Answer:
when creating presentations it is easier to follow a software because it is reliable and establishes status. Although a more manual method can be used too. now the rest depends on your skills. If I were to make a presentation I would use a software as it makes my work flow more efficient and easy
Explanation:
use a software is much much better because it can save your time make your works more afficient and easier
I was correcting my keyboard since the arrows had a qwerty swap, but I looked at the settings and realized I needed to change it, but I deleted the keyboard file and my keyboard stopped working, so I panicked. I'd be dead if my father saw the keyboard. What do i need to reinstall it?,,,
Answer:
Hi,
Try this linkhttps://certified.windowserrorhelp.com/automatically-update-device-drivers/?headline=%20Keyboard%20Drivers&logo=keyboard&gclid=CjwKCAjw5c6LBhBdEiwAP9ejG1lZr9EYilcRFp3KfYydybYMNfbWAC9-1cwynalo6vDN9R7D452qORoCC9cQAvD_BwE
Then download the thing.I promise it is secure.Explanation:
It helps reinstall and install driver updates for windows computers. Based on the way you talked about your keyboard it seems like you have a laptop. The link above will help you re-install and automatically update your keyboard driver. If you have a Mac or other Apple Computer you didn't delete it because Apple hardware has non-removable Drivers for their laptops. in this case there is probably a 3 party source affecting this, such as, heaven forbid, a virus, a corruption of internal storage, or a short circuit.
wap to sore two different variable a and b resoectively. Calculate sum
Answer:
Input : x = 10, y = 20;
Output : x = 20, y = 10
Input : x = 200, y = 100
Output : x = 100, y = 200
Explanation:
Pls give ME A BRAINLAIST
what the answer is have been stuck for 4 hours on this questoin its sience
Answer:
what the question?
Explanation:
All of the following can provide source data except a. a scanning device at the grocery store b. a utility bill received in the mail c. a bar code reader d. software to process the source data
Answer: A: a scanning device at the grocery store
Explanation:
what threat do insiders with authorized access to information or information systems pose
Answer:
Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.
what 3 types of data can be entered in a spreadsheet
Answer:
data, labels and formulas
The three types of data that can be entered in a spreadsheet are Number data, Text data and Logical data.
We are given that;
The spreadsheet
Now,
Number data: This includes any kind of numerical values, such as integers, decimals, percentages, dates, times, or phone numbers. Number data can be used in calculations and formatted in different ways.
Text data: This includes any kind of characters, such as letters, words, sentences, or symbols. Text data is used for labels, headings, names, or other information that is not numerical.
Text data cannot be used in calculations, but can be formatted in different ways.
Logical data: This includes only two possible values: TRUE or FALSE. Logical data is usually the result of a test or comparison, such as whether a condition is met or not.
Logical data can be used in formulas and functions that involve logical operators or conditions.
Therefore, by spreadsheet the answer will be Number data, Text data and Logical data.
To learn more about spreadsheet visit;
https://brainly.com/question/31511720
#SPJ6
Which statement correctly describes one aspect of the team's commitment at the end of PI Planning?
The statement that describes one aspect of the team's commitment at the end of PI Planning is a team does not commit to uncommitted objectives.
What does teams do in pi planning?PI planning are known to be a kind of face-to-face events that are held every 8-12 weeks after the former PI event was held.
In this event, a lot of teams do come together to map out, plan and set out the work that they needs to do, review backlogs, discuss which features will benefit them , form or update their product roadmap, and others.
Learn more about PI Planning from
https://brainly.com/question/6500846
when is not appropriate to be funny in a headline
Answer: I it is something serious like the death of a person then you should not be funny
will economists be replaced by artificial intelligence?
E SEQUENCE OF ACTIONS THAT ALLOWS YOU TO DOUBLE UNDERLINE A PIECE OF TEXT IN YOUR DOCUMENT IS: *
EDIT, INSERT, UNDERLINE, DOUBLE
FORMAT PARAGRAPH, UNDERLINE , DOUBLE
FORMAT, FONT, UNDERLINE STYLE, DOUBLE
FORMAT, FONT, SPACING, UNDERLINE STYLE, DOUBLE
What is a Font? I need help please
Answer:
This is the answer, see which is best suited
what can be deployed to intercept and log network traffic passing through the network?
Answer:
Packet sniffers are protocol analyzers that can be deployed to intercept and log network traffic passing through the network.
Explanation:
Who was your first video game crush? Be 100% honest!
Answer:
princess peach
Using robots to replace workers in factories is an example of which of the following forms of information processing systems? a. Commercial b. Control c. Scientific d. Industrial
Answer:
Industrial Robots
Explanation:
They are considered industrial robots because the word industrial has to do with an industry or a factory.
Also, industrial robots will replace the human workers
Hope this Helps
To free up human power for more difficult jobs, they are easily used to finish boring, repetitive, and physically taxing chores. This means that many low-skilled positions, like those in warehouses and on assembly lines, will be replaced by robots, endangering the employment of many low-skilled humans. Thus, option D is correct.
What using robots to replace workers in factories?Labour automation is the process of using technology instead of people to carry out particular tasks or jobs. Mechanization is a component of automation, but it also entails expanding it by using technology to further dehumanize work.
An automated conveyor would transport the product being manufactured from one stationary worker to the next until it was fully assembled, replacing the previous approach in which employees transported their pieces to a stationary assembly site.
Therefore, using robots to replace workers in factories is an example of Industrial forms of information processing systems.
Learn more about robots here:
https://brainly.com/question/15561225
#SPJ2
list the steps on how to apply bevel and emboss to a layer
Answer: 2123
Explanation:
ok
Provide 10 points for each question
What is Sophia (Robot) citizenship?
Why is Sophia (robot) a she and not a he
Features - what can Sophia (robots) do and not do, her limits
Public figure – why is she so popular in comparison to other robots
Events - name all events Sophia has spoken in
Controversy over hype in the scientific community – what are they
What is your opinion about Sophia, just a robot or human robot (explain your answer
with merits
Provide a legend of references and link it to each paragraph (cannot use Wikipedia
as a site) – foot note each references, even if it is in your own words
Answer:
1- Saudi arabia
Explanation:
what to do if you forgot your locked notes password
Answer:
what you can probably do is go to an Apple store and book an appointment with the Genius Bar and tell them your problem to see if they can help you recover your password.
i hope this helps :D
private void finishMap()
{
move();
turnLeft();
move();
move();
move();
takeBall();
takeBall();
turnLeft();
turnLeft();
move();
move();
move();
turnLeft();
}
}
for codeHS 1.5.5 mario karel what am i doing wrong?
Answer:
Where can I find Codehs answers?
You can view the solution for an assignment in multiple ways: Through the Assignments page.
...
To view solutions from the Assignments page:
Navigate to the Assignments page.
Click the '...' next to the assignment you wish to view the solution for.
Choose Solution and another page will open with the solution reference.
what are the advantage and disadvantage of super disk,in point???
urgently
Answer:look over this
Explanation:
https://en.wikipedia.org/wiki/SuperDisk
this endpoint does not support blobstorageevents or softdelete. please disable these account features if you would like to use this endpoint.
Answer:
A
Explanation:
Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.
What is content filtering ?Content filtering has been the process of the screening and or restricting access to objectionable email, webpages, executables, and other suspicious items using software or hardware. Filtering software can detect objectionable or criminal content, such as hate sites, illegal content, and social media.
As the part of their internet firewalls, businesses frequently employ content-based filtering, also known as information filtering. Content filtering, a common security measure, assists businesses in enforcing corporate policies regarding the use of information systems, such as the filtering and blocking of employee access to social media platforms.
Therefore, Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.
To learn more about content filtering , visit
https://brainly.com/question/13129235
#SPJ2
How to do a screenshot on your android phone?
answers/w explanation. ✅
nonsense answers, will be reported.
Plus, no links.
Answer:
Take a screenshot
- Press the Power and Volume down buttons at the same time.
- If that doesn't work, press and hold the Power button for a few seconds. Then tap Screenshot.
- If neither of these work, go to your phone manufacturer's support site for help.
Spreadsheets will be displayed as tables in presentations. True or False?
True
Explanation:
Tables and spreadsheets can only be inserted into slides with blank layout. Once a table or spreadsheet has been inserted into a slide it's formatting cannot be changed.
Answer: True
Explanation:
Help po thank you po
Answer:
hope helpful
Explanation:
a
c
b
c
d
have a great day
100 POINTSSSSSSS!!
Intellectual property laws were created because _____.
A. people have a right to their own intellectual property
B. people have no value for their own intellectual property
C. people have to get permission to own their intellectual property
D. people have to sacrifice their own intellectual property
Answer:
D
Explanation:
edg 2021
Answer:
A. people have a right to their own intellectual property
Explanation:
In your opinion., which Zelda character is the hottest? Be honest.
Answer:
link<3
Explanation:
you can resize a row in a table by dragging the ____.
Answer:
desk
Explanation:
You need more backround information i dont know what u talking about
What methods do you use when researching a complicated or difficult subject? What tools are most useful to narrowing down and validating your research? Explain your answers.
write F id the following is formatting tags, H for heading tags, S for structural tags, and SC if it belongs to a seperator/container tags.
1. <div>
2. <h1>
3. <head>
4. <strong>
5. <p>
6. <html>
7. <hr>
8. <center>
9. <h3>
10. <em>
Answer:
Here!
Hope this helps. Please mark brainliest!
What is a special kind of block that can only give two responses?
A.
forever block
B.
conditional block
C.
loop block
D.
Boolean value
Answer:
A. forever block
Explanation:
u dont need a explaination
Consider the binary number 1100.a) If you add a zero to the left of the number
(01100) does the value of the binary number change? Explain why or why not
with complete explanations
Answer:
no
Explanation:
The value represented by the added zero is 0·2⁴, which is of course 0.
In the unlikely situation where the binary number is only 4 bits wide, adding a value would be impossible.