Answer:
JavaScript allows users to interact with web pages.
Explanation:
Anthony is starting a new business and needs to create posters, business cards, and brochures to pass out. Anthony has a limited budget and cannot pay to have these created by a professional, so he wants to create them himself. What would be the BEST type of program for Anthony to use to create the items he needs for his business?
A.
Creative Commons
B.
word processing program
C.
Weebly
D.
web-based publishing software
The BEST type of program for Anthony to use to create the items he needs for his business are word processing program.
What is the word processing program?Word processing is a type of computer software program used to create, edit, format, and print documents. Common word processing programs include Microsoft Word, Apple Pages, and LibreOffice Writer. Word processing programs are used for a variety of tasks, from creating simple letters and resumes to making complex reports and books. Word processing programs allow users to input, edit, format, and save text documents quickly and easily.
To learn more about word processing program.
https://brainly.com/question/14718387
#SPJ1
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
A Person typed 180 words per 6 minutes with errors in 18 words. Find the gross speed ,Net
speed, and accuracy percentage of his typing.
Pls help I turned invert on and turned it back off, now the colors on brainl.y are still the same inverted colors but other things like You.tube and stuff aren’t
Answer:
Try going into your brainly settings and see if night mode or high definition is on
Explanation:
50 POINTS!!!!
Which actions does the SmartArt Tools contextual tab allow a user to complete? Check all that apply.
Select different layouts.
Create additional content.
Change the style and colors.
Save a design as a template.
Insert a new SmartArt graphic.
Answer:
Select different layouts.
Create additional content.
Change the style and colors.
Explanation:
Answer:
A) Select different layouts.
B) Create additional content.
C) Change the style and colors.
Explanation:
Write the importance of software in computer . In 6 points
Answer:
Software is a set of instructions, data or programs used to operate computers and execute important tasks but can also help you work more efficiently.
Uses of Software
Uses of Software in Office.Uses of Software in Business.Uses of Software for Play Game.Uses of Software in Shop.Uses of Software for Entertainment.Explanation:
The brainly home page uses about 112% of my cpu. (On chromebook) any ideas to help increase performance?
PLEASE HELP ASP!!!!!
Which of these is NOT an advantage of wired networks?
security
cannot be obstructed by physical objects
easier to transfer large amounts of data
better for mobile users
The wired networks cannot be obstructed by physical objects. Option B is correct.
What is the wired networks?A network that is wired has cables connecting the network's devices. Ethernet networks predominate in wired networks. Radio waves are used by wireless networks to link devices.
There are many other wireless technologies, but Wi-Fi and Bluetooth are the most popular. In general, wired networks are more swift than wireless ones.
Physical connections will be quicker and more dependable in buildings with concrete walls or other barriers to wireless signals. The advantages of wired networks includes security, easier to transfer large amounts of data and better for mobile users.
Therefore, option B is correct.
Learn more about the wired networks, refer to:
https://brainly.com/question/17235338
#SPJ6
what are some industries of aerodynamics and hydrodynamics? explain each one in detail.
Answer:
hard one
Explanation:
Which of the following statements about networking IS CORRECT? A. Networking is only for professionals in certain careers. B. Networking may be done in person but not online. C. Networking is an ineffective way to learn about job openings. D. Networking is an effective way to learn about job openings.
It wouldn't let me say it so I'm screenshotting it.
yes it happend to me if you go on my questions
In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.
Explanation:
--> used brainly simplify :D
Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.
Does anyone know 7.1.3: Firework in Coding??
Please Help me I need it done in a few minutes Thanks
I'm very confused about this, I am seeing multiple different answers and I thought the answer was obvious, but guess not.
Jabari is writing a program that prompts a user for a value that is negative and has a decimal. Which function should he use?
float()
int()
print()
string()
Answer:
int()
Explanation:
Which statement assigns the value 99 to the variable myGrade in Python?
myGrade = 99
my Grade = 99
!myGrade = 99
myGrade == 99
Answer: I think that the answer is the first one, myGrade=99
Explanation:
When Eliza was first written (in 1966), some people thought it seemed human. Did Eliza seem human to you? Why or why not?
Answer:
yes she is a real person she had a son named Phil and her husband was alexander Hamilton he died in a duel with the vice president Aaron burr
there son died in a duel two so Eliza was just alone in the world with out her some and husband she ran a orphanage and saw all of the kids and it reminded her of Alex
Explanation:
Answer:
yeah shes human i refuse to think shes not
Explanation:
Tests, fixes, and maintains network systems:
another weekly question (I need to stop these)
Who is your favorite lets player or animator
Answer:
jaiden
Explanation:
Answer: wat dat mean
Explanation:
A brief description of a project, document, paper, etc. that presents the most important points in the most effective way. Question 2 options: Goldilocks Rule Rudolph Rule Executive Summary tagline Elevator Pitch
An executive summary is a brief document that summarizes the most important points of a larger report, proposal, or project. It is usually no more than one or two pages long and is designed to give readers a quick overview of the key information they need to know. An executive summary typically includes the purpose of the project or document, the main findings or recommendations, and any key data or statistics. It is written in a clear and concise manner and should be easily understandable to a wide audience. The goal of an executive summary is to convey the most important information in the most effective way possible.
A concise document called an executive summary highlights the key ideas from a longer report, proposal, or project.
What is Project Document?It is intended to provide readers with a brief summary of the most important information they need to know and is often no more than one or two pages.
The major conclusions or recommendations, any important data or statistics, and the project's or document's objective are often included in an executive summary.
A large audience should be able to understand it easily because it is written in a clear and succinct manner. An executive summary's objective is to effectively communicate the most crucial facts.
Therefore, A concise document called an executive summary highlights the key ideas from a longer report, proposal, or project.
To learn more about documents, refer to the link:
https://brainly.com/question/12401517
#SPJ1
explain the history of computing of mechanical era
Answer:The Mechanical Era
Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.
Explanation:Hope this helped
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?
a
Ignore the request and not enter any personal information.
b
Provide only her name and date of birth.
c
Provide only her name and address.
d
Provide the requested information to receive the discount.
Answer:
a
Explanation:
sis is gonna get scammed
Answer:
a
Explanation:
You dont know who is getting your information and it is not someone you know. STRANGER DANGER!
(I made this up teehee) what anime is katski bakugo from
Tonya is creating a program that will allow the user to input their work address. Which kind of variable should Tonya use for this?
A.
a syntax variable
B.
a float variable
C.
a string variable
D.
an alphabetic variable
Answer:
B.
a float variable is the answer
Explanation:
becouse it is float variable
All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!
Answer:
computer system normally stores characters using the ASCII code. Each character is stored using eight bits of information, giving a total number of 256 different characters (2**8 = 256).
Explanation:
Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )
I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.
Selma needs to ensure that users who have access to her presentation are unable to make changes to the presentation.
What should she do?
O Apply password protection and only distribute the read-only password.
O Use the Mark as Final feature
O Restrict access to the presentation at the file server
O Use the Protected View option.
Answer:
She should D. Use the Protected View option.
Explanation:
what are some basic commands to remember in terminal? windows 10
please help if you know
Answer:
If you just need a few, maybe this can help.
Explanation:
Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.
Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.
Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.
Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.
Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.
when thinking of laptops, which brands come to mind?
Answer:
apple and chrome brands come to mind
Aleinware. It looks mad. But my mac looks nice asweel.