non-bolded. Shania wants to copy the cell color,
border, and font from cell E12 to all of column D. Which best describes what each person should do?
A. Merle should use Find and Replace, and Shania should use the Format Painter.
B.Merle should use the Rules Manager, and Shania should use Find and Replace.
C.Merle should use the Format Painter, and Shania should use the Rules Manager.
D. Merle should use the Format Painter, and Shania should use Find and Replace.
Answer:
Merle should use Find and Replace, and Shania should use the Format Painter.
Explanation:
It's the most logical to me.. And that's what I'm gonna do on my test. =) hope it helps.
Explicar en qué sectores están divididos los procesos de producción y su importancia para el desarrollo tecnológico y económico del país. Indique dos ejemplos en cada sector
Answer:
Un sector económico es una rama de la economía en específico, caracterizada por englobar dentro de sí una serie de actividades interrelacionadas según cómo cada una contribuye al desarrollo económico del país. Una clasificación general popular de la economía es la división en los siguientes cuatro sectores:
1) Sector primario. El sector primario es el sector económico que abastece de materias primas y alimentos. Este sector abarca los sectores de agricultura, ganadería, caza, pesca y extracción de minerales. El procesamiento de estas materias primas se realiza en el sector secundario.
2) Sector secundario. Este sector se conoce como industria. Esto incluye todas las empresas y actividades que procesan las materias primas del sector primario. Los productos suelen ser revendidos al consumidor por el sector terciario.
3) Sector terciario. Este sector incluye los servicios comerciales: empresas que quieren obtener ganancias vendiendo sus servicios. El sector terciario incluye tiendas, catering, teatros, peluquerías, mayoristas, empresas de transporte, arrendadores, agencias de empleo, contables, abogados, consultores y empresas TIC.
4) Sector cuaternario. El sector cuaternario es el de servicios no comerciales, el único sector económico sin ánimo de lucro. Este sector incluye los servicios gubernamentales y los servicios subvencionados por el gobierno. Los ejemplos son hospitales, hogares de ancianos, cuerpos de bomberos, defensa, salud, trabajo social, educación y cultura.
Answer:
hola
Explanation:
HEEEEELPPP!!!BRAINLIEST!!! THIS IS URGENT!!!
Read the following code:
count in range(80):
leo.forward(count * 2)
leo.left(count + 2)
There is an error in the for loop. What should be fixed?
Add a colon to the end of the statement
Begin the statement with the proper keyword to start the loop
Place the loop condition outside the parentheses
Replace the parentheses around the range with quotation marks
Answer:
Begin the statement with the proper keyword to start the loop
Explanation:
Given
The code segment
Required
Fix the code
The first line of the code segment is meant to be a for loop, but it does follow the right syntax.
This is so because the for keyword is missing.
The first line should be corrected and replaced with:
for count in range(80):
Hence, option (b) is correct
I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how to do that. Help would be greatly appreciated.
PS: Reposting my question because the answers I got previously were both only made for points, not to help in any way. :(
Answer:
You need to first use the Sum function to add up all the costs of September.
Then divide each September cost by the grand total that you got. After that format the last column to be percentages.
Look at the attached file for the formulas used.
Help brainliest True or False
In Python, the first character in a string has an index position of one.
TRUE/False
Answer:
False
Explanation:
Hope this Helps! :)
Answer:
False
Explanation:
The first character in the string has an index of 0
What is the role of the connection medium?
wth does that mean?!
Please help w/ Java, ASAP!!!!
Answer:
B
Explanation:
When you have a method that is copying values from one array into another, you first have to initialize a new array which you can copy the values into. This is done by using the provided value "count".
int [ ] nums = new int [count];
Second, you have a "for each" loop that iterates over each index in the first array, and assigns the value at that index to the same index location in the copy array. In a "for each" loop, the variable "val" represents the content of an index, not an iterated value itself. This is why we can just do this inside the loop:
nums[ j ] = val;
That said, you still need "j" to be there and increment because we still need a tracking value for the current index in the copy array.
int j = 0;
for (int val: array)
{
copyArray[j] = val;
j++;
}
Third, you return the copy version of the array.
return nums;
Source:
I am currently a second year Java student.
Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, they should be reordered as 4, 9, 16. Which of the following algorithms can be used to place any three numbers in the correct order?
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
A
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
B
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
C
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
Answer:A
Explanation:
List and describe 3 parts (often referred to as 'elements') of a web page?
Answer:
Content
Design
Development
Explanation:
The design and management of sites is internet explorer; it is the research that takes place over time to make a site look fantastic, work quickly and function well with a smooth user interface.
A histogram titled Greeting card sales has date on the x-axis and cards (millions) on the y-axis. January is 1 card, February: 11, March: 1, April: 1, May: 9, June: 7, July: 1, August: 1, September: 1, October: 9, November: 7, December: 12. The histogram shows the monthly sales for a greeting card company in one year. Which best describes the data for May–June and October–December? clusters no frequency gaps symmetry
Answer:
Clusters
Explanation:
Given
The histogram
Required
What does May-June and October-December represents
The data for May-June is:
[tex]May: 9[/tex]
[tex]June: 7[/tex]
For October-December, it is:
[tex]October: 9[/tex]
[tex]November: 7[/tex]
[tex]December: 12[/tex]
Notice that these data are close to each other.
This implies that they are clusters
Answer:
the answer is a
Explanation:
.Explain how encrypting data during transmission protects it from being read by an unauthorised person who intercepts the transmission.
Answer:
Encryption is an effective and efficient technique used to prevent unauthorized access to informations transmitted over the internet.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
SSL/TLS are standard protocols that provides link encryption for the transmission of messages over the internet such as electronic mail (e-mail).
SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.
In the case of TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.
This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.
Identify and summarize the features of the Windows 7 backup utility.
Answer:it is slow
Explanation: slow
Answer:
IT can create a backup it can restore a backup and probably more
Explanation:
HELP!!!!!!!!!!!
A program that converts a program to binary all at once and runs the entire program when finished with the conversion
Group of answer choices
Complication
Compiler
Function
No answer text provided.
Answer: Compiler
Explanation:
a deque is a type of collection,but it is not automatically available when you open IDLE. What is missing that allows you to use the deque class?
Answer:
Import
Explanation:
The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.
The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.
What is Import instructions?When you transition to Shopify from another platform or need to make several adjustments to your products or inventory, importing products into your Shopify store using a CSV file might be helpful.
The data from the CSV file is transformed into products when you import products, and you can choose whether to publish your new products to all sales channels or only your web store.
You have the ability to overwrite any existing goods with the same handle when importing a CSV file. For any columns that are absent, the current values will be used.
Therefore, The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.
To learn more about CSV file, refer to the link:
https://brainly.com/question/29242949
#SPJ2
Consider the following code: x = 5 x = x * 3 print (x) What is output
Answer:
Output: 5
Explanation:
It will print 5 on the screen
What should you do first when designing a program?
Answer: talk about da progrm
Explanation:
Answer:
Step-by step Explanation:
Which of the following programming languages were initially developed to teach programming techniques to students? Choose all that apply.
Answer:
BASIC programming language
Pascal programming language
Explanation:
C++ programming language
Java programming language
BASIC programming language
Pascal programming language
Answer:
it's C and D
Explanation:
A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit will cost 100. Judge and print total cost for user.
Answer:
The program in Python is as follows:
qty = int(input("Quantity: "))
price = 100 * qty
if qty >1000:
price = (100 - 0.10 * 100) * qty
print("Cost: "+str(price))
Explanation:
This prompts the user for the quantity
qty = int(input("Quantity: "))
This calculates the price or cost, without discount
price = 100 * qty
This checks if the quantity is greater than 1000
if qty >1000:
If yes, this calculates the price or cost, after discount
price = (100 - 0.10 * 100) * qty
This prints the calculated cost
print("Cost: "+str(price))
Which is an email protocol that retrieves email without deleting the email and its attachments from the server?
Simple Mail Transfer Protocol (SMTP)
Internet Message Access Protocol (IMAP)
Post Office Protocol version 3 (POP 3)
Simple Network Management Protocol (SNMP)
Answer:
Internet Message Access Protocol (IMAP)
Explanation:
The "Internet Message Access Protocol" or IMAP was created by Mark Crispin at the Stanford Knowledge Systems Laboratory. It allows a person to access his email from his local server. In comparison to the Post Office Protocol Version 3 (POP 3), which deletes the emails once they are downloaded, the IMAP allows the contents to be saved on the server. The email will only be deleted if the user intends to do so.
Answer:
It is Pop 3 not IMAP
Explanation:
Correct on edg 2022
Allows input/output of audio info to and from the computer.
A. Central Processing Unit
B. Sound Card
C. Video Card
D. Audio Player
Answer:
sound card
.............
How important is the knowledge of ICT to a pupil like you?
An application's certificate indicates the application -
A is regularly updated
B cannot be removed
C is installed
D is authentic
Answer:
D. is authentic
Explanation:
Authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.
Biometrics, smart cards, digital certificates, and picture passwords are various methods that can be used to perform an authentication.
Hence, an application's certificate indicates the application is authentic. These certificates are generally referred to as digital certificates.
When an end user installs a software application or program, the computer or mobile device would automatically verify the digital signature contained in the software. If the authentication process is successful, the software would be installed. Else, the installation process would be terminated.
For which of the following situations would it be best to use a heuristic in order to find a solution that runs in a reasonable amount of time?
A Appending a value to a list of n elements, which requires no list elements be examined.
B Finding the fastest route that visits every location among n locations, which requires n! possible routes be examined.
c Performing a binary search for a score in a sorted list of n scores, which requires that fewer than n scores be examined.
D
Performing a linear search for a name in an unsorted database of n people, which requires that up to n entries be examined.
Answer:
The answer is "Option B".
Explanation:
In this question, determining the optimal path between several locations, which requires n!. It's also examining possible routes. It could just suggest here, designers need to do those equations as we have several forms. They have several methods to find the best and efficient path. Its basic idea is to use heuristic approaches for complex or uncertain issues so we do not provide proven solutions for linear programs.
The situation that should be best to use a heuristic in order to find a solution that runs in a reasonable amount of time is option B.
The following information should be considered:
For measuring the optimal path that lies between several locations that needs n!.It also examine the possible routes. It consist of various methods for determining the efficient path.Learn more: brainly.com/question/17429689
Based on the following passage on construction technology during the Middle Ages, why might a worker not be allowed to join a guild?
During the Middle Ages, a family worked in a trade for generations, with fathers training sons and passing knowledge along bloodlines.
Masons learned how to carve elaborate gargoyles; glaziers made intricate stained-glass windows. These skilled workers were organized into
guilds, and on a construction site, guild workers were highly esteemed while lower-level unskilled workers completed simple routine tasks.
All laborers were paid.
He did not pass the necessary exams to qualify for guild membership
He had signed a contract forgoing payment in exchange for on-the-job training.
He was not born into a family of skilled laborers
His specialty did not fall under masonry or glazing.
Answer:
He was not born into a family of skilled laborers
Explanation:
An eReader has a 956-pixel x 1290-pixel grayscale display with each pixel able to display 32 shades of gray. What is the KiB size of the display memory for the device
Answer:
752.71 kilobytes
Explanation:
Given ;
956-pixel x 1290-pixel
Shades of gray, = 32
Bit depth (n) = 2^n
32 = 2^5
Bit depth, n = 5 bits / pixel
The size of display memory :
Pixel dimension * n
(956 Pixel * 1290 pixel) * 5 bits /pixel
= 6166200 pixel * bits / pixel
= 6166200 bits
Converting bits to kilobytes :
1 bit = 1/8 bytes
1 byte = 1/1024 kilobytes
Hence,
1 bit = 1/(8 * 1024) kilobytes
1 bit = 1/8192 kilobytes
6166200 bits = (1/8192 * 6166200) kilobytes
= 752.7099609375 kilobytes
= 752.71 kilobytes
A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a later item.
greater than
less than
equal to
Answer:
greater than
i think
A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is greater than a later item. Thus, option A is correct.
What happens in a binary sort?Such a binary sort, in which we keep comparing the pairs of items, swapping them if they are not in order, until the smallest item bubble to the top of the list, therefore creating a sorted list which is known as bubble sort.
A Binary search tree (BST) is a type of data structure used in computer science that consists of nodes arranged in a hierarchical structure. Each node in a BST contains a value, and the left child node contains a value that is smaller than its parent, while the right child node contains a value that is larger than its parent.
This makes BSTs ordered, as the elements are arranged in a specific order. They are also sometimes called sorted binary trees, as the values are sorted in a specific order. BSTs are commonly used in computer algorithms, as they allow for efficient searching, insertion, and deletion of elements.
Thus, option A is correct.
Learn more about algorithms on:
https://brainly.com/question/22984934
#SPJ3
Megan wants to post a picture of her and her friend Jennifer on her social media page. What should Megan do before she posts the picture?
A. Add a caption.
B. Ask her friend for permission.
C. Make sure she looks good.
D. Edit the picture using Photoshop.
Answer:
B. Ask her friend for permission.
Explanation:
Answer: B ask her friend for permission
hope you do good on the test or quiz.. it would mean alot to be brainlEst