Word-processing,spreadsheets, databases, and desktop publishing are all types of _______?

A computers
B Web sites
C software
D hardware

Answers

Answer 1

Answer:

software

Explanation:

Answer 2

Answer: software

Explanation:


Related Questions

What task do the referential integrity settings prevent?
a) editing a non-key field in a destination table
b) sharing data from one field between two tables
c) linking a primary key to another table’s primary key
d) deleting a record that has related records in another table

Answers

Answer:

D

Explanation:

10. Two technicians are discussing recycling specifications for refrigerant. Technician A says that refrigerant oil with 5,000 parts per million (ppm) does not fall
within specifications. Technician B says that air can only have a maximum of 330 ppm. Who is correct?
O A. Neither Technicians A and B
OB. Technician B
O C. Both Technicians A and B
O D. Technician A

Answers

Two technicians are discussing recycling specifications for refrigerant   Technician A is correct.

What is the recycling ?

Recycling is the process of transforming waste materials into new products to prevent the waste of potentially useful materials and reduce the consumption of fresh raw materials. It is an important part of the global economy and helps to preserve the environment by reducing energy usage, air and water pollution, and reducing the amount of waste sent to landfills. Recycling can be done through mechanical means such as shredding or separation, or through chemical processes such as melting and reforming.

To learn more about recycling

https://brainly.com/question/27248056

#SPJ1

what is a common indicator of a phishing attempt?

Answers

Strangely phrased subject lines :An email subject line that contains a word or phrase that doesn't sound appropriate is the most clear sign that it is a phishing email.

Phishing efforts can be disguised in a variety of ways to persuade you to divulge your personal information. In addition to the numerous varieties of phishing, such as spear phishing, pop-up phishing, and social media phishing, it can be challenging to distinguish between a legitimate bank website and a fraudulent one, so it's critical to be aware of what to watch out for. Common signs of a phishing effort include:Despite the fact that phishing assaults have become much more complex over time, they may still be quickly identified if you know what to look fortypical phishing indicator that should raise serious red flags. Cybercriminals frequently send you unsolicited offers of free iPads, iPhones, expensive handbags and luggage, trips to exotic locales, and other items in an effort to seduce you. Anyone providing such items is nearly always a phisher seeking to obtain your personal information.

To learn more about " cybercriminals" Click on below link brainly.com/question/27146593

#SPJ4

What is not a way to lower your risk of drowsy driving?

Answers

Answer:

Taking a night time medicince (such as benedryl), or drinking alcohol beofre drviving.

Explanation:

Brainliest please :)

Being secure means that a number is hard to predict.
This makes it safer to use for computer security.
a. cytologically
b. systematically
c. cryologically
d. cyptographically

Answers

The term that accurately fits the definition is "cryptographically."Cryptographically means to create secure codes and/or messages so that they can be sent securely. This makes it safer to use for computer security.

More than 100 words: Cryptography is the science of writing codes and/or messages in such a way that they can be read only by the intended recipient. Cryptography enables people to keep private data confidential and secure from others, for example, passwords, banking details, etc. Cryptography is used in every aspect of online communications such as credit cards, passwords, websites, emails, etc.

A computer scientist named Ron Rivest, Adi Shamir, and Leonard Adleman at MIT developed a public-key cryptosystem in 1978 known as RSA encryption. Cryptography has become an essential part of digital life as it is required to keep sensitive and confidential information safe from attackers who might steal it. Cryptography plays a vital role in ensuring that the information transmitted over a network is secure and that it can only be read by the intended recipients. Cryptography also provides confidentiality, integrity, authentication, and non-repudiation for online transactions.

Cryptography is the method used to scramble data in a way that makes it unreadable unless it is decrypted using the proper key. Thus, it is used to protect information from attackers who want to read it without permission.

To know more about securely visit:

https://brainly.com/question/32133916

#SPJ11

a film camera with only one lens is known as a(n)?

Answers

Answer:

it is a single lens reflex or SLR camera

Explanation:

when describing blocks of ip addresses, what does cidr do?

Answers

Classless inter-domain routing is known as CIDR. It is an approach to IP address distribution and packet routing. An IP address's network prefix is specified via CIDR.

CIDR (Classless Inter-Domain Routing) is a more effective and adaptable method of allocating and routing Internet Protocol (IP) packets than the conventional IP address classes. A variable-length subnet mask (VLSM) is used by CIDR to distribute IP addresses, enabling more accurate distribution and greater address space use. Routing is made easier and subnets may be easily created thanks to the CIDR notation, which specifies the amount of bits in the network portion of the address. Internet Service Providers (ISPs) and network administrators manage IP addresses and routing tables using CIDR, which has evolved into the industry standard for IP address allocation and routing.

Learn more about  CIDR here:

https://brainly.com/question/30775427

#SPJ4

Check the peripherals that are needed to hear music on your computer.

Check the peripherals that are needed to hear music on your computer.

Answers

Answer:

speaker and sound card

edge 2021

ASKING AGAIN CAUSE I GOT A WEIRD LINK

HTML5 allows web pages authors to place a/an _________ element around a block-level element that contains child elements
a. nav
b. div
c. h1
d. a

Answers

Answer:

A. Nav

Explanation:

....,..........

5 evaluation criteria

Answers

Answer:

relevance, efficiency, effectiveness, impact and sustainability. 

Which of the following are addressed by programing design? Choose all that apply.

Who will work on the programming
The problem being addressed
The goals of the project
The programming language that will be used

Answers

Answer:

Its B, D, and E

Explanation:

Hope this helps

Answer:

3/7

B

D

E

4/7

Just a page

5/7

B

C

6/7

Page

7/7

A

B

D

To create the install from media (IFM) on the existing domain controller, which of the following command should you use?
a. ntdsutil media ifm
b. ifm
c. ntdsutil ifm
d. ntdsutil ifm media

Answers

To create the install from media (IFM) on the existing domain controller, you should use the command "ntdsutil ifm media".

This command allows you to create an IFM installation media, which is a way of installing Active Directory Domain Services (AD DS) on a new domain controller without the need for a full replication of data from an existing domain controller.

IFM installation media is useful in situations where a new domain controller needs to be deployed in a location with a slow or unreliable network connection, or where there are security concerns about replicating sensitive data over the network.

By creating an IFM installation media, you can copy only the necessary AD DS files and data to the new domain controller, reducing the time and network bandwidth required for deployment. The ntdsutil command is a command-line tool that is used to manage Active Directory databases.

The "ifm" parameter specifies that you want to create an IFM installation media, and the "media" parameter specifies that you want to create a media file that can be used to install AD DS on a new domain controller. Overall, the ntdsutil ifm media command is a powerful tool that can help simplify the deployment of new domain controllers, while also improving security and reducing network bandwidth usage.

learn more about media here: brainly.com/question/31359859

#SPJ11

The definition of "HTML element" _____. defines the whole document and has a start tag (< xtml >) and end tag (< /xtml >) defines the partial document and has a start tag (< html >) and end tag (< /html >) defines the whole document and has a start tag (< html >) and end tag (< /html >) defines the partial document and has a start tag (< xtml >) and end tag (< /xtml >)

Answers

I believe the “” element defines the whole document as it is used in the first line of code and has a start tag and end tag which is .

I hope this is correct. I’m not quite sure with the question, but I think this is right.

What should happen to the "Done" Product Backlog items when the Sprint is cancelled?

Answers

"Done" Product Backlog items from a cancelled Sprint should be reviewed and potentially re-prioritized by the Product Owner for inclusion in future Sprints.

When a Sprint is cancelled, the Product Owner should review the "Done" Product Backlog items that were completed during the cancelled Sprint. These items should be evaluated for potential inclusion in future Sprints based on their priority and value to the product. The Product Owner may need to consult with the Development Team to determine if any technical debt or other considerations make it necessary to revisit completed work before carrying it forward. Ultimately, any completed work that is deemed valuable and can be carried forward should be reprioritized in the Product Backlog for future Sprints.

learn more about Sprint here:

https://brainly.com/question/31230662

#SPJ11

Three of the following values could be stored as strings. When would you NOT use a
string command?
O To store a word.
O To store a list of colors.
O To store values NOT used for calculations.
O To store decimal values.

Answers

Answer:

To store decimal values

Explanation:

If values are not to be used for calculation, that is, they are not numerical data, therefore, some of them could be stored as strings. A string may contain any sequence of characters. The characters in a string may be repeated.

From the foregoing, decimals can not be stored as strings because in computer programming, a string is normally a sequence of characters, hence the answer above.

Using variable concepts, it is found that you would not use a string command to store decimal values.

---------------------------

Strings are used in programming to work with variables that are composed by text, which can include words, colors, and any variable that is not used for calculator.For decimal values, float and double variables are used, not strings, and thus, this is the option for which a string command would not be used.

A similar problem is given at https://brainly.com/question/15583814

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The

Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Here's my answer for question 1 please adjust it thanks!

def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

Answers

Answer:def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

exp: looking through this this anwser seemes without flaws and i dont follow

if you can provide what you are not understanding ican an help

please help which one is the right symbol?​

please help which one is the right symbol?

Answers

Answer:

second one >

hope it helps.

Why does each record need a unique ID number?

A. A unique ID number is necessary for grouping similar item types in
a table.

B. A unique ID number helps narrow down the results returned for a
query

C. A unique ID number corresponds to other data in the same table
to make organization easier.

D. A unique ID number is essential if you want to build proper
relationships between tables.

Answers

Answer: D. A unique ID number is essential if you want to build proper

relationships between tables.

just did it

what is full form off computer

Answers

Answer:

Explanation:

Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. ... Some people say that COMPUTER stands for Common Operating Machine Purposely Used for Technological and Educational Research.

melanie is a desktop publisher who puts together all the text and images for a children's magazine. the pathway of the arts, av technology, and communication cluster that melanie works in is: question 15 options: printing technology. telecommunications. performing arts. visual arts.

Answers

Someone who has the job description such as putting together all the text and images for a children's magazine, the pathway of the arts, av technology and communication cluster is called telecommunications. So Melanie works in telecommunications.

The Telecommunications Technician is a job that has the responsibility to install, maintain, and provide a variety of telephone equipment, and install voice and data communication circuits, security cameras, panic systems, and door access.

You can learn more about The Telecommunications at https://brainly.com/question/1622085

#SPJ4

State what is meant by the terms: Parallel data transmission ......................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Serial data transmission ........................................................................................................... ................................................................................................................................................... ...................................................................................................................................................

Answers

Answer:

parallel communication is a method where several binary digits are sent as a whole, on a link with several parallel channels.

serial communication conveys only a single bit at a time over a communication channel or computer bus.

True/false: object-oriented programming allows us to hide the object's data attributes from code that is outside the object.

Answers

It is true that object-oriented programming allows us to hide the object’s data attributes from code that is outside the object.

The object-oriented programming paradigm hides the internal detail of code from the outside or outer world. In object-oriented programming, the object's inner detail is hidden from the outer world. Object details are its attribute or functions etc. Object-oriented programming allows only its object to access its own data attributes and functions. And, the object cannot access the data attributes outside of its world or scope.

For example, there is two class, Cat and Dog. Cat object cannot access the attribute data of the Dog’s object.

Therefore, the question statement is true and states that an object-oriented program allows hiding object detail from the outside world.

You can learn more about object-oriented program at

https://brainly.com/question/25555303

#SPJ4

it is used to replace numeric number of a website​

Answers

greatflombles or gr8flombles or go2flombles

What device is commonly used to connect to and control multiple computers using a single keyboard, mouse, and monitor?.

Answers

Use a keyboard, mouse, and monitor to connect to and control numerous computers with a KVM switch (keyboard, video, and mouse).

Describe the monitor.

An device that shows data in either text or graphic form is a computer monitor. A discrete monitor consists of an external user control panel, a visual display, supporting circuitry, a power supply, and enclosure. Modern monitors often use LCD displays with LED backlights, which took on the function of CCFL backlit LCDs by the 2010s. The majority of monitors used CRTs up until the mid-2000s. DisplayPort, HDMI, USB-C, DVI, VGA, as well as other proprietary connections and signals are used to link monitors to computers.

To know more about Monitor
https://brainly.com/question/28315469
#SPJ4

Type the correct answer in the box. spell the word correctly.

what does xml do with the data wrapped in the tags?

xml is a hardware- and software-independent tool used to carry information and developed to describe _____ .

Answers

XML (eXtensible Markup Language) organizes and structures the data wrapped in the tags, making it easily understandable and accessible. XML is a hardware- and software-independent tool used to carry information and developed to describe data.

The data wrapped in the tags of an XML document can be manipulated and processed by various software programs, including web browsers, databases, and content management systems. By using tags to describe data, XML enables the creation of customized markup languages that can be tailored to specific needs. This makes it a versatile tool for data management, data exchange, and data storage. In summary, XML is a powerful tool that facilitates the exchange and processing of data in a structured, standardized, and flexible format.

To learn more about XML; https://brainly.com/question/22792206

#SPJ11

To create a database you must name tables, fields and other objects. Before beginning the design process there are good practices and rules that you must follow. List two below. Hint: think of the system restrictions and file management good practices.

Answers

When creating a database, naming tables, fields, and other objects is essential. Prior to beginning the design process, there are several good practices and rules that must be followed.

Two of them are given below:System restrictions:When creating a database, one of the most essential considerations to keep in mind is system restrictions. A system constraint is a restriction or limitation imposed by the system on the database design, limiting its overall capability.

These restrictions are placed on the database system to ensure that the design is accurate, effective, and will perform as intended. Some of the most common system constraints include the database size, the number of tables, and the number of records that the database can contain. When designing a database, it is critical to consider system restrictions to avoid data loss or system crashes.

File Management Best Practices:Another good practice when creating a database is to adhere to file management best practices. Effective file management is critical to the overall success of the database design. One of the most important aspects of file management is ensuring that the database is adequately structured and organized. This entails organizing the data into tables, columns, and rows.

It is critical to keep in mind that tables must be organized according to their function and that all fields must be accurately labeled to avoid confusion. It is also critical to establish a naming convention for all database objects to guarantee consistency and clarity throughout the database design.

For more information on database visit:

brainly.com/question/30163202

#SPJ11

necesito ejemplos de actitud filosófica por favor

Answers

Answer:

La filosofía es una disciplina intelectual que estudia críticamente las cuestiones más básicas de la humanidad y la naturaleza. Preguntas fundamentales de la filosofía son, entre otras, las siguientes:

-¿Existe alguna realidad fuera de mis pensamientos?

-¿Qué es el conocimiento?

-¿Qué es la verdad?

-¿Qué hace que una acción sea valiosa?

-¿Los humanos y los animales tienen valor y son iguales o diferentes?

-¿Qué es el tiempo?

Así, el planteamiento y reflexión de este tipo de preguntas son claros ejemplos de actitud filosfófica.

a person who uses computers to gain unauthorized access to data.

Answers

Answer:

Hacker

Explanation:

They break password codes to get access to unauthorized data.

Answer:

a hacker

Explanation:

Which group in the Timeline Tools contextual tab would help you alter the color of a timeline?

O Arrange
O Styles
O Size
O Show

Answers

The group in the Timeline Tools contextual tab that would help you alter the color of a timeline is the "Styles" group.

What is the Styles group?

The Styles group contains various formatting options that allow you to customize the appearance of your timeline, including the font, color, and border styles.

To change the color of your timeline, you can use the "Color" option in the Styles group, which lets you choose from a range of predefined colors or create your own custom color using the color picker tool.

Read more about database here:

https://brainly.com/question/518894

#SPJ1

Answer:

B. Styles

Explanation:

Antes de conectar un receptor en un circuito eléctrico, ¿qué precauciones debemos tomar para evitar riesgos y hacer que el dispositivo funcione correctamente?

Answers

Answer:

Antes de conectar un receptor en un circuito eléctrico, es necesario corroborar que el dispositivo que se va a conectar soporte la misma corriente de voltaje que la del circuito eléctrico. Así, si el circuito tiene un voltaje de 110 voltios, el dispositivo debe tolerar dicha medida; si por ejemplo el circuito tiene un voltaje de 220 voltios y se conecta un dispositivo que tolera 110 voltios, se producirá un cortocircuito que dañará definitivamente el dispositivo, ademas de poder causar accidentes domésticos como el corte del suministro eléctrico o incluso incendios.

Other Questions
find out the distance moved by a car in 4h at a speed of 17km/h Which of the following assessments of the Roosevelt Corollary is accurate?A. It translated into an alliance with France to defend the hemisphere.B. Stipulated that private investment in Latin America and the Caribbean should not be greater than that of the United States.C. It showed the United States would not intervene in other countries local affairs.D. It showed Roosevelt was prepared to do whatever possible to prevent U.S. corporations from investing in Latin America and the Caribbean.E. It proposed the United States could function as an international police power within the Western Hemisphere. The increased use of slave labor in the Southern colonies during the late 1600s was a result ofa.the passage of new union laws that prevented whites from doing certain types of labor.c.the decreased number of white servants immigrating to the colonies.b.the increased demand for cotton due to advances in manufacturing.d.the improved relationships between colonists and Native Americans. Find the Greatest Common Factor and Least Common Multiple for 20 and 8. GCF is LCM On what continent did World War 1 begin? A doctor claims that the mean number of hours of sleep that seniors in high school get per night differs from the mean number of hours of sleep college seniors get per night. to investigate, he selects a random sample of 50 high school seniors from all high schools in his county. he also selects a random sample of 50 seniors from the colleges in his county. he constructs a 95% confidence interval for the true mean difference in the number of hours of sleep for seniors in high school and seniors in college. the resulting interval is (0.57, 1.25). based upon the interval, can the doctor conclude that mean number of hours of sleep that seniors in high school get per night differs from the mean number of hours of sleen college seniors net ner night? In the communication process, a receiver assigns meaning to the symbols encoded by a company in its advertisements through a process known as:_________ Which of the karyotypes shown is from a normal female?ABC D why do slash-and-burn cultivators stop using a plot of land every two to three years? Island Corporation owes Mutual Bank a 10% note payable for $100,000 plus $8,000 accrued interest. On October 1, 20X1. Island and Mutual Bank execute an agreement whereby Island will pay Mutual $128,000 on the due date of the note on October 1, 20X3.Mutual Bank will record this transaction to recognize:Multiple Choicea receivable restructuring gain of $2,214.a debt restructuring loss of $2,214.a debt restructuring loss of $8,000.neither a gain nor a lost from debt restructuring. what enzyme is released from the kidney in response to hypotension? NEED HELP ASAPWILL GIVE 20 POINTS AND GIVE BRAINLIEST ANSWER AWARD TO PERSON WHO ANSWERS CORRECTLY!!!!place the following in increasing order: bacterium, atomic nucleus, red blood cell,cellular nucleus,thickness of plasma membrane, carbon atomNO LINKS PLEASEE This question has two parts. First, answer Part A. Then, answer Part B. Part A BRAKING DISTANCE From the time a driver sees the need to apply the brake to the point at which the car stops completely is known as the total stopping distance. The total stopping distance d can be modeled by the equation d = 0.0515r ^ 2 + 1.1r where is the speed in miles per hourGraph the function. Interpret the key features of the graph in terms of the quantities Select the graph that models this equation. Please help me I dont understand lol On number 4 btw What Information Technology is Walt Thomas responsible for? What is root 3 x root 7? Select the structure that corresponds to the name : methyl butanoate if a monopolistically competitive firm is earning positive economic profits in the short-run, then: select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a these profits will persist in the long-run because of the firm's limited monopoly power. b these profits will be eliminated in the long-run as new firms enter the industry. c its output will increase in the long-run. d price will be driven down to minimum average total cost in the long-run. helpppppppp. look at pic a company purchases merchandise for $24,500. the seller also offers credit terms of 2/10, n/30. assuming no returns were made, and that payment was made within the discount period, what is the net cost of the merchandise?