Which command is located in the Action Settings dialog box that allows a user to set a linked or embedded object as a trigger to perform an action? a-Object action b-Hyperlink to c-Run action d-Highlight click

Answers

Answer 1

Answer:

b-Hyperlink

Explanation:

The command that is being described in this question is known as a "Hyperlink", like mentioned this command allows the creator to make a piece of text or object perform a specific action when clicked. Usually this action is taking the user to a specific slide in the PowerPoint presentation or to another website entirely, usually with reference to the word or object that was clicked.

Answer 2

Answer: the answer is Object Action

Explanation:

Just took the test:)


Related Questions

suppose you have an array of n elements containing only two distinct keys, true and false. give an o(n) algorithm to rearrange the list so that all false elements precede the true elements. you may use only constant extra space.

Answers

The Dutch National Flag algorithm or the Three-Way Partitioning algorithm, utilizes three pointers to divide the array into three sections: the section with `false` elements, the section with `true` elements, and the unprocessed section. By swapping elements based on their values and adjusting the pointers, the array can be rearranged efficiently.

The Dutch National Flag algorithm involves using three pointers: `low`, `mid`, and `high`. Initially, `low` and `mid` point to the first element, while `high` points to the last element. While `mid` is less than or equal to `high`, the following steps are performed: If the element at `mid` is `false`, it is swapped with the element at `low`, and both `low` and `mid` are incremented. If the element at `mid` is `true`, it is swapped with the element at `high`, and `high` is decremented. If the element at `mid` is already in the correct position (i.e., `false`), `mid` is incremented. This process continues until `mid` becomes greater than `high`. At this point, the array will be rearranged such that all `false` elements precede the `true` elements. Since each element is visited exactly once, the algorithm has a time complexity of O(n) and requires only constant extra space.

learn more about algorithm here: brainly.com/question/31928563

#SPJ11

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

Describe the contents of a basic program outline.

Answers

Answer:

Oneday

Explanation:

ONEDAY WE WILL BE ABLE TO DO IT!

Assume you are a network technician for a mid-size company. You're often at the office on Saturday afternoons to catch up on work without disruption. You get a phone call from a person who identifies himself as the new assistant to a company vice president. He says the VP is traveling internationally and needs access to certain sensitive files on the server but cannot access it. The assistant needs the VP's network credentials to locate the files, and he is worried he will be fired if he doesn't get the information quickly. You've never spoken directly to the VP and are not familiar with the assistant. For your intial post answer the following questions: You are not sure if this is a legitimate request or a social engineering scam. What is the best way to handle this situation?

Answers

Answer: You can ask the person follow-up questions. Like, why did the VP did not call himself or use multi-factor to get account.

Explanation:

Which of the below would provide information using data-collection technology?

Buying a new shirt on an e-commerce site
Visiting a local art museum
Attending your friend's baseball game
Taking photos for the school's yearbook

Answers

The following statement would provide the information by utilising data-collection technology: Buying a new shirt on an e-commerce site.

What is data collection?
The process of obtaining and analysing data on certain variables in an established system is known as data collection or data gathering. This procedure allows one to analyse outcomes and provide answers to pertinent queries. In all academic disciplines, including the physical and social sciences, the humanities, and business, data collecting is a necessary component of research. Although techniques differ depending on the profession, the importance of ensuring accurate and truthful collection does not change. All data gathering efforts should aim to gather high-caliber information that will enable analysis to result in the creation of arguments that are believable and convincing in response to the issues that have been addressed. When conducting a census, data collection and validation takes four processes, while sampling requires seven steps.

To learn more about data collection
https://brainly.com/question/25836560
#SPJ13

Question # 6 Fill in the Blank You designed a program to create a username using the first three letters from the first name and the first four letters of the last name. You are testing your username program again for a user whose name is Paula Mano. The output should be

Answers

Its PuaMano

Explanation:

got it wrong and it shows this answer for edge

list =[10, 5, 15] for( var i=0; ; i++){ console.log(list[i]} Which of the following will NOT result in an error if placed where program reads and the program is run?

Answers

Answer:

B

Explanation:

It would be lost.length

Define special computer​

Answers

Answer:

A computer designed from scratch to perform a specific function. Contrast with general-purpose computer. See ASIC.

Answer:

Special computer is the computer designed for a particular type of application only. It is defined as a stored program digital computer, whose architecture is oriented towards one or more applications.

In a ____ environment, you can change directories using the cd command. For example, to change to a directory named MyClasses, you type cd MyClasses and press Enter.

Answers

DOS, is your answer

In a DOS environment, you can change directories using the cd command. For example, to change to a directory named MyClasses, you type cd MyClasses and press Enter.

What is the purpose of DOS?

The reason of a disk running machine is to allow the pc to switch the statistics saved on a magnetic disk to some other a part of the pc: its predominant reminiscence is referred to as RAM (Random Access Memory), the video display screen or the printer.

The DOS surroundings is a reserved section of number one reminiscence known as the Master Environment Block. The surroundings is used to shop machine statistics withinside the shape of environmental variables, or environmental strings.

Read more about the DOS:

https://brainly.com/question/26338728

#SPJ2

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated
Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Answers

Answer:

class Foo:

   def F(self, n):

       if n == 1:

           return 1

       return self.F(n - 1) + 3 * n - 2

Explanation:

This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.

def F(n):

   if n == 1:

       return 1

   return F(n - 1) + 3 * n - 2

Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!

Consider the following code:


grid = []


grid.append (["frog", "cat", "hedgehog"])

grid.append (["fish", "emu", "rooster"])

What is output by:


print (grid[0][0])
also these two
print (grid[1][2])
print (grid[0][1])

Answers

Answer:

print(grid[0][0]) = frog

print(grid[1][2]) = rooster

print(grid[0][1]) = cat

Final output:

frog

rooster

cat

Explanation:

grid[0][0] is the first item in grid[0], which is "frog".

grid[1][2] is the last/third item in grid[1], which is "rooster".

grid[0][1] is the second item in grid[0], which is "cat".

Simply add 1 when dealing with list indexes, that's all you need to do!

In Python, the list is a mutable, or changeable, ordered series containing elements. so, the output of the given python program code is "frog, rooster, and cat".

Program explanation:

Defining an empty list that is a "grid".Inside the list, the append method is declared which adds string value to the list.In the next line, three print method is used that calls the list values.In the first print method, it calls the first index value "0,0" which is "frog".In the second print method, it calls the second index value "1,2" which is "rooster".In the third print method, it calls the first index value "0,1" which is "cat".

Output:

Please find the attached file.

Find out more about the list in python here:

brainly.com/question/17019263

Consider the following code:grid = []grid.append (["frog", "cat", "hedgehog"])grid.append (["fish", "emu",

Munnabhai knows the four values of agile manifesto by heart. However, he was confused when a customer spoke with him highlighting agile characteristics of short development cycles or iterations. He could not recollect anything about short iterations in agile manifesto. What did he miss to learn about?

Answers

Answer:

When executing Agile Projects, an iteration, is a timebox (a fixed period of time when activity takes place) during which development is carried out. Depending on the project, an iteration may last between 7 to 28 days.

                                       

As far as the Agile Manifesto is concerned, the short development cycles of or iteration means that priorities can be moved between iterations. It also means that features of an Agile project can be modified on or before the next iteration.

In traditional project managagement this sort of revisions is called scope creep. That is when a project deviates from or expands upon it's original deliverables before the project is over. This is usually a problem. The Agile methodology however allows for revisions to happen within timeboxes. Thus ensuring that regardless of addition of new features, the time set for the development is not exceeded.

It is the view of Agile Project Developers that the iterations allow for provision of additional value and improvement.

Cheers!

eeeeeeeeeeeeeeeeeeeeeeeeeeeereeeeeeeeeeeeeeeee

Answers

Answer:

okay

Explanation:

.............

True or False: Visual Studio is not a part of Unity. You could use a different code editor to edit your C# scripts if you wanted to.

Answers

Answer:

True

Explanation:

Visual Studio and Unity are two different things. Visual Studio is an IDE developed by Microsoft, and Unity is a game engine developed by another company. Visual Studio is the default editor in Unity, but you are able to use something different.

Source: https://docs.unity3d.com/Manual/ScriptingToolsIDEs.html

There are different kinds of true statement.  Visual Studio is not a part of Unity is a true statement.

Is Visual Studio a part of Unity?Visual Studio is known to for  Mac Tools and also for Unity is said to be part of  the installation of Visual Studio for Mac.

You can verify the type of Visual Studio differs for Mac and other product.

Learn more about Visual Studio from

https://brainly.com/question/4925305

You will be safe from downloading viruses as long as you have software to monitor your computer. please select the best answer from the choices provided t f

Answers

The statement " you will be safe from downloading viruses as long as you have software to monitor your computer" is false.

Softwares such as firewalls and different types of anti-viruses play a role in protecting your computer from various viruses and potential hackers by monitoring, detecting, and eliminating the virus. Still, they alone cannot provide the protection as they need the support of the user. The user must show responsibility from his side and use the system wisely by not entering into threatful websites or downloading pirated files. The user must ensure before plugging any device that it is free from any kind of malware and may not be harmful to the computer. The user should use and maintain a secured connection. Hence, a software monitoring the computer is not enough for protection from viruses and requires the user to play a role as well in keeping the computer virus free.

To learn more about viruses, click here:

https://brainly.com/question/27873425

#SPJ4

Place the steps for creating a subfolder in the inbox and moving a message into the new folder in order.
Name the new folder.
Click the message.
Drag and drop in the
folder.
Select New Folder.
Right-click on Inbox.

Answers

Right-click on Inbox

Select "New Folder"

Name the new folder

Click the message

Drag and drop in the folder

T/F with a cell in edit mode, you can edit part of the contents directly in the cell and keep part, such as correcting a spelling error.

Answers

True (T).With a cell in edit mode, you can edit part of the contents directly in the cell and keep part, such as correcting a spelling error. While typing into a cell, if you click elsewhere in the worksheet, that's called canceling the edit of the cell. If you press the Enter key, the edit is finished, and the content of the cell is changed. If you press the Esc key, the cell's content remains the same and the edit is canceled.

With a cell in edit mode, you can indeed edit part of the contents directly within the cell while keeping the remaining content intact. This allows for making specific changes or corrections within the cell without overwriting or modifying the entire contents.

For example, if you have a cell with the text "The quick browwn fox jumps over the lazy dog," and you notice a spelling error in "brown," you can activate the cell's edit mode and directly modify only the misspelled word without retyping the entire sentence. Once you make the necessary correction, you can exit the edit mode, and the modified part will reflect the updated content while the rest of the text remains unchanged.

Learn more about edit mode

https://brainly.com/question/1250224

#SPJ11

Do the monthly payments fit in your budget? Could you save instead of borrow? Is it worth the added interest?

Answers

Because you wouldn't be able to pay off a new loan if you were paying, say, 90% of what you make each month toward your obligations, the aforementioned question is crucial.

Is saving money or borrowing money preferable?Start by asking yourself how quickly you need the item before determining whether to borrow it or save for it. Saving up is frequently the wisest course of action if it's not an emergency. If there is an emergency, look over your borrowing options and pick the cheapest one.It might be feasible to negotiate a lower price for a non-emergency big-ticket item by saving up and paying cash. A tried-and-true negotiating tactic with a lengthy history is "cash upfront." Although interest rates on savings accounts aren't very appealing right now, any interest is better than interest going out, so saving is at least somewhat superior than taking on debt.

To learn more about Saving money refer :

https://brainly.com/question/27254497

#SPJ1

the method used to transfer information to far off place instantly is called​

Answers

Telecommunication

Explanation:

Which example best describes an unethical use of computers?
A. Individuals create fake identities in order to trick recipients into
giving them money or private data.
B. Teachers record attendance, grades, assignments, and student
progress in a school database.
O C. High school seniors submit applications to colleges that include
their written essay responses.
D. A coach organizes players' positions on the field and the batting
order of the team.

Answers

a.) the rest is about work/business while a is about a hacker using computers in a unnecessary manner

Th most unethical use of computers is when individuals create fake identities in order to trick the recipients for giving money or private data. Thus, option A. is correct.

What is unethical behavior or use?

The unethical behavior or use means using the electronic device for wrong purpose. It is for performing such an activity that is against the rules of society and harmful for general public.

The computer can be easily used unethically by the hackers or computer experts for fetching personal data of general public. These hackers uses different and fake identities to target the innocent public easily.

Therefore, Option A is correct. The best example for an unethical use of computer is by the individuals who create fake identities.

Learn more about unethical behavior, here:

https://brainly.com/question/14701608

#SPJ5

A dog walks 10 km north in 2 hours and then 8 km south in 1 hour.

a) What is the dog’s average speed for the whole journey?

b) What is the dog’s average velocity for the whole journey?

Answers

Answer:

Average speed = 6 km/h and Average velocity = 0.67 km/h

Explanation:

Given that,

A dog walks 10 km north in 2 hours and then 8 km south in 1 hour.

(a) Average speed = total distance traveled divided by total time taken

Distance = 10+8 = 18 km

Total time = 2+1 = 3 h

Average speed = (18/3 )km/h= 6 km/h

(b) Average velocity = net displacement divided by total time taken

Let north is positive and south is negative

Displacement = 10+(-8) = 2 km

Total time = 2+1 = 3 h

Average velocity= (2/3 )km/h= 0.67 km/h

________is the most popular public key algorithm available and can be used for digital signatures, key exchange, encryption, and decryption.

Answers

Hello :D


The RSA public key is the most popular public key algorithm available and can be used for digital signatures, key exchange, encryption, and decryption

Answer:

RSA

Explanation:

Pretty sure it's RSA, hope this helps!

what features of Windows 10 available in Linux and OS X allow you to organize your open apps with in workspaces

Answers

Virtual Desktop is the features of Windows 10 available in Linux and OS X allow you to organize your open apps with in workspaces.

What exactly is a virtual desktop?

The desktop experience is segregated from the physical device used to access it in virtual desktops, which are preset images of operating systems and software. Remote users can use a network to access their virtual desktops.

What in Windows 10 is a virtual desktop?

A cloud-based desktop and app virtualization service is called Azure Virtual Desktop. What you can do when running Azure Virtual Desktop on Azure is as follows: Create a multi-session deployment of Windows 11 or Windows 10 that offers a complete Windows experience and scalability.

To know more about Linux visit

brainly.com/question/15122141

#SPJ4

what is it called when you squeeze the brake pedal until just before the wheels lock, then ease off the pedal, then squeeze again, repeating until you've reduced your speed enough.

Answers

The ABS system is reactive; when a wheel starts to lock up, it automatically lessens the braking pressure until the wheel regains grip.

How fast are Mbps?

Megabits per second, sometimes known as Mbps or Mb Mbits p/s, is the unit of measurement for broadband speeds. A megabit is one million bits, which are incredibly small pieces of data. Your internet activity should be faster the more Gbps (megabits per second you have available.

What Wi-Fi speed is faster?

Fast internet download speeds are defined as 200 Mbps downloading and 20 Mbps upload. The standard for high speed internet is now greater than ever, with average speeds of around 152/21 Mbps. Anything faster than 200 Mbps may support many internet users.

To know more about speed speed visit:

https://brainly.com/question/28224010

#SPJ1

HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!
Express the diagram in the form of a logic statement. [2]
P = ________________________
3. (a) Complete the truth table below for the logic circuit which is made up of NAND gates only.

HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!Express the diagram in the form of a logic statement. [2] P = ________________________3.

Answers

Answer:

different or difference between Dot-matrix and Daisy-wheel printer

Which of the following statements about Type I and Type II virtualization are true?
(Choose all that apply.)

A. In Type I virtualization, the hypervisor runs on top of a host OS.
B. In Type I virtualization, the hypervisor runs directly on the computer hardware.
C. In Type II virtualization, the hypervisor runs on top of a host OS.
D. In Type II virtualization, the hypervisor runs directly on the

Answers

The correct statements about Type I and Type II virtualization are: In Type I virtualization, the hypervisor runs directly on the computer hardware and In Type II virtualization, the hypervisor runs on top of a host OS. So, options B and C are correct answer.

Type I virtualization, also known as bare-metal virtualization, involves the hypervisor running directly on the computer hardware without the need for a host operating system. This allows for better performance and efficiency as the hypervisor has direct access to hardware resources.

Type II virtualization, on the other hand, involves the hypervisor running on top of a host operating system. This means that the hypervisor relies on the host OS for resource management and other functions. This type of virtualization is commonly used in desktop environments and is often referred to as hosted virtualization.

Therefore, options B and C are the correct statements about Type I and Type II virtualization.

To learn more about virtualization: https://brainly.com/question/23372768

#SPJ11

You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applications. To which unit is the salesperson referring?


a) computer case

b) peripherals

c) output devices

d) input devices

Answers

You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applications. The unit to which the salesperson is referring is: "output devices" (Option C)

What are Output Units?

The CPU is sometimes referred to as a processor or a microprocessor. The CPU is in charge of executing a program, which is a sequence of stored instructions. This application will accept input from an input device, process the input, and output the results to an output device.

In summary, a computer peripheral is any device that connects to the computing unit but is not part of the computing unit's fundamental design. Input devices, output devices, and storage devices, including dual input/output devices, are the three types of peripherals.

An input device in computing is a piece of hardware used to give data and control impulses to an information processing system, such as a computer or information device. Instances of input devices include keyboards, mice, scanners, cameras, joysticks, and microphones.

Learn more about Peripheral Units:
https://brainly.com/question/18994224

#SPJ1

what is not an example of a job skill

Answers

Being dishonest, irresponsible and unpunctual.Answer:

Explanation:

dishonesty, irresponsible, bad behavior

What best describes the purpose of the Occupational Safety and Health Administration (OSHA)?
to fine negligent employers and businesses
to provide safety equipment to businesses
to promote the use of hardhats at work
to protect the health and safety of workers

Answers

To protest the health and safety of workers

The main purpose of the Occupational Safety and Health administration is to protect the health and safety of workers

OSHA is an acronyms for Occupational Safety and Health Administration who's administration is mainly responsible for workplace safety.

Therefore, the Option D is correct.

Read more about OSHA

brainly.com/question/17667993

Jill is interested in a career as a paramedic. She is trained to use medical equipment, she remains calm under pressure, and she has good bedside manner. Which career pathway would best fit Jill's interests and skills?

Answers

Answer:

Emergency and Fire management services

Explanation:

Paramedics are trained to respond to emergency situations faced by the public. These could include, fire incidents, accidents, or other emergency situations. Paramedics are trained to be calm under pressure, to use medical equipment, as well as to have good bedside manners as their jobs might require taking care of victims of various incidents at the spot of crisis, or in ambulances before they arrive the hospitals.

So, Jill is likely interested in a career in Emergency and Fire Management Services because she would require these skills to succeed in this field.

Answer:

Emergency and Fire management services

Explanation:

Other Questions
Solving the quadratic equations using by completing the square. The span-wise flow is caused by the difference between the air pressure on top and beneath the wingand its direction of movement goes from:A) the top to beneath the wing via the leading edge.B) beneath to the top of the wing via the trailing edge.C) beneath to the top of the wing via the wing tip.D) the top to beneath the wing via the wings trailing edge Plz help meeeeey varies directly with x. If y = 15 when x = -18, find y when x = 1.6. Explain two reasons why buddhists want to be born in the heavenly realm A cylindrical barrel has a radius of 7.8 m and a height of 8.2 m. Doubling which dimension(s) will quadruple the volume of the barrel? heightneither height nor radiusboth height and radiusradius Need help with #1 and #2 Different segments of the project are delegated to respective functional units. this is called? he function of attitudes applies when a person is in an ambiguous situation and needs order, structure, or meaning. question 2 options: utilitarian ego-defensive value-expressive knowledge HELP PLSSSSSSExamine the figure below.Determine which of the following angle measures are correct. Select all that apply. Mais pencil is 24 cm long. She sharpens it, and it loses 1/8 of its length. How long is her pencil now? a grandfather is 9 times as old as his granddaughter. In 8 years, the grandfather will be 5 times as old as his granddaughter. How old is each of them now? what do you do when the person you love is dating you and every time you text you feel like your going to hyperventilate According to peter singer, those who do not give equal moral consideration to both human and nonhuman animals are guilty of. Which story does the speaker use to illustrate topic? mulan cinderella sleeping beauty fill in the table using this function rule Find xPls help me. shirt original price is $100 and is now 50% off what is the discount price now He dreamed they were with the knight again. all three of them riding the black horse through the cool, dark night. beyond the outer wall of the castle. and up over a moonlit hill. the dream was___?a.unusual b.scary c.silly d.sad Three examples of demand generators in determining where to place a hotel might be Group of answer choices Price, Hotel rooms within 1 mile, Hotel rooms within 3 miles Years hotel has been open, price, hotel reviews Accessibility, Room price, amenities Annual tourists, Distance to downtown, Accessibility Mrs. Gindy made chocolate-chunk cookies for 3 different bake sales, she placed 7 chocolate chunks on top of each cookie, if she purchased 2,400 chocolate chunks, how many cookies will she be able to make ?