The Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.
What is power point presentation?Power point presentation is a softwere which display the data with the help of collection of slides.
Isabela wants to edit a presentation for her science class. She is in the main view of the powerpoint application.
Form the main view to access her presentation, Isabela need to follow the following steps-
Click the file tab which is at the main menu.Now she need to click the open option, which appers under the file tab.Thus, the Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.
Learn more about the power point presentation here;
https://brainly.com/question/24653274
Answer: It’s B, Click the File tab, and click the open option
Explanation:
just got it right on edge
Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated
Answer:
class Foo:
def F(self, n):
if n == 1:
return 1
return self.F(n - 1) + 3 * n - 2
Explanation:
This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.
def F(n):
if n == 1:
return 1
return F(n - 1) + 3 * n - 2
Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!
You can access elements in a list by using an index the same way that you can index a character from a.
One can access elements in a list by using an index the same way that you can index a character from indexing into the string.
What is String Indexing?Strings are known to be a form of ordered method of character data, 00:15 and the specific characters of a string.
They can be accessed straight through the use of numerical index. String indexing in Python is known to be a kind of zero-based in nature.
Learn more about indexing from
https://brainly.com/question/4692093
_________ is a method of encoding data so that it is unreadable to unauthorized individuals. The data can only be decoded if the receiver of the encoded message has access to a special key.
Answer:Encryption
Explanation:I took my test for CIS 110 and guessed and got this question right.
A class researching the world’s population would like to include a graph that shows historical changes. They have information from several online media resources.
Which options should they choose during their evaluation process? Check all that apply.
a teacher’s aide who creates world population materials for a class
a professor who publishes world population research in a journal
a United Nations report that analyzes trends in the world’s population
a nonprofit that tracks how the world’s population affects policy decisions
a local news program that evaluates why some countries are overpopulated
A professor who publishes world population research in a journal
Answer:
b,c,d
Explanation: i took the test and bc im awsome
Differentiate between
Operating system and
language translator
Dose brainly give you notifications on you're phone when you go into the site
Answer:
Yep it does ^_^
A cybersecurity specialist facilitates penetration testing by using functional exercises. The specialist decides to use a war game approach and create teams. Which team operates the security system
The team that should operates the security system is the blue team.
What is war gaming strategy?In a war game approach, the teams of the senior managers of a firm is said to often play their own firm, and they do make selection of any group of its competitors and marketplace.
Note that this form of exercise is said to help simulates a composition of business conditions and gives a lot of lessons and guidance for the main thing. Note also that the blue team do defend the system against and responds to any form of attack from the red team.
Learn more about cybersecurity from
https://brainly.com/question/26260220
define a touch-sensitive pad and state one use
Answer:
A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.
Explanation:
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?.
Please help me on this it’s due now
I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.
Definition:
Logistics Manager: person in charge of overseeing the purchasing
and distribution of products in a supply chain
Material Handlers: responsible for storing, moving, and handling
hazardous or non-hazardous materials
Inventory Managers: oversee the inventory levels of businesses
Hope that helps!
Linux provides technology that allows the user to remotely view a graphical user interface and control mouse and keyboard events.Which of the following technologies establishes a connection with a remote computer using a viewer on one end and a server on the remote end? XRDP VNC SPICE
Answer:
I think it would probably be VNC
Explanation:
I have a linux, and it doesn't have the other two, and VNC is all about connections between computers.
Which service works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends
The service that works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends is target tracking.
How can I employ Predictive Scaling with target tracking?Predictive Scaling works is known to be one that works in line with target tracking. They both help to make one's EC2 capacity to change more better to one's incoming application traffic.
Note that target tracking scaling policies is one where a user has to select a scaling metric and set a target value.
Learn more about Autoscaling from
https://brainly.com/question/17661222
Which ready-to-use features do WYSIWYG editors offer?
A.
meta tags
B.
database
C.
HTML tags
D.
web host
E.
image gallery
Answer:
C. HTML tags
Explanation:
In computing, WYSIWYG, an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed.
How do we ensure that future technologies are fair to society? IT professionals and governments must follow ethical principles in the creation of new technology. IT professionals and governments must follow ethical principles in the creation of new technology. It is not possible to utilize ethical principles when creating new technology. It is not possible to utilize ethical principles when creating new technology. Allow the IT industry to regulate itself. Allow the IT industry to regulate itself. Encourage IT professionals to apply current laws and regulations.
To ensure that future technologies are fair to society, IT professionals and governments must follow ethical principles in the creation of new technology and also apply current laws and regulations.
What is technology promotion?The use of technology is one that can promote student zeal by given them a form of positive experiences.
Note that to make sure that future technologies are fair to society, IT professionals and governments have to follow all ethical principles in the development of new technology and also they should use the current laws and regulations that are governing IT technologies.
Learn more about technologies from
https://brainly.com/question/25110079
Explain the relative advantages and disadvantages of an embedded OS based on an existing commercial OS compared to a purpose-built embedded OS.
The relative advantages of an embedded OS based on an existing commercial OS is known to be a lot and it is given below.
What are the Advantages of an embedded OS based on the above scenario?The embedded OS is known to be gotten from a commercial general-purpose OS and as such, it is often based on a composition of familiar interfaces, that boast portability.
Note that It is very fast and can be predict a lot when compared to the purpose-built embedded OS that is often used in an embedded system.
Disadvantages of an embedded OS based on based on the above scenario?This general-purpose OS is known to be not optimized in terms of real-time thing and in terms of embedded applications.
Based on this a lot of modification is often needed to achieve good performance.
Learn more about commercial OS from
https://brainly.com/question/3837126
Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas
Answer:
The answer is ( D ) I hope this answers your question
In the Linux boot process, the master boot record (MBR) loads a(n) __________ program, such as GRUB or LILO
Answer:
Boot loader
Explanation:
This is a small program that is stored within the MBR or the GUID partition table that is used to help load in an operating system into the memory
write a program to calculate sum of first ten natural numbers
Answer:
Explanation:
total = 0
i = 0
while i<=10:
total = i +total
print(total)
Which example best describes an impact of computers on the economy?
A. Bullying on social media has increased dramatically and across
multiple platforms.
B. Some local businesses have closed because they couldn't
compete with large online sellers.
C. Apps give points for purchases that buyers can use to obtain
discounts.
D. A platform designed to make all user content publicly available
creates privacy issues.
Answer:
B
Explanation:
The reason I say "D" is not the answer because I put the answer in and it was wrong.
Which method of funding higher education accrues interest until it is paid back?
A. Scholarships
B. Grants
C. Work-study programs
D. Loans
Answer:
D. Loans
Explanation:
C-13 You just got a call from the University system administrator, who says that either you or your roommate is issuing denial-of-service attacks against other students from your shared network segment. You know you are not doing this, but you are unsure about your roommate. How can you tell if this accusation is true or not
Answer:
take a subtle aproach
Explanation:
[C Pointer] Not all arithmetic operations may be performed on pointers. For example, you cannot ________ or _______ a pointer.
It is not all arithmetic operations may be performed on pointers. For example, you cannot multiply or divide a pointer.
What arithmetic operations cannot be done on pointers?We cannot carry out all type of arithmetic operations with the use of the pointers.
Note that the Pointer arithmetic is said to be a little bit different from arithmetic we normally use and as such, the only used arithmetic operations applicable on pointers are known to be the addition of numbers.
Learn more about arithmetic operations from
https://brainly.com/question/4721701
A construction company is in charge of building a house for a client. The construction company completes the project, and then invites the client to take a look at the house. The client looks at the house and is unhappy with the final outcome and wants it redone. What could the construction company have done better?”
Answer: The construction company could have drawn a 3D model on a CAD app.
Explanation: This would help the blueprints look more realistic and easy to measure the leangths.
The master program that manages how other software can use the computer hardware is called the:.
the master program that manages how other softwares use the computers hardware is called the bios
The following flowchart symbol is used to repeat instructions:
A. Rectangle
B. Square
C. Circle
D. Hexagon
d
Explanation:
⇛σ=
n
∑f(x−
x
)
2
Find f(x-x^-)²
It's
313.29+806.45+474.32+72.9+58.19+532.9+605.16+0+497.29
3360.5
Now
\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{\dfrac{3360.5}{50}\end{gathered}
\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{67.21}\end{gathered}
⇛σ=
67.21
\begin{gathered}\\ \rm\Rrightarrow \sigma=8.2\end{gathered}
⇛σ=8.2
Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?
a. Each person needs to send email with his/her part of the project individually every day
b. Each person should be on a cloud folder and sync their files as they are working through their project
c. Each person needs to send a group email to the team as soon as any updates are completed
d. Each person should post their updated information on a team website so it is available for anyone to see
The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.
What is cloud computing?Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.
In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.
Read more on cloud computing here: https://brainly.com/question/19057393
which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website
a customer willl borrow
Answer: C. the PC
Explanation: The motherboard is not included in the passage
Time machine could not create a local snapshot to back up from
Answer:
Time machine could not create a local snapshot to back up from Disk Error.
The way in which information travels on the internet, not as a single piece but in chunks.