What types of information are commonly included in headers and footers? Check all that apply.
I date
page numbers
tables
number of pages
file path and file name
printer name
sheet name
time

Answers

Answer 1
Date
Page number
File path and file name
Answer 2
Date, page numbers, file path, and file name. Hope it helps.

Related Questions

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

What kind of personal information are you comfortable sharing with others online? Why? What steps do you take to control how that information is shared?

Answers

Answer:

this is more of an opinion question regarding what you personally do

Answer:

i mean the givens like age sex general location

A coworker just sent you a presentation to review. You noticed that she used different types of transitions on the same slide, and the animations and videos were distracting from the topic. Give your coworker advice about guidelines she can follow when using animation, transitions, and multimedia. Be sure to include at least four guidelines. ...- x-x

I stg I can't think of a good answer- x-x

Answers

Answer:

1. Make sure they are not overwhelming

2.Maintain the same style of transitions throughout the presentation

3. Keep it down to one animation/video per every 5 slides

4. Focus on the quality of the information rather than the way it is presented

Explanation:

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

Explain the difference between SLR cameras’ and point-and-shoot cameras’ viewfinders. Which viewfinder do you think would be easier to use? Why?

Answers

Answer: A point-and-shoot digital camera estimates the light that will reach the sensor on an LCD screen. A SLR camera is a single lens reflex camera. As an SLR camera has a reflex mirror, it allows you to see through the viewfinder the real image that the film will see.

Explanation:

Optical viewfinders show you a true image. Which means that there's no lag; you're simply looking at a scene through a lens. Cameras using electronic viewfinders, on the other hand, have to convert the light into a digital image and then display it via the EVF. And that can take time, which manifests as viewfinder lag.

SLR cameras' viewfinders allow the user to preview the exact image that will be captured due to its direct optical connection with the lens. Point-and-shoot cameras' viewfinders, on the other hand, provide a digital representation of what the camera sees and are typically constructed from LCD screens. I think point-and-shoot cameras' viewfinders would be easier to use because of their more user-friendly design, as well as their convenience in providing an easy-to-view display of the image being taken.

Marco is writing a program in which the users will be told that they cannot enter the castle if they do not have 50 armor points. Which of the following lines of code would do that?

A.
if armor > 50:

print(“You cannot enter the castle!”)

B.
if armor = 50:

print(“You cannot enter the castle!”)

C.
if armor == armor:

print(“You cannot enter the castle!”)

D.
if armor < 50:

print(“You cannot enter the castle!”)

Answers

Answer:

D

Explanation:

the sign “<“ means the mouth would eat the bigger one. When you put it in it will allow you to go in the castle if you have MORE then 50


I hope it correct and it helps!

Answer:

d

Explanation:

the sign “<“ means the item on the left side is smaller than the item on the right.

NO LINKS!! HELP!! ESSAY DUE TODAY!!!

NO LINKS!! HELP!! ESSAY DUE TODAY!!!

Answers

Answer:

To the "Am not 13"

Explanation:

Amy Bernstein wrote a story, which is titled "I'm Not Thirteen Yet." The story is told from the perspective of one of the characters, making it a personal narrative.  The story's author describes his personal experiences throughout the narrative. 'I had entered the world of teenagers, and I wasn't even one of them yet,' says the author, demonstrating that he is writing about his own experiences.

um ....................

i) State the two types of storage media.

ii) Give three important features of storage media.

iii) State two ways to protect storage media.

Please no links and false answers.​

Answers

1- primary storage and secondary storage
2-volatility, mutability and accessibility
3 encrypt your data and backup your data on another device

If you see that your bank account has had some money taken out that you did not authorize, which of the following is one action you can take to defend yourself?
A. File a police report.
B. Add more money to the back account.
C. Try to contact the person you think took your money.
D. Leave the bank account open to see if more money is taken.

Answers

I think the answer is A. File a police report,
A, File a police report

what is bigger that terbites

Answers

Answer:

Units larger than a terabyte include a petabyte, exabyte, zettabyte, yottabyte and brontobyte. A geopbyte is also larger than a terabyte and refers to 10 30 bytes, or 1,000 brontobytes. Additional units of measurement become necessary as the amount of data in the world increases.

Explanation:

Answer:

I think you mean terabyte so the answer would be a petabyte

Explanation:

There are more thing that are bigger than terabytes and petabytes too, here are a few of them. exabyte, zettabyte, and yottabyte

this is to be answered by a official or whatever i am not very happy with my answeres they are from other kids who just look it up i want most times a true answer from themselves not someone just saying blah blah online i can not figure out how to delete my profile from brainly thank you for all your help but now I am leaving.
ω

Answers

Answer:

just get banned by spamming random stuff

Explanation:

If you need help, there are tutors in this application that can help you get verified answers!

1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?

Answers

Answer:

The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.

Explanation:

There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.

The establishment of the ‘ARPANET’ (an early version of the internet) used in the USA in 1969 as a means of communication between various research institutions.

The impact it has had:
Developed into the globally used Internet which is now integrated into modern society and is seen as an essential for good quality of life.

anyone wanna hop on 1v1.lol
party code : usfhb6

Answers

Answer:

thx for the points

Explanation:

I am very bad at Fortnut but very good at overwatch yes

Question 1(Multiple Choice Worth 5 points)
(03.01 MC)

Which line of code will only allow a non-decimal point to be stored in a variable?

candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 2(Multiple Choice Worth 5 points)
(03.01 MC)

Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?

Add comments to the code
Allow others to understand the code
Display a string on the screen
Make the program interactive
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)

Jabari is writing a program which prompts a user for a value that is negative and has a decimal. Which function should he use?

float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 LC)

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)

Which function converts the user's input to a number without a decimal?

float()
int()
print()
string()

Answers

Answer:

b

Explanation:

it's not a c or d and now I have to make it 20 characters long so I will do this

B is the answer lol yeah I had that some answer

pleas help and hury
_____ can be lost or stolen by cybercriminals. Select 2 options.

Computer devices

Portable devices

Antivirus software

Computer networks

Free WiFi

Answers

Answer:

It is D and A

Explanation:

Free WiFi and portable devices

What did improvements in computer interface mean for animation?

Designs would be printed in color.

More complex information could be input.

Sketchpad was no longer needed for programming.

Animation had to be very simple and straightforward.

Answers

Answer:

Designs will be printed in colour

Answer the design would be in color .Tricky ehhh I had this in clas.

how has social media changed my journalism looks like?
A. journalists use poor grammar online
B. journalist can be everyday people
C. Only journalists from major news stations report the news
D. Journalists can dress down while reporting the news

This is for a test, so I need to get answers fast.
Please help me

Answers

Answer d

Explanation:

A and d isth correct answer

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form seeing their screen and tabs ?

Answers

Answer:

just don't share your screen in the class or if your a teacher just call them out

Explanation:

No they can’t stop it

3 different ways that ultrasonic sensors can be used in everyday life.

Answers

Answer:

Ultrasonic Sensors Uses:

Anti-Collision DetectionPeople DetectionContouring or ProfilingPresence DetectionBox Sorting using a Multi-Transducer SystemEasy Control of Trash Collection VehiclesPallet Detection with ForkliftsBottle Counting on Drink Filling Machines

Learn more about Ultrasonic Sensors here

Visit —

https://brainly.in/question/19907919

https://brainly.ph/question/13809853

Hope my answer helps you ✌️

Mark BRAINLIEST

Ultrasonic diffuse proximity sensors.
Ultrasonic retro-reflective sensors.
Ultrasonic through-beam sensors.

Why isn't my brainly post being answered?

Answers

Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.

Sometimes they don’t pop up on the feed try reposting again or possibly updating the app if you can. Or it may be an issue within the question itself like if it is worded correctly.
Hope this helps!

What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware

Answers

Answer:

Hardware

Explanation:

Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.

Hope this helps. <3

Hardware is the name given to the parts of a computer that you can actually touch.

What is Hardware?

The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware. 

Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.

Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.

Therefore, Hardware is the name given to the parts of a computer that you can actually touch.

To learn more about Hardware, refer to the link:

https://brainly.com/question/15232088

#SPJ5

Vocabulary and Bridge Information


Directions: Do NOT use bullet points or copy and paste definitions. Put them in YOUR words.

Once you have completed the vocabulary, answer the following discussion questions. In complete sentences.


VOCABULARY
Bridge 16. Beam
Ingenuity 17. Girder
Architecture 18. Abutment
Engineer 19. Truss
Level 20. Anchorage
Protractor 21. Deck
Arch 22. Mortar
Structure 23. Pile Driver
Engineering 24. Suspension Cable
Innovation 25. Rivet
Force
Physics
Prototype
Tension
Compression

DISCUSSION: Research the following bridge disasters and tell me the following: Who built/designed the bridge, what happened and when it happened. Answer in complete sentences.
Iron Bridge
London Bridge
Dee Bridge
Tacoma Narrows Bridge
Point Pleasant Bridge

Answers

Umm
This is to bunch of questions..
This is lots of questions interesting

I NEED IT NOWW

what task does a sensor perform in a closed loop feedback system a: measures the variable that represents the system state B: compares the variable to a reference variable C: defines the reference variable D: feeds d at a back into the system so that it can reach the desired state

Answers

Answer: the answer ur looking for is  option : a

Answer:

a: measures the variable that represents the system state

Explanation:

A large company has extensive downtown office space with many conference rooms. To lower their electric bill, the company has installed a new system that automatically turns off the heat and lights in a conference room when no one is in the room. What is the simplest explanation for how the system works?

A camera in each room is connected to the security desk. When the officer on duty sees that a room is empty, they turn off the heat and lights in that room.

A small robotic device on wheels knows the building layout. It roams the offices, peeking into each conference room to see if anyone is using it. If not, the robot turns off the lights and heat.

A sensor detects and reports on movement in the room. If there is no movement for a few minutes, the system assumes the room is empty and turns off the heat and lights.

Every hour, the system emits a loud sound in each room. Pressing a large red button in the middle of the table turns off the sound in that room. If nobody does so within 30 seconds, the system turns off the heat and lights.

Answers

The simplest explanation for how the system works is option C: a sensor detects and reports on movement in the conference room. If there is no movement for a few minutes, the system assumes the room is empty and turns off the heat and lights.

What is the office space about?

The system that automatically turns off the heat and lights in a conference room when no one is in the room is commonly referred to as an occupancy sensor. An occupancy sensor uses various technologies, such as infrared or ultrasonic, to detect the presence or absence of people in a room.

Therefore, Once the sensor detects that no one is in the conference room, it sends a signal to the control system, which then turns off the heat and lights. When someone enters the room again, the sensor detects their presence and sends a signal to turn the heat and lights back on. This system is designed to save energy by ensuring that heating and lighting are only used when needed.

Learn more about office space from

https://brainly.com/question/28885269

#SPJ1

How to revise ICT offline?

Answers

Answer:

get your note and read over again

Explanation:

your note contains stuff you read from online and different materials . there are sometimes the brain doesn't want to read anything on the screen , just get your note go to a nice calm place and visualize things

Answer:

Open it and revise it :/ just edit it

Explanation:

PLEASE HELP!!! What is one game you think would be hard for computers to play? (AI)

Answers

Answer:

I would say the game "Go" because it requires intuition to play.

Explanation:

Answer:

I dont play much games but probaly a game you need to think outside of the box for

Explanation:

robots arent creative

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers
Other Questions
1. What are the differences between lonic and covalent bonds? what national basketball association player holds the record for most assists in a game Meiosis in the life cycle of a zygomycete occurs in the _____. a) gametangia b) progametangia c) sporangia d)meiospores What was the effect of the Stonewall riots? Select the correct answer from the drop-down menu. How does the author develop a theme around appearances? The author develop the theme that appearances are important factors of power with . A the discussion of how dogs are ordered on the sled B the discussion of how the dogs view Lip-lip from behind C the details of the environment that white fang observes D the details of the various amounts of experience the dogs have. Which of the following is equal to -11? how many grams of methane will you have from 3 moles of Sodium Acetate how to write the introduction of group research project feedback? Emily has 6 buttons. Julla has 84 buttons.Julia has how many times as many buttons as Emily? After the invasion of Iraq in 2003, the US found a. many WMDs. b. few WMDs. c. a single WMD. d. no WMDs Which action of Peter the Great least in exemplifies absolute rule Master Mason wants to treat all theKids at school. How packs of 15 fudge does he need for 151 children? Which of the following are picture adjustments that can be made to images?A) Color saturationB) Color toneC) Color contrastD) All of the above Refer to this portion of a dichotomous key for fish identification to answer the question. 1. (a) Has a single dorsal fin 5 (b) Has a double dorsal fin 2 5. (a) Has small fin on back near tail 6 (b) Has no fin on back near tail 7 6. (a) Has barbs near the mouth Catfish (b) Does not have barbs near the mouth 10 What do the numbers after the arrows represent? the number of the question that should be considered next the number of steps remaining before the organism is identified the number of questions that need to be answered the number of species that have the described characteristic Ill mark you the brainiest!!! Who led the first successful circumnavigation of the world? What branch may pass laws regarding issues not directly addressed in the Constitution Will give Brainliest, please helpDescribe the Gladiator Battles of the Roman Colosseum. What do you think happened if justianian and theodora if they had fled to constantinople? PLEASE HELP QUICKLY LIKE IN THE NEXT 5 mins plz !!) The function MX) = -x - 4x + 5 is shown on the graph.Which statement about the function is true?12(-2,9).O The domain of the function is all real numbers lessthan or equal to -2O The domain of the function is all real numbers lessthan or equal to 9The range of the function is all real numbers lessthan or equal to -2.The range of the function is all real numbers lessthan or equal to 9.1212-10 2. Attitude formation Use your knowledge of attitude formation to answer the following questions. Which of the following is an example of modeling? Check all that apply. O A runway model learns to walk gracefully down the runway after tripping a few times. A salesperson tries to sell damaged goods, despite thinking that it is unethical. O A marketing manager has a bad attitude about newspaper advertising because his coworkers at the advertising agency never put advertisements in newspapers. A marine biologist learns to be wary of living sea urchins when she sees one of her colleagues being stung by one of them. Suppose that you are trying to determine if there is a link between a person's attitude and his or her behavior. Which of the following statements about that link is most likely to be correct? O It does not matter when you measure attitudes. The important thing is getting an accurate measure of behaviors. O The longer the time is between the attitude measurement and the observed behavior, the stronger the relationship between the two will be. O It does not matter when you measure behaviors. The important thing is that you measure attitudes accurately. O The shorter the time is between the attitude measurement and the observed behavior, the stronger the relationship between the two will be.