Projects used for print and web have different ?

Answers

Answer 1

Answer:

Sizes

Explanation:


Related Questions

Can somebody help me? Thank you. ASAP

Can somebody help me? Thank you. ASAP

Answers

Home tab, paragraph group, and multilevel icon. :)
You are correct I think

1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?

Answers

Answer:

The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.

Explanation:

There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.

The establishment of the ‘ARPANET’ (an early version of the internet) used in the USA in 1969 as a means of communication between various research institutions.

The impact it has had:
Developed into the globally used Internet which is now integrated into modern society and is seen as an essential for good quality of life.

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

What is the use of an NDP?

A). identifying pointers at the other end of a network
B). sending an error message if a packet gets lost due to a bad connection
C). finding other computers on the network
D). taking an IP address from a network layer and identifying the associated MAC address

Answers

Answer:

Taking an IP address from a network layer and identifying the associated MAC address

Explanation:

Option D

It is used to measure the total economic output of a country, taking into account depreciation and capital consumption.

All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!

Answers

Answer:

computer system normally stores characters using the ASCII code. Each character is stored using eight bits of information, giving a total number of 256 different characters (2**8 = 256).

Explanation:

Not sure but I think the answer that answered first is correct

Which involves more human input, basic algorithms, or machine learning?

Answers

Answer:

Machine learning

Explanation:

Machine learning involves more human input. Check more about machine learning below.

Does machine learning needs human input?

Note that as  long as AI technology is invoke and there are new applications that are made for AI to learn, AI will need to have human input.

Therefore, Machine learning involves more human input as AI. needs to learn more about humans so as to function well.

Learn more about human input from

https://brainly.com/question/24953880

#SPJ2

How do solar ovens track the sun as it moves during the day?

Answers

Answer:

A sort of solar thermal collector is a solar cooker. It "collects" and retains the thermal (heat) energy of the Sun. When high frequency light (visible and ultraviolet) is transformed into low frequency infrared radiation, heat is created.

Explanation:

When the sun is overhead, light rays pass through less atmosphere, so less UV radiation is screened out. A solar cooker works like a one-way lobster trap. It lets UV light rays in and then converts them to longer infrared light rays that can't escape.

What matters most to teens when making a clothing purchase: Brand, Price or Quality? Explain. please have 4 sentences!!

Answers

Answer:

Teenagers have always been important to brands because they tend to be early adopters and because, traditionally, their brand preferences aren't yet firmly defined. ... With the internet and social media, teenagers have more access to that information than ever before." Teens also wield significant purchasing power.

Hope that helps have a wonderful rest of ur ay and God bless you

Explanation:

Answer:

To teens, brand influences what they purchase. This is because nowadays, people gain steam in social media based on what they wear, and it is very important to teens to show their value/worth. To do this, they choose brands that are trendy or a brand that will improve their reputation. It can also even be a brand that someone may like or enjoy. This shows that price and quality doesn't matter that much to them because the brand is what gets attention on online media.

This explains what I said better:

https://www.vox.com/the-goods/2018/9/24/17861398/gen-z-shopping-habits-juul-glossier

its a website that i got info from so ye

I hope you liked what I wrote, but you probably won't anyways. :)

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

what is 8 4/7 divided by 15

Answers

84/7 divided by 15 is 0.8

Answer: 4/7

Explanation:

8 4/7 ÷ 15

60/7× 1/15

=4/7

ok so...you first are going to convert the mix fraction 8 4/7 to improper fraction by multiplying the denominator and the whole number which is 56 then add the numerator 56 +4= 60 and put back the denominator which is going to be 60/7.

Then flip the fraction or the whole number 15 which is also 15/1 that is on the right which is going to be 1/15 and change the division sign to multiplication which is going to be 60/7 × 1/15.

then you can cancel, 15 go into 60, 4 times, so you are going to multiply 4 times 1 and 7 times one, which gives you 4/7.

I hope this help you to understand

How do you code things to make shapes out of them and add color

Answers

Answer:

go to KhanAcademy and search "Coloring with code" and it should be the first thing at the top

Which of these represents information that is fact-based, measurable, and observable?

objective information
predictive information
subjective information
interpretive information

Answers

Answer: objective information

Objective information should be answer

Is a poster the best media form to make a call to action to the government and major corporations? What other media forms could be effective?

Answers

Answer:

A Poster can be an effective media form to make a call to action to the government and major corporations, as it allows for visually impactful messaging. However, other media forms could also be effective, such as:

Social media campaigns: Utilize platforms like Twitt..er, Fa..cebook, or Ins..tagram for awareness and mobilization.

Online petitions: Collect signatures and demonstrate public support.

Video campaigns: Engage viewers emotionally through compelling videos.

Mass media advertising: Utilize TV, radio, or print media for broader reach.

Advocacy websites: Provide information, resources, and a platform for action.

Public demonstrations and rallies: Gather supporters for visible advocacy.

Answer:

Explanation:

Online petitions: Collect signatures and demonstrate public support.Video campaigns: Engage viewers emotionally through compelling videos.Mass media advertising: Utilize TV, radio, or print media for broader reach.Advocacy websites: Provide information, resources, and a platform for action.Public demonstrations and rallies: Gather supporters for visible advocacy.

How many animals do I have? 1 or 2


How many siblings do I have? 3 or 6


How many aunts do I have? 10 or 13


How many grandparents do I have now? 4 or 6

Hint: Most of them passed away! :(


Good Luck! If u get most of them correct u will be Brainliest!

TRY UR BEST!!

Answers

2
6
4
I’m guessing but this is my guess
2 3 10 4 I think that’s correct

What will you see on the next line?
>>> int(200.9123)

Answers

I.d.k is 200.9123 ans is 282828,&
The answer is 200 because the internet function converts any data type to an integer. Hope this helps!

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

In the context of outside influences on research, what is the difference between maturation and attrition?

A. Maturation is the decrease in the number of subjects studied over time; attrition is the change in subjects over time.
B. Maturation is the change in subjects over time; attrition is the decrease in the number of subjects studied over time.
C. Maturation is the change in subjects over time; attrition is the change in subject responses due to world events.
D. Maturation is the change in subject responses due to world events; attrition is the change in subjects over time.

help please!!

Answers

Answer C I took the test

Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?

a
Ignore the request and not enter any personal information.

b
Provide only her name and date of birth.

c
Provide only her name and address.

d
Provide the requested information to receive the discount.

Answers

Answer:

a

Explanation:

sis is gonna get scammed

Answer:

a

Explanation:

You dont know who is getting your information and it is not someone you know. STRANGER DANGER!

Help me please. I dont really understand this.

Help me please. I dont really understand this.

Answers

I didnt see the 2022 year date (sob sob) mbb

How do I get my text box to stop moving continuously on a Chromebook?

I will give brainliest to the first person who answers (and the suggestion helps!) and also friend anyone who answers, whether it is helpful or not!

Answers

Answer:

Go to Settings. Click on Advanced Settings. Scroll down to the Accessibility section. Make sure that the box next to “Automatically click when the mouse pointer stops” is Unchecked.

Explanation:

here you go hope this helps!!

turn off and on your laptop laptop laptop

HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order to get feedback. Which stage of the software development life cycle is Tyra currently in? Coding Design Planning Testing

Answers

Maintenance/Testing is the correct answer

Answer:

testing

Explanation:

Tyra developed a new game and let her friends try it. This means she already made it planned, designed, and coded the game. now her friends are testing it

im pretty sure this is the answer

An example of how a merge code would appear in a letter would be _____.

Answers

Answer:

Space blank

Explanation:

It means the question needs you to answer the question

Answer:

An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.

Explanation:

I hope this helps

Guys i keep trying to get in touch with brainly but it says "your request could not be submitted" Can someone please help me ?

Answers

Sure what is your question? It also happened to me too
What grade are you in
Did u go to their online website??

Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts.

Answers

Answer:

Python is the current language of choice in schools because it helps people build good coding techniques very quickly, and it has a robust range of uses. Code presentation is also an increasingly important distinction between the two languages. In the past, developers used code largely to create applications.

Explanation:

Python is related to flowcharts. because You write a program by setting up a flowchart. When you run the flowchart the software compiles to python byte-code so that you can easily import modules you write in Flowchart Python into standard Python programs.

sorry if i'm wrong

Python is a programming language which enables ciders to perform robust tasks very easily. Advantages of python include ;

Robustness and very large community

Readable and very clean syntax

Wide variety of applications such as data science, application development and so on.

Python like most other programming language executes codes sequentially, hence a breakdown of the execution structure or pattern of the program could be traced. This is inline with the flowchart diagram whigh gives a diagrammatic representation of the flow structure of a program.

Learn more : https://brainly.com/question/22841107

What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware

Answers

Answer:

Hardware

Explanation:

Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.

Hope this helps. <3

Hardware is the name given to the parts of a computer that you can actually touch.

What is Hardware?

The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware. 

Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.

Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.

Therefore, Hardware is the name given to the parts of a computer that you can actually touch.

To learn more about Hardware, refer to the link:

https://brainly.com/question/15232088

#SPJ5

Which of the following lines of code creates a division called answer?

A.


B.


C.


D.

Answers

Answer: ‎

Explanation:

i believe the answer is C

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

bro i will give brainly to anyone who beats me in just build .lol code is uspx11

Answers

Ur on broski __________________________
How many points would you give

Which statement assigns the value 99 to the variable myGrade in Python?


myGrade = 99

my Grade = 99

!myGrade = 99

myGrade == 99

Answers

Answer: I think that the answer is the first one, myGrade=99

Explanation:

THE FIRST ONE IS =99
Other Questions
What is the y-intercept of a line that has a slope of 3 and passes through point (-1, -7)?10437 The height of an object tossed upward with an initial velocity of 152 feet per second is given by the formula h = 16t2 + 152t, where h is the height in feet and t is the time in seconds. Find the time required for the object to return to its point of departure. What are the characteristics of an acid-base neutralization reaction? Anybody know this answer? What is the value of the expression2(x + 4) - (y.8)when x=1/8 and y=3/16 IN OWN WORDS, ABOUT 300-500 WORDS, Evaluate, economically, BOTH MIRCRO AND MACRO how rising housing costs in China impact its citizen...do not copy. precise answer required for CHINA. downvote will receive if just copy and paste online. dont want answer for other countries or globally an insulated, rigid tank whose volume is 0.5 m3 is connected by a valve to a large vessel holding steam at 40 bar, 500 oc. the tank is initially evacuated. the valve is opened only as long as required to fill the tank with steam to a pressure of 20 bar. determine the final temperature of the steam in the tank, in oc, and the final mass of the steam in the tank, in kg. The site on the surface of a reactant or substrate where it binds to the enzyme is called the:_____. what are the two factors needed to explain the difference in solubilities of ionic solid in Water The Tea Act of 1773 angered colonists because? What is being personified in this sentence?"The bright orange walls screamed at her as she walked into the room." Occasionally, _________________ may lead to pure monopoly; in other market conditions, they may limit competition _________________ .barriers to entry; to a few oligopoly firmsbarriers to entry; to a natural monopolyderegulation; requiring new patent lawderegulation; requiring new copyright law Top managers of Kellogg India ltd received unsettling reports of a gradual drop in sales. Managers realized that it would be tough to get the Indian consumer to accept its products. Kellogg banked heavily on the quality of its crispy flakes. However, pouring hot milk on the flakes made them soggy and did not take good and not many Indian consumers like to have them with cold milk. A typical average middle class Indian family did not have breakfast on regular basis like their western counterparts. Those who did have breakfast, consumed parathas, idles , bread, butter, jam, milk tea and local food preparations. According to analysis, a major reason for kelloggs failure was the fact that the tastes of its product did not suit Indian breakfast habits. Kellogg sources were however quick to assert that the company was not trying to change these habits; the idea was only to launch its products on the health platform and make consumers see the benefit of this healthier alternative. Another reason for low demand was premium pricing adopted by the companyDisappointed with the poor performance, Kellogg decides to launch two of its highly successful brands- chocos and frosties in India. The success of these variants took even Kellogg by surprise and sales picked up significantly. This was followed by the launch of chocos breakfast cereal biscuits. The success of chocos and Frosties also led to kelloggs decision to focus on totally Indiansing its flavors in the future. Kellogg also introduced packs of different sizes to suit Indian consumption patterns and purchasing power. Kellogg tied up with the Indian diet association to launch a nationwide public service initiative to raise awareness about iron deficiency problems. The company has also modified its product, particularly the addition of iron fortification in breakfast cereals. However, Kellogg continued to have the image of a premium brand and its consumption is limited to a few well of sections of the Indian market. QuestionQuestion 1:- How effectively Kellogg has met conditions of marketing concept?Question 2:- Suggest ways how Kellogg can have more influence on consumption behavior of Indian consumer?Question 3:- SWOT Analysis of Kellogg ac a, c, with, \overleftrightarrow, on top is tangent to circle ooo at point ccc. what is the measure of \angle oacoacangle, o, a, c? What is the value of V? 1. A (5m2m) rectangular sheet of metal is to be used to construct a box with open top by cutting out square pierces of ( x ) dimensions over it comers Find the maximum possible volume that could be constructed. Leave your answer in two decimal places What is the equation of the line with slope of 4 and y-intercept of (0,-2)? what type of sedimentary rock is not part of the eocene claron formation? 32 yo F presents with sudden onset of left lower abdominal pain that radiates to the scapula and back and is associated with vaginal bleeding. Her last menstrual period was fi ve weeks ago. She has ahistory of PID and unprotectedintercourse. What the diagnose? The speaker admits that "men of my own stock" may have their faults, but emphasizes that they are faults he is familiar with. A. true B. false