Answer:
John should be holding down the "Ctrl" key instead of the "Shift" key.
Explanation:
"Ctrl" key must be held down when selecting multiple cells, not "Shift" key.
Hope this helps!
Answer:
John should be holding the "Ctrl" key instead of the "Shift" key
Explanation:
Stories used to be told only by:
OA. digitally recording them.
OB. saying them aloud.
OC. writing them down.
OD. drawing them on paper.
Answer:
OB. saying them aloud.
Explanation:
In the olden days, materials like recording devices, pens or paper weren't invented, so people had to know stories by heart.
What is it called when you use a specific piece of data, rather than a variable, for a value that should be able to change?
a.
debugging
b.
hard coding
c.
top-down programming
d.
data encoding
Answer:
data encoding
Which automatic startup option should you choose when windows' startup fails immediately after installing a new driver but before you have logged on again
Answer:
last known good configuration
Explanation:
If you're having difficulties starting Windows, the Last Known Good Configuration, or LKGC for short, is a technique to get it started. It loads the drivers and registry data from the last time you began and shut down your computer successfully.
Amelia wants to create a website using the Python computer language to code her site. She will also use CodeSkulptor3 to help her. CodeSkulptor3 is an example of a(n):
A.
browser-based code editor.
B.
online coding tutorial.
C.
code repository.
D.
web page hosting site.
Amelia wants to create a website using the Python computer language to code her site. She will also use CodeSkulptor3 is an example of browser-based code editor. The correct option is A.
What is python?Python is a programming language generally used to make websites and software. Automated tasks and data analysis are also carried out using python.
CodeSkulptor3 is also a browser-based Python interpreter. It has implemented a subset of Python 3.
Thus, CodeSkulptor3 is an example of browser-based code editor. The correct option is A.
Learn more about python.
https://brainly.com/question/19045688
#SPJ1
Which of the following statements is true of hackers? Check all of the boxes that apply.
They are sometimes differentiated into two types, called “gold hats” and “silver hats.”
Some hackers are criminals.
Some hackers do it as a form of protest.
Some hackers are network security professionals who want to improve the security of a network by identifying flaws.
Answer:
B. Some hackers are criminals
C. Some hackers do it as a form of protest
D. Some hackers are network security professionals who want to improve the security of a network by identifying flaws.
Explanation:
Edge 2022
The following statements are true of hackers: Some hackers are criminals, some hackers do it as a form of protest, and some hackers are network security professionals who want to improve the security of a network by identifying flaws. Thus, the answer would be options (B), (C), and (D).
What is hacking?Hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a harmful act, however, it is most usually linked with illicit activities and data theft by cyber-criminals.
Hacking is the exploitation of technology such as computers, smartphones, tablets, and networks to cause harm or corruption to systems, acquire information on users, steal data and documents, or disrupt data-related activity.
Hackers commit crimes and some hackers use it to express their protest. Some hackers are network security specialists who seek to enhance network security by uncovering flaws.
Therefore, the answer would be options (B), (C), and (D).
Learn more about the hacking here:
https://brainly.com/question/14835601
#SPJ5
Can someone give me an earsketch song of summer to turn in
Answer: This is not mine.
from earsketch import *
from random import *
init()
setTempo(120)
genre = readInput("Pick a genre: Hiphop, RNB, or Rock.")
if genre == ("Hiphop"): measure = []
fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 1, 5)
fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 7, 11)
fitMedia(CIARA_SET_DRUMBEAT_5, 3, 7, 11)
fitMedia(CIARA_SET_BASSLINE_2, 2, 7, 11)
setEffect(1, VOLUME, GAIN, 0, 4, -60, 6)
setEffect(1, VOLUME, GAIN, -60, 6, 0, 7)
fillDrum = CIARA_SET_DRUMBEAT_5
beat = "0+++0+++0-000+00"
index = randint(1,5)
for measure in range (1, 7, 1):
for index in range (index):
makeBeat(fillDrum, 3, measure, beat)
def myFunction(startMeasure, endMeasure):
fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)
myFunction(7, 11)
fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 10, 16)
fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 18, 22)
fitMedia(CIARA_SET_DRUMBEAT_5, 3, 18, 22)
fitMedia(CIARA_SET_BASSLINE_2, 2, 18, 22)
for measure in range(11, 18, 1):
makeBeat(fillDrum, 3, measure, beat)
def myFunction(startMeasure, endMeasure):
fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)
myFunction(17, 22)
fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 23, 27)
fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 29, 33)
fitMedia(CIARA_SET_DRUMBEAT_5, 3, 29, 33)
fitMedia(CIARA_SET_BASSLINE_2, 2, 29, 33)
for measure in range(22, 29, 1):
makeBeat(fillDrum, 3, measure, beat)
def myFunction(startMeasure, endMeasure):
fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)
myFunction(29, 33)
if genre == ("RNB"): measure = []
fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 1, 5)
fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 7, 11)
fitMedia(CIARA_SET_DRUMBEAT_1, 3, 7, 11)
fitMedia(CIARA_SET_BASSLINE_2, 2, 7, 11)
setEffect(1, VOLUME, GAIN, 0, 4, -60, 6)
setEffect(1, VOLUME, GAIN, -60, 6, 0, 7)
fillDrum = CIARA_SET_DRUMBEAT_1
beat = "0+++0+++0-000+00"
index = randint(1,5)
if measure in range (1, 7, 1):
for index in range (index):
makeBeat(fillDrum, 3, measure, beat)
def myFunction(startMeasure, endMeasure):
fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)
myFunction(7, 11)
fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 10, 16)
fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 18, 22)
fitMedia(CIARA_SET_DRUMBEAT_1, 3, 18, 22)
fitMedia(CIARA_SET_BASSLINE_2, 2, 18, 22)
for measure in range(11, 18, 1):
makeBeat(fillDrum, 3, measure, beat)
def myFunction(startMeasure, endMeasure):
fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)
myFunction(17, 22)
fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 23, 27)
fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 29, 33)
fitMedia(CIARA_SET_DRUMBEAT_1, 3, 29, 33)
fitMedia(CIARA_SET_BASSLINE_2, 2, 29, 33)
for measure in range(22, 29, 1):
makeBeat(fillDrum, 3, measure, beat)
def myFunction(startMeasure, endMeasure):
fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)
myFunction(29, 33)
if genre == ("Rock"): measure = []
fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 1, 5)
fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 7, 11)
fitMedia(RD_ROCK_POPELECTRICBASS_1, 3, 7, 11)
fitMedia(CIARA_SET_BASSLINE_2, 2, 7, 11)
setEffect(1, VOLUME, GAIN, 0, 4, -60, 6)
setEffect(1, VOLUME, GAIN, -60, 6, 0, 7)
fillDrum = RD_ROCK_POPELECTRICBASS_1
beat = "0+++0+++0-000+00"
index = randint(1,5)
for measure in range (1, 7, 1):
for index in range (index):
makeBeat(fillDrum, 3, measure, beat)
def myFunction(startMeasure, endMeasure):
fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)
myFunction(7, 11)
fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 10, 16)
fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 18, 22)
fitMedia(RD_ROCK_POPELECTRICBASS_1, 3, 18, 22)
fitMedia(CIARA_SET_BASSLINE_2, 2, 18, 22)
for measure in range(11, 18, 1):
makeBeat(fillDrum, 3, measure, beat)
def myFunction(startMeasure, endMeasure):
fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)
myFunction(17, 22)
fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 23, 27)
fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 29, 33)
fitMedia(RD_ROCK_POPELECTRICBASS_1, 3, 29, 33)
fitMedia(CIARA_SET_BASSLINE_2, 2, 29, 33)
for measure in range(22, 29, 1):
makeBeat(fillDrum, 3, measure, beat)
def myFunction(startMeasure, endMeasure):
fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)
myFunction(29, 33)
finish()
Explanation:
"Computer Science is no more about computers
than astronomy is about telescopes"
- Edsger W. Dijkstra
Answer:
si
Explanation:
Consider sending a stream of packets from host a to host b using ipsec. typically, a new sa will be established for each packet sent in the stream. true or false
Consider sending a stream of packets from Host A to Host B using Ipsec. Typically, a new SA will be established for each packet sent in the stream. True or False? Tweet Answer FALSE. REASON: Ipsec SA is first connect with Host A and Host B. So, all packets in the stream use the new SA.
Select the correct navigational path to set the print area of a worksheet
click the
tab on the ribbon to enter the page setup gallery
then, select the area you want to include in the print area.
then, select
to get into the correct section
in the drop-down menu, select
and release
intro
Printing is the appearance of the text on the paper in the form of ink. The correct blanks for setting the print area in the worksheet are page layout, print area, and set print area.
What is the navigational path?A navigational path is the steps of the process required to set a specific command and route to reach the output or the goal. For setting the printing area in the worksheet first select the page layout to enter the page setup gallery.
After selecting the area wanted to print, select the print area that leads to the correction section, then set the print area and release to complete the command. In this way, the printing area will be selected in the worksheet.
Learn more about navigation path here:
https://brainly.com/question/17194167
#SPJ1
Answer:
✔ Page Layout
✔ Print Area
✔ Set Print Area
Explanation:
hope this helps :)
who am I ?
please say me the answers
Answer:
motherboard
Explanation:
because it serves as a platform to connect all the other parts of the computer. it is where CPU, harddrive, optical drives and other expansion are directly connected.
How do you access a sample credit report and credit score? Once you have your credit report
and credit score, how do you go about interpreting them? What components are included in a
credit report?
Answer:
only good knows the answer son
Explanation:
True or false computers are an application of the on-off principle
Answer: True.
Explanation:
Computer circuits are binary in concept, having only two possible states. On or off. We cannot put them into a half awake half sleeping state like humans can be in. Therefore the answer is true.
What is your favorite comedy show?
Answer:
Saturday Night Live or The Tonight Show
Explanation:
what special problems can occur with wireless networks
what are the 3 components that make up the ribbon for microsoft?
Answer:
1. Quick access toolbar (QAT)
2. tabs
3. command buttons
Explanation:
hope this helps:)
Choose the terms that best complete the sentence.
a
usually has faster connection and transmission speeds than a
.
A local area usually has faster connection and transmission speeds than a Wide area.
What is local area address?The term LAN means Local Area Network as it is one that helps to link shared resources and Internet connection.
Note that A local area usually has faster connection and transmission speeds than a Wide area as it covers only a small area of place.
Learn more about local area from
https://brainly.com/question/25192887
#SPJ1
Functions in Excel are grouped for easy reference. Locate the Insert Function button (Fx button) to bring up the Insert Function dialog box. How many different ways exist to look for a function
Following are the different ways that exist to look for a function,
Option 1: Insert function button (Fx button) on the Formulas ribbon.
Option 2 : More Functions from arrow near Auto sum icon on Home ribbon.
Option 3: Function Library on the Formulas ribbon.
Option 4: Shift + F3
Option 5: Enter = followed by first letter of the function.
What it does -
This function returns the number of whole working days between two dates with custom weekend parameters.
What it needs -
1. Start date, End date, Weekend (Optional), Holidays (Optional)
2. If start date later than end date, then value will be negative.
3. Enter date in specified format.
What is Excel?Excel uses a large collection of cells formatted to organize and manipulate data and solve mathematical functions.
Learn more about excel here,
https://brainly.com/question/21382498
#SPJ1
What is the difference between a general ai as opposed to a specialized ai?.
Explanation:
thanks don't forget to follow narin po salamat
Maxie created a presentation about cats, and she would like her teacher to critique her. Which critique item will help her know if the audience could hear her well?
Group of answer choices
Are you speaking loud and clear?
Are you using facial expressions?
Are you focusing on your topic?
Are you speaking at a good pace?
Answer:
Are you speaking loud and clear?
Explanation:
If she is speaking loud and clear that probably mean they can hear her.
Which of these would you least expect to find at an fbla-pbl meeting?
planning a community service project
role-playing to develop leadership skills
students working on iste certification
working with local business leaders
role-playing to develop leadership skills
A list of numbers has n elements, indexed from 1 to n. The following algorithm is intended to display true if the value target appears in the list more than once and to display false otherwise. The algorithm uses the variables position and count. Steps 4 and 5 are missing. Step 1: Set count to 0 and position to 1. Step 2: If the value of the element at index position is equal to target, increase the value of count by 1 Step 3: Increase the value of position by 1 Step 4: (missing step) Step 5: (missing step) Which of the following could be used to replace steps 4 and 5 so that the algorithm works as intended? A) Step 4 Repeat steps 2 and 3 until the value of position is greater than n. Step 5 If count is greater than or equal to 2, display true. Otherwise, display false. B) Step 4 Repeat steps 2 and 3 until the value of position is greater than n. Step 5 If count is greater than or equal to position, display true. Otherwise, display false. C) Step 4 Repeat steps 2 and 3 until the value of count is greater than 2. Step 5 If position is greater than or equal to n, display true. Otherwise, display false. D) Step 4 Repeat steps 2 and 3 until the value of count is greater thann. Step 5 If count is greater than or equal to 2, display true. Otherwise, display false.
The option which could be used to replace steps 4 and 5 so that the algorithm works as intended is: option D.
What is an algorithm?An algorithm can be defined as a standard formula (procedures) which is made up of a set of finite steps and instructions that are executed on a computer system, so as to enable a software solve a particular problem under appropriate conditions.
In this scenario, the options which could be used to replace steps 4 and 5 so that the algorithm works as intended by the programmer are:
Step 4: Repeat steps 2 and steps 3 until the value of position is greater than n.Step 5: If count is greater than or equal (≥) to 2, display true. Otherwise, display false.Read more on algorithm here: brainly.com/question/24793921
#SPJ1
which metric reports on how often a channel contributes to a conversion prior to last-click attribution?
Which metric reports on how often a channel contributes to a conversion prior to last-click attribution? Assisted conversion; Primary conversion; Last-click attribution; Second-to-last-click attribution .
The ipv6 address fields are 128 bits long, and as such there is no need to extend ip addressing by using either dhcp or nat (i.e., these protocols become obsolete). true false
Answer:
True
Explanation:
according to coursehero it's true
The ipv6 address fields are 128 bits long, and as such there is no need to extend ip addressing by using either dhcp or nat (i.e., these protocols become obsolete, its true.
An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint machine in an Internet Protocol Version 6 (IPv6) network. IPv6 is the beneficiary to a previous addressing infrastructure, IPv4, which had limitations IPv6 was created to overcome.
What is IPv6 explained?IPv6 is an Internet Layer protocol for packet-switched internetworking and gives end-to-end datagram transmission across multiple IP networks, closely sticking to the design principles set in the previous performance of the protocol, Internet Protocol Version 4 (IPv4).
What are the IPv6 address types?The three types of IPv6 addresses are unicast, anycast, and multicast.
Unicast addresses specify a single interface.
Anycast addresses specify a set of interfaces in such a way that a packet sent to an anycast address is delivered to a component of the set.
To learn more about Internet Layer protocol, refer
https://brainly.com/question/5296366
#SPJ2
When sending a group email, how do you ensure that one or several recipients cannot see the names of other recipients?.
When sending a group email, to ensure that one or several recipients cannot see the names of the other recipient, add a Bcc box to your emails.
What is Bcc and cc field in an email?Bcc and cc is a facility in sending an email to multiple people at one time. Bcc is added when sending multiple people, the same mail, but without knowing people the name of each other.
Cc is a field added when people can see the names of people who else got the mail.
Thus, to ensure that one or several recipients cannot see the names of the other recipient, add a Bcc box to your emails.
Learn more about Bcc and cc field
https://brainly.com/question/20525279
#SPJ1
A student made a model of isostasy by placing a block of wood in a beaker of water. what does the wooden block represent in the model?
a. a glacier
b. earth's crust
c. sea level
d. earth's mantle
Answer:
D) Earth's mantle
Explanation:
____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.
Answer:
Network forensics
Explanation:
hide the most valuable data at the innermost part of the network.
________ speeds time to insights and enables better data governance by performing data integration and analytic functions inside the database.
In-database analytics speeds time to insights and enables better data governance by performing data integration and analytic functions inside the database.
Charlotte is using her teaching skills to train new employees on how to use software. the software is typically used in the engineering and technology pathway. which additional skill is she most likely using? mechanical knowledge persistence computer-aided design skills creativity
Answer:
Explanation:
c
If “A” represents in binary 10011001, what will be the value of word “CAB”?
Answer:
01000011 01000001 01000010
Explanation:
You can convert to and from binary and the base-10 system typically used by humans. You can also convert to and from binary and hexadecimal where you need four digits of binary to represent one digit of hex. Converting to and from binary and octal is another possibility. It takes three binary digits to represent an octal digit. Binary 000 is octal digit 0.
A ____ is an outdated and inefficient networking device that accepted signals from a transmitting device and repeated those signals to all other connected devices in a broadcast fashion
Answer:
Hub
Explanation:
A hub is an inefficient old device that broadcasts a given message to all nodes connected to the interfaces on it. It has a high security risk.