Answers

Answer 1

Answer:

ITS ALL ABOUT C

Explanation:

READ IT CAREFULLY


Related Questions

Check all that apply to Raster Graphics
in photoshop

only use certain colors
infinitely scalable
made from pixels
based on math
limited scalability

Answers

Answer: made from pixels, limited scalability

Explanation:

everything in PS is made up of pixels and you can see this if you zoom in too much or scale up too much, it will look like Mario 64. It is not like a vector based program, wich uses math to calulate lines so you can scale it indefinetly and it will remain crisp.

What is the primary difference between sort and filter?

Answers

Answer:

Filter only shows the messages that match a particular criterion

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?

Answers

Answer:

Service record (SRV)

Explanation:

Service records (SRV record) are data records stipulating specifications of the DNS such as the port numbers, servers, hostname, priority and weight, and IP addresses of defined or cataloged services servers.

The SRV record is the source of information and the search site about the

location of particular services as such an application i need of such services will look for a related SRV record

A configured SRV is the source of the ports and personal settings for a new email client, without which the parameters set in the email client will be incorrect.

Providing products or services that could be raffled off by a non-profit organization to raise money is an example of a business _____.

Answers

I think corporation is a correct answer, I found it on internet

Jack needs to create a technical drawing for a new tool.

Answers

Answer:

Jack should send an e-mail out to all of their clients and BCC them on it (so that they don't have each others information) and distribute the information quickly. E-mail is one fastest ways to get information sent to a large amount of people at one time

Answer:

so blueprints? jack needs to know the name and action of each part

why is life so boring and why can´t life just be fair and why is life so short and why do all these bad things happen to good ppl like why do bad things happen period

Answers

Answer:

To be honest i wonder the same thing all the time. I wish i knew the answer to all these questions as well.

Explanation:

a battery-powered global positioning system (gps) receiver operating on 9.0 v draws a current of 0.13 a. how much electrical energy does it consume during 30 minute

Answers

According to the stated claim, 2106J of electrical energy are used up in 30 minutes.

Why is a receiver necessary?

An A/V receiver is the electrical component that controls and fuels your home theater setup. The AV receiver is unquestionably the brain of both a home theater setup. It ingests the signals out of those sources and then transmits the visual and audio impulses to the relevant outputs.

Battery voltage V = 9.0v

Drawn current = I = 0.13A

Consuming time = 30 min = 30 * 60s = 1800s

energy = pt = VIt

= 9.0V * 0.13A * 1800s = 2106J

To know more about Receiver visit:

https://brainly.com/question/553980

#SPJ1

What is the first step in changing where templates are stored?
Click the At startup, open all files in box.
Double-click on the Advanced option.
Open the Excel Options dialog box.
Enter the folder path to use for templates.

Answers

Answer:

Open the Excel Options dialog box

Explanation: edg

Shadow and highlight create depth (3D).
TRUE OR FALSE

Answers

Answer:

true because then it would be like not popping out

What list of numbers is created by the following code:

range(9)

Group of answer choices

0 1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8 9

1 2 3 4 5 6 7 8

0 1 2 3 4 5 6 7 8 9

Answers

Answer:

0 1 2 3 4 5 6 7 8

Whats the best way to make a video game?

Answers

Answer:

Step 1: Do Some Research & Conceptualize Your Game. ...

Step 2: Work On A Design Document. ...

Step 3: Decide Whether You Need Software. ...

Step 4: Start Programming. ...

Step 5: Test Your Game & Start Marketing

mohammed is experiencing issues with his work computer. he speaks to the it department and they identify various symptoms of a computer virus. what are symptoms of a computer virus? more than one answer may be correct.

Answers

Some of the symptoms of a computer virus include slow down of computer performance, unexpected pop-up windows,some files go missing

What are the symptoms of a computer virus?

Computer performance is sluggish (taking a long time to start up or open programs)Shutting down or restarting problemsThere are no files.Files go missingSystem crashes and/or error messages occur on a regular basis.Unexpected pop-upsNew programs (toolbars, etc.)

Major symptoms of having computer virus are crashing of the system and the delay in the performance of the computer also the pop-up windows make the system slow

Delay in installing of files and the installed ones have the restarting or opening problem and uninstalling certain programs might be the final one

Hence to conclude we should be aware of virus in pc and uninstall those virus related softwares

To know more on the concept of virus in pc follow this link:

https://brainly.com/question/26128220

#SPJ4

12. Before the Internet, which invention had the biggest impact on employees in the workforce?
A. Trojan horses
B. Equal income
C. Digital libraries
D. Electricity

Answers

Answer:

D. Electricity had the biggest impact on employees in the workforce before the internet. It allowed factories to operate machinery, offices to use typewriters and other electrical equipment, and increased productivity and efficiency.

Explanation:

what is a family of web feed formats used for web syndication of programs and content?

Answers

RSS (Really Simple Syndication) and its variants such as Atom and RDF (Resource Description Framework).


RSS is a family of web feed formats that allow publishers to distribute content to a wide audience. It is a popular way for users to keep up with their favorite websites and blogs. RSS feeds can contain a summary of content or the full text, along with metadata such as author, date, and category.

RSS is a standardized system that allows users to subscribe to websites and receive updates, such as news articles, blog posts, or multimedia content, through a feed reader.

To know more about Atom visit:-

https://brainly.com/question/15215058

#SPJ11

the infection of a digital device by a computer virus happens in stages. what is the second step in this process?

Answers

Since the infection of a digital device by a computer virus happens in stages, the second step in this process is option A: An action such as running or opening a file activates the virus.

When a virus is triggered, how does it function?

A virus that has infected a computer attaches itself to another software so that when the host program runs, the virus's actions are also activated. It has the ability to replicate itself, attaching to other files or programs and infect them in the process.

Therefore, note that in the second stage, the majority of viruses, Trojan horses, and worms start when you open an email attachment or click on one of its links. If your email client supports scripting, then opening an email could expose you to a virus.

Learn more about computer virus  from

https://brainly.com/question/26128220
#SPJ1

See full question below

The infection of a digital device by a computer virus happens in stages. What is the second step in this process? Multiple Choice An action such as running or opening a file activates the virus. The infection spreads to other computers via infected email, files, or contact with infected websites. The virus arrives via email attachment, file download, or by visiting a website that has been infected. The payload or the component of a virus that executes the malicious activity hits the computer and other infected devices.

Sports photography is not included in news coverage.


True


False

Answers

Answer:

False yes it is

Explanation:

Follow your teacher's instruction to__________________your computer after each use.

Answers

Answer: proper shutdown

Hope that helps!

a message ____________________ is a fingerprint of the author’s message that is compared with the recipient’s locally calculated hash of the same message.

Answers

A message fingerprint is a unique digital signature that identifies the author's message and is compared to the recipient's locally calculated hash of the same message. This method of verification helps to ensure the authenticity and integrity of the message being sent.

Message fingerprinting is a widespread approach in modern communication networks for preventing unwanted access to data and ensuring that messages have not been tampered with during transit. A hashing technique is used to turn the content of a communication into a unique digital signature before it is transmitted. This signature, or fingerprint, is then delivered to the receiver along with the message.

When the message is received, the recipient's system computes the hash of the message and compares it to the sender's hash to guarantee that they match. If they don't match, it means the communication was tampered with or distorted in route. The communication will be refused in such instances, and the sender will be alerted.

Message fingerprinting is a crucial security measure that is used in various communication technologies such as email, instant messaging, and file-sharing systems. By using message fingerprints, organizations can ensure that their sensitive data remains secure and that their messages are delivered without any tampering or unauthorized access.

To learn more about the digital signature, visit:

https://brainly.com/question/14862771

#SPJ11

Describe the purpose and user requirements for the website.​

Answers

Answer:

The purpose and user requirements for the website is described below in details.

Explanation:

User Requirements represent how user expectations and wherewith they will communicate with the outcome. Use the characteristics, functions, and content expressed in your summaries to elaborate on your requirements. Your user synopses should describe the responsibilities your users want to perform on your site.

How do you write mathematical expressions that combine variable and literal data

Answers

Variables, literal values (text or integers), and operators specify how the expression's other elements are to be evaluated. Expressions in Miva Script can generally be applied in one of two ways: Add a fresh value.

What connection exists between literals and variables?

Literals are unprocessed data or values that are kept in a constant or variable. Variables can have their values updated and modified since they are changeable. Because constants are immutable, their values can never be updated or changed. Depending on the type of literal employed, literals can be changed or remain unchanged.

What kind of expression has one or more variables?

The concept of algebraic expressions is the use of letters or alphabets to represent numbers without providing their precise values. We learned how to express an unknown value using letters like x, y, and z in the fundamentals of algebra. Here, we refer to these letters as variables.

to know more about mathematical expressions here:

brainly.com/question/28980347

#SPJ1

PLEASE ANSWER FAST IM TIMED
A WYSIWYG editor will save time and make the process of Web site design an artistic practice rather than a ------- practice.

Answers

This open source software helps you either create a website through code, or design it with the help of templates and facile customizations.

What is the difference between HTML and WYSIWYG?

A WYSIWYG editor shows you a rendered web page as you edit the page. You do not see the actual HTML. When using manual coding, you see the HTML, but you must load the document in a web browser to view the rendered page.

Is WYSIWYG easy to use?

An efficient free WYSIWYG Editor comes with an easy-to-use toolbar, keyboard shortcuts, and other features that allow you to easily add or edit content, images, videos, tables, or links. A WYSIWYG editor saves time and makes web content creation quick and easy.

To know more about  WYSIWYG visit:

https://brainly.com/question/12340404

#SPJ1

Answer:

Programming

Explanation:

WYSIWYG (sometimes pronounced "wizzy wig") is an acronym that stands for "What You See Is What You Get." It is a phrase that was coined when most word processing, desktop publishing, and typesetting programs were text and code based. HTML, at its code level, is much like the early interfaces on this sort of software. A WYSIWYG editor saves time and makes the process of website design an artistic practice rather than a programming practice.

write an algorithm to find the perimeter of rectangle

Answers

Answer:

look at the link i put down below

Explanation:

write an algorithm to find the perimeter of rectangle

Does anyone know how to do Python Essentials 5.7.1.6 because i am completely lost

Does anyone know how to do Python Essentials 5.7.1.6 because i am completely lost
Does anyone know how to do Python Essentials 5.7.1.6 because i am completely lost

Answers

Answer:

create a 2d array of "#" for each letter, and use string manipulation or regular expressions to print each letter

Explanation:

the cards used with mobile phones today are a special type of smart card. a. nas b. raid c. san d. sim

Answers

The SIM cards used with mobile phones today are a special type of smart card. In this case Option D is correct

Except when you get a new phone and the card needs to be transferred from the old one to the new one, along with the phone's stored data, IM (Subscriber Identity Module) cards are probably not something you think about very often.

The cards themselves are plain plastic pieces with silicone chips on them, similar to those found in credit cards and hotel key cards, which contain processor and memory circuits that enable them to store up to 256 KB of digital information.

An essential function of SIM cards in mobile and telecommunications technology is as follows: Phone companies can accurately measure usage and charge because they can route calls to the appropriate device for each person and link a physical device with the owner's account.

To know more about  SIM cards here

https://brainly.com/question/14100139

#SPJ4

describe the three major subsets of the analytics focused software developers portion of the analytics ecosystem.

Answers

1. Data Science: Data scientists focus on gathering, organizing, cleansing, analyzing, and interpreting data. They use machine learning algorithms, predictive analytics, and statistical methods to extract insights from large datasets.
2. Business Intelligence: Business intelligence (BI) engineers develop software and systems that enable organizations to make informed decisions based on data.
3. Data Engineering: Data engineers are responsible for the design, development, and maintenance of data pipelines and data infrastructure. They work with data scientists and BI engineers to ensure data is available in the right format and stored in the right location.

What is Data Pipelines?
Data Pipelines are a set of automated processes that move data from one system to another. They provide a way to extract, transform and load data from multiple sources into a data warehouse, data lake or other target system. Data Pipelines enable organizations to quickly and efficiently collect and analyze data from disparate sources.

To know more about Data Pipelines
https://brainly.com/question/30167532
#SPJ4

What would you classify anti-malware software as?


SaaS

enterprising

cloud

security

Answers

Answer:

enterpriseing is the answer

Collin would like to use the data a coworker has entered in a database. The problem is the coworker's database software is different from collin's. Collin should _____.

Answers

If Collin would like to use the data that a coworker has entered in a database but the database software is different, he should try to find a way to export the data from the coworker's database in a format that he can use.

Why should Collin save the data in a specific format?

This could involve exporting the data to a file such as a CSV (comma-separated values) or an Excel spreadsheet, which can be opened and used in a variety of different software programs.

Alternatively, Collin could ask the coworker to send him a copy of the database file in a format that he can use, or he could ask the coworker to provide him with access to the database itself so that he can directly access and use the data.

To learn something more about database, visit: https://brainly.com/question/29451665

#SPJ4

Can you see the processing step yes or no

Answers

Answer:

I cannot see anything on my screen

Explanation:

I can't see anything............................

A program in the cyberspace and intercept messages containing specific text A. Virus B. Sniffers C. Worm D. Bomb

Answers

Answer:

B. Sniffer

Explanation:

The type of program that is being discussed is called a Sniffer. This can either be a software or hardware that allows the user to intercept data flowing from a computer to the internet in real-time before it reaches its destination. The program can be very vague and intercept all the data coming and going to the target computer or it can be very specific and intercept only the data in which it was programmed to target (sniff out). Cyber Criminals use these programs/devices to steal valuable information that they know a user is going to send sooner or later over the internet.

which is true about arrays and methods?a.arrays cannot be passed to methodsb.passing an array to a method creates a copy of the array within the methodc.an array is passed to a method as a referenced.a programmer must make a copy of an array before passing the array to a method

Answers

The correct statement is an array is passed to a method as a reference. The correct option is C.

In a programming language like Java, the real array is not replicated when it is supplied to a method. Instead, the method receives a reference to the array.

As a result, any modifications made to the array inside the function will also affect the original array outside the method. This is so because the array's storage location in memory is the same location where the reference points.

It is efficient to pass arrays as references because it prevents irrational memory usage and enables changes to be performed directly to the original array.

Thus, the correct option is C.

For more details regarding array, visit:

https://brainly.com/question/13261246

#SPJ4

Other Questions
a circle has diamter of 4 what is the area What differences does Khrushchev see between Lenins leadership tactics and Stalin tactics? what made the middle colonies different from New England and the southern colonies If the cell i 1. 5V & there are 4 cell - what i the total potential difference (in volt) of the circuit? Some believe that the purpose of religious beliefs has been to give rulers an excuse to keep power over their subjects. What kind of definition of religion would this MOST closely fall under? A simple harmonic oscillator takes 12.0s to undergo five complete vibrations. Find(b) the frequency in hertz. A bouncing ball reaches a height of 27 feet at its first peak, 18 feet at its second peak, and 12 feet at its third peak. Describe how a sequence can be used to determine the height of the ball when it reaches its fourth peak. In an inflationary expenditure gap, the equilibrium level of real GDP would be: Group of answer choices A cable is 60 meters long. How long is the cable in decimeters?Be sure to include the correct unit in your answer. PLEASE HELP!!!What is the slope on the graph? Jenny is suffering from sleep deprivation. She will probably experience which of the following symptoms? a. Loss of organ function b. Physical cravings c. Reduced functioning d. Unexplainable sadness Please select the best answer from the choices provided A B C D. after having your picture taken with a yellow flash, you momentarily see blue spots floating before your eyes. this phenomenon is best explained by If the temperature of 15 grams of water changes from 21C to 24C, how many joules of heat were involved? Show work Rate my art :D (it's an e girl with a wolf cut) Compare and contrast the lives of 18th century American women, in established rural communities, on the frontier and in major seaports. Samara is nine years old and has started to struggle with getting ready for school. She tells her mom that she hates the way that she looks and doesn't like any of her clothes. Her mom has noticed Samara expressing concern not only about her appearance but also about failing or not meeting expectations. This is likely because school-aged children often experience issues with:sympathy.happiness.intelligence.self-esteem. You are the CEO of a corporation that makes computer hard drives. The company made $50 million dollars in annual profit this year, after struggling for the 5 previous years. About 6,000 people are working for your company and about 80% of them are directly associated with the manufacturing plant. Workers at the plant have not received a salary raise for the past 5 years, and the workers union is demanding a salary raise this year. The company has an annual payroll of about $500 million dollars, with about 70% of it for the workers in the plant. Factory managers are asking for $25 million dollars to upgrade the equipment and improve the efficiency of the plant. White-collar workers in the head office claim that it is their strategy that turned the factory around and put it on the path to profit. Due to this reason, they think they deserve to get a big bonus. How do you allocate the profits to meet all these demands? Justify your decision. Does anybody know this cause I need help please help me Question 3/5Who said, 'before whom I stand, Thereshall not be dew nor rain these years,But according to my word.' 3x+2y=165x+y=9how to solve this math problem