Answer: signature block
Explanation:
Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?
On the Insert tab, click the Insert New command.
On the Insert tab, click the Add New command.
On the Home tab, click the New Slide command.
On the Home tab, click the Arrange command.
Answer:
C on edg
Explanation:
I just took the review
Answer:
On the Home tab, click the New Slide command
Explanation:
nappropriate use of technology makes it easier for cyber bullies to
others.
How do you answer a question on here
The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, then the IP address is sent to the web (host) server. What is the final step in the DNS process? The client sends a request to the DNS server. The DNS server translates the IP address back to the URL. The process starts over at the beginning. The web server sends the information back to the web browser.
Answer:
The web server sends the information back to the web browser.
Explanation:
The DNS look up is the process that happens when we type a URL into the browser gets converted into an IP address that's used to locate the website's servers. Then when this query reaches a final server, it is returned back to the computer with the data that we need.
So the final step in the DNS process is the web server sends the information back to the browser.
I hope this answer helps.
A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that accomplished this?
John William Mauchly
Charles Babbage
Sir John Ambrose Fleming
Herman Hollerith
Answer:
The answer to this question is given below in the explanation section. the correct answer is Herman Hollerith.
Explanation:
Charles Babbage (incorrect)
Charles Babbage considers the father of the digital computer. He was a mathematician, philosopher, inventor, and mechanical engineer, Babbage originated the concept of a digital programmable computer. But he died on 18 1, 1871. so, this option is not correct.
John William Mauchly (Incorrect)
John William Mauchly was an American physicist who, along with J. Presper Eckert, designed ENIAC, the first general purpose electronic digital computer, as well as EDVAC, BINAC and UNIVAC I, the first commercial computer made in the United States. But John William Mauchy born on August 30, 1907 and died on January 8, 1980. So, this option is not correct.
Sir John Ambrose Fleming (Incorrect)
Sir John Ambrose Fleming was an English electrical engineer and physicist who invented the first thermionic valve or vacuum tube, designed the radio transmitter with which the first transatlantic radio transmission was made, and also established the right-hand rule used in physics.
Herman Hollerith (correct)
Herman Hollerith was an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting. This machine is patented in 1884.
plssssssssssssssssssssssssssssssssssss help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
John is the yearbook president and is searching for computer storage that will have the most memory to save articles and pictures for the yearbook. What form of storage should John use?
Cloud storage
External hard drive
Floppy disk
USB flash drive
Answer:
flash drive, protects data
Answer:
USB flash drive
Explanation:
A USB flash drive would be used since most flash drives that are used nowadays can use up to 2 Terabytes. That's as of dates back in 2018, and Terabytes are the fourth largest " Byte " in the virtual world. USB flash drives are also commonly used to save projects and having the ability to plug it into one computer, save it, unplug it, and bring it to another computer to download the files and work on it at home. As a Graphic Designer, we use these all the times, hopefully this helps! :)
classify the situation example
What is a firewall
A. A type of connector often used for real time applications
B. A type of connector used for coaxial cable
C. A type of connector used to connect devices to the serial port on a computer
D. A type of connector used for fiber optic cable
Answer:
A. A type of connector often used for real time applications
As new technological systems develop, old systems become obsolete.
False
True
Answer:
true
Explanation:
Give me atleast 10 common shorcut keys that is often use while working in computer
Answer:
1. Ctrl T = opens a new tab
2. Ctrl W = closes a tab
3. Ctrl P = print you screen
4. (for Microsoft users^^) Windows + G = for the Xbox Game Bar
5. Windows + Alt + R = to start recording and to end recording
6. (my personal fav <3) Ctrl + Shift + N = incognito
7. Ctrl Z = undo
8. Ctrl X = cut
9. Ctrl C = copy
10. Ctrl V = paste
Hope This Helps
Barry-
The 10 common shortcut keys that are often used while working on the computer are as follows:
Alt + F: File menu options in the current program.Alt + E: Edits options in the current program.F1: Universal help (for any sort of program).Ctrl + A: Selects all text.Ctrl + P: Print the document. Ctrl + X: Cuts the selected item.Ctrl + Del: Cut selected item.Ctrl + C: Copy the selected item.Ctrl + V: Paste the selected item. Alt + Tab: Switch between open apps. What is the significance of shortcut keys?The significance of shortcut keys is determined by the fact that they are used to perform a menu function or other common functions in a program or operating system at a very fast and rapid speed. It makes the process easier and faster.
Keyboard shortcuts are generally used to expedite common operations by reducing input sequences to a few keystrokes, hence the term "shortcut". They make the entire process more efficient and productive.
To differentiate from general keyboard input, most keyboard shortcuts require the user to press and hold several keys simultaneously or a sequence of keys one after the other.
Therefore, the 10 common shortcut keys that are often used while working on the computer are well mentioned above.
To learn more about Shortcut keys, refer to the link:
https://brainly.com/question/28959274
#SPJ2
Based upon what you know
about networks, explain why
computers are more useful
when they are connected to the
internet
Answer:
A network allows sharing of files, data, and other types of information giving authorized users the ability to access information stored on other computers on the network. Distributed computing uses computing resources across a network to accomplish tasks.The ISP provides a bridge between your computer and all the other computers in the world on the Internet. The ISP uses the TCP/IP protocols to make computer-to-computer connections possible and transmit data between them.
Explanation:
Professionals workers can communicate their insights, concepts as well as produce better results thanks to networking. A further explanation is below.
Networks enable consumers to interact via e-mail, journals, unified communications, as well as other means. This boosts their performance but instead raises the organization's or business's revenue.Teachers may use networks to accomplish improved online teaching materials and paperwork from either a variety of places, including numerous classes, administrative centers, including their residences.
Thus the above answer is right.
Learn more about networks here:
https://brainly.com/question/5048040
Andreas wants to insert an element into an email that will graphically display the values in a table. Which option should he choose?
table
hyperlink
SmartArt
chart
Answer:
D. chart
Explanation:
Correct on edg
Answer:
d
Explanation:
took the test
PLEASE HELP ME ANSWER AS MUCH AS YOU CAN I ONLY HAVE 3 POINTS LEFT AND IM TIMED. PLEASE TELL ME THE NUMBER AND LETTER. THANK YOU!!!!!!!!!!!
1. Read the excerpt from a student’s report.
I was honored to be a part of an online group of students from the United States, Africa, and China seeking solutions to water shortages. While we all had great enthusiasm about changing the world, the project quickly dissolved because no one was willing to listen to differing viewpoints.
Which line could be added to show the difference a digital leader can make?
A. We agreed as a group to spend some time studying each other’s country and meet again at a later date.
B. We saved the project by allowing each group to share their thoughts and then chose the best solutions.
C. We decided to disband and seek solutions with students from other countries who shared our viewpoints.
D. We thought it would be best to stop meeting until our cultural differences can be addressed.
_______________________________________________________
2. Electronic medical charts make it easier for doctors to
A. share information on patients with other doctors.
B. share information on patients with the government.
C. communicate with patients about medical issues.
D. track infectious diseases through a database.
______________________________________________________
3. Which is the best example of collaboration in a digital environment?
A. Students meet in-person at a local library.
B. Students work together on a project from a distance.
C. Students work independently on a project from a distance.
D. Students meet in a classroom to research a project.
_______________________________________________________
4. In addition to talking to other doctors remotely, telehealth technology
A. allows patients and doctors to talk online.
B. gives doctors the ability to keep people healthier.
C. eliminates the need for doctors to see patients.
D. allows patients to self-diagnose using the Internet.
Answer:
1. A We agreed as a group
2. C Communication
3. C Students work independently
4. C Elimination
Explanation:
sorry it wouldnt work unless i typed answers too
Aika has several labeled folders for different parts of his research. What is the MOST likely reason he does this? He wants to make sure that all of the topics are researched equally. He wants to avoid accidentally forgetting to research one of the topics. He wants to easily and quickly find specific bits of research that cover certain topics. He wants to make his research easier to read than it would otherwise be.
Answer:
He wants to easily and quickly find specific bits of research that cover certain topics.
Explanation:
Remember, a research work typically has these 6 (six) components:
The Abstract.IntroductionMethodologyResultsDiscussionReferences.Thus, Aika's decision to label several folders for different parts of his research would make it easier and quicker for him to find specific bits of research that cover certain topics, instead of spending time looking for topics.
Which of the following was the most widely used personal computer application until the mid 90s
Answer:
word processing
Explanation:
I just took the test
Word processing was the most widely used personal computer application until the mid 90s. The correct option is B.
What is word processing?A word processor is a tool or computer application that allows for the entry, editing, formatting, and output of text. It frequently includes some extra functionality as well.
Current word processors are word processor programmes operating on general purpose computers as opposed to the standalone machines that the earliest word processors were.
A word is the natural unit of data used by a specific processor design in computing. A word is a fixed-sized data that the processor's hardware or instruction set treats as a single unit.
Up until the middle of the 1990s, word processing was the most frequently used personal computer programme.
Games
Word processing
Internet
United States census
This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
Device A is attempting to send data over the Internet to Device E. Which of the following is true of how the data will travel through the network?
A. The data will always travel through Device B as it is the shortest path
B. The data will never be sent to Device G since there are other shorter paths available
C. It is possible that the data travels through any of the devices in the network before arriving at device E
D. If the data travels through Device D then it will not travel through Device B
Answer: C
Explanation: had an assignment and this was the answer
Network is the connection of multiple computer or devices.
The true statement is that: (c). It is possible that the data travels through any of the devices in the network before arriving at device E
From the diagram, we have the following observations:
Devices B, C and D are connected directly to ADevices E, F and G are connected to either B, C or DThe above analysis means that, the devices are interconnected.
So, the data from A can travel through any of the devices to get to its destination at E.
Hence, the correct option is (c).
Read more about computer networks at:
https://brainly.com/question/11672306
Why is user testing an important pat of the design process?
a) it helps you understand how the game is designed.
b) it helps you know how people use your game and what parts to improve.
c) it helps determine if team members are working well together.
d) it tells you how much people will pay for your game.
Answer:
The answer is A) it helps you understand how the game is designed.
Explanation:
User testing an important pat of the design process because it helps you understand how the game is designed. Thus, option A is correct.
What is a Game Deconstruction?Deconstruction doesn't technically mean "demolition"; rather, it refers to "breaking down" or "analyzing" something (particularly the words in a work of fiction or nonfiction) to determine its ultimate significance, which is allegedly nearly never exactly what the creator intended.
A typical deconstruction procedure starts by removing the building's windows, doors, appliances, and finishes, many of which can be recycled or sold again. The building is then taken apart, typically starting at the top and working down to the foundations.
Therefore, A "deconstruction" in games is a process that broadly refers to applying a rigorous, critical, and analytical examination to a work of media or art, frequently by disassembling it to better understand its constituent elements and how they interact.
Learn more about deconstruction process from
brainly.com/question/26087397
#SPJ6
can anyone do electrical work if they posses the skills necessary??
Answer:
yes
Explanation:
Attributes of an electrician
Good communication and people skills. ...
Ability to work in a team or independently. ...
Problem Solving. ...
Basic Maths Skills. ...
Good English skills. ...
Understanding of regulatory requirement.
Which option is used to insert a table in PowerPoint from another Office application?
In the Insert Object dialog box, choose Create from file.
In the Design tab, choose the Table Styles option.
In the Insert Table dialog box, choose Insert Table.
In the Layout tab, choose the Merge option.
Answer:
Its A
Explanation:
I just took it on edg
Repl.it Assignment 4.1.2 (Guess the Number)
Please help me
I will give brainliest and a like
Analyzing Uses for PDFs
A PDF file would most likely be used for which situation?
O You need to e-mail more than one file to a friend.
O You want someone to make a lot of edits to a file.
You need to send a file to someone who does not have Word.
O You want to save and print several copies of a file.
Answer:
You need to send a file to someone who does not have Word
Explanation:
In this case the answer is You need to send a file to someone who does not have Word.
But we use PDF to send files without changing its format.
Answer:
You need to send a file to someone who does not have Word
Explanation:
Instructions
Click the links to open the resources below. These resources will help you complete the assignment. Once you have created your
file(s) and are ready to upload your assignment, click the Add Files button below and select each file from your desktop or network
folder. Upload each file separately.
Your work will not be submitted to your teacher until you click Submit.
Documents
Ways to Organize Text - Student Guide
Creation and Management of Lists - Student Guide
Insertion of Symbols Special Characters, and Images - Student Guide
File Upload
Accepted file types: .ppt, .pptx, xls, xlsx, doc, .docx, zip, pdf, .accdb, msg
Add Files
*
Delete All
Why is it difficult to detect a Trojan horse?
Answer:
Explanation:
Because the virus disguises it self as something you are trying to download, then it attackes your device
Answer:
Since Trojan horses frequently appear disguised as legitimate system files, they are often very hard to find and destroy with conventional virus and malware scanners. ... The computer's antivirus and antimalware programs will be disabled and the necessary steps to remove malware will be inaccessible.
Explanation:
In general, a Trojan comes attached to what looks like a legitimate program. In reality, it is a fake version of the app, loaded up with malware. ... One form of Trojan malware has targeted Android devices specifically. Called Switcher Trojan, it infects users' devices to attack the routers on their wireless networks.
. If you had a job that Drill holes in the earth in search of water, what Career
Cluster would you be working in?
Answer: architecture and construction
Verified ✅ I have no explaination if i have one i will put it hear soon as possible
Hope this helps :)
If your job was to drill holes in the earth in the search for water the career that best work will be architecture and the construction.
What is a career cluster?A career cluster is a group of related types of work that gives us an easy way to explore various type of careers in a broad category.
A cluster like the health care and construction or as in the case of the above cluster of architecture and construction engineers would be the best fit as it will help to understand the earth's internal structure.
Find out more information about the career cluster.
brainly.com/question/24613213
what is thesaurus?what do you mean by spell chek feature
Answer:
Thesaurous is a book that lists words in groups of synonyms and related concepts.
A Spell Checker (or spell check) is a Software feature that checks for misspellings in a text. Spell-checking features are often embaded in software or services, such as word processor, email client, electronic dictionary, or search engine.
My iOS 14 homeschool not decorate its plain and looks how it was before I don’t have have to spend hours decorating I’m not creative for the ones who did theirs ya really doing tang for what
Answer:
No ONe cares about your ios 4 software
Explanation:
I just don't care
What are the problems with security when working on a Web Page?
Answer:
Hackers are sometimes able to exploit vulnerabilities in applications to insert malicious code.
Explanation:
Answer:
Depending if you have a virus already on your computer then your security risk on opening a new web page may be high
If not the security risk would be low
but to sum it up It really depends what your default search engine is
rn i use DuckDuckGo and i posted a Screen shot (if ur using chrome this extension can be added) and google (not saying its bad) but it has a risk for you security.
I really hope this helps
High Hopes^^
Barry-
Complete each statement by choosing the correct answer from the drop-down menu.
The data type can hold whole positive and negative numbers.
The terms TRUE and FALSE are usually associated with data types.
Values such as 9.0, –1245.1, and 0.777 are examples of data types.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct matching answers for this question are given below. In this question, it is asked to identify the data type of the given scenario.
Integer short and integer long data type:
These data types can hold whole positive and negative numbers. however, you can also store positive and negative values in float and double data type also.
Boolean data type:
Boolean data type usually stores true or false values such as yer or no, true or false etc. It stores binary values i.e 1 or 0.
Float and Double data type: float and double data type can store positive and negative numbers with decimals. But, the float data type can store 4 bytes of data and sufficient for storing 7 decimal digits. while double data type has a size of 8 bytes of data and sufficient for storing 15 decimal digits.
However, for the given scenario in the question, the float data type can accomodate these values easily.
Answer: Integer, Boolean, Floating-Point!
Explanation:
I did it edge 2020
Why do you think they added the wait .5 seconds block?
Answer:
Satisfaction
Explanation:
People enjoy the sensation of the computer doing something and the feeling that the program is advanced.
This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
What is the MINIMUM number of paths that would need to be broken to prevent Computing Device A from connecting with Computing Device E?
A. 1
B. 2
C. 3
D. 4
Answer:
3
Explanation: