Kerrri uses a database file many time a day. To increase her productivity, she should___.

A. Put it in her My Music folder
B. Move the file to the system tray
C. Create a toolbar for this file
D. Create a shortcut on the desktop to the file

Answers

Answer 1

Answer:

D

Explanation:

A shortcut will make it easier for her to access the database file


Related Questions

Select the correct answer.

What are the requirements to access email on the web?
А.
a webmail provider's URL and a password
B.
a webmail provider's URL, a username, and a password
C.
a credit or debit card, a username, and a password
D
an email server ID and a password

Answers

Answer:

a webmail provider's URL, a username, and a password

Explanation:

B is the answer to the question

what is the first question you should ask yourself when analyzing an advertisement

Answers

How your presentation is gonna be

Please help, this question is from plato.
What is HTML?
A.
a language
B.
a software application
C.
a website
D.
a browser
E.
a malware program

Answers

Answer:

A

Explanation:

It is a programming language.

Answer:

A

a. language

Explanation: i took the test and hope this help have a good day.

What is the assignment operator?

Select the one choice that best answers the prompt above:
Answer 1
==

Answer 2
=

Answer 3
<=

Answer 4
===

Answers

I think hahahahaha Answer 1

Answer:

answer 3 is greater then or equal to, answer one is both equal, answer 2 is equal, answer 4 is all equal no mistakes,

Explanation for brainly please

answer 3

Enter an integer
5
6
7

Answers

/* This program prompts the user to enter an integer

* and then determines whether the integer is between 4-6. */

start();

function start(){

var int = readFloat("Enter an integer to print in this program: ");

println("An integer from 5-6 is entered (True/False)");

if(int <= 6 || int == 4){

println("True: " + int + " was entered.");

}else{

    println("False: " + int + " was entered.");

}

}

... If this isn't what you were looking for, I apologize.  I'm uncertain on what you really need help with, your question isn't quite clear... I answered to the best of my ability in simple js.

edit: brainly deletes my indents... just make sure to indent properly :-)

Which sentences describe the value of a conditional statement? Check all that apply.

It allows a programmer to designate a portion of the code that will be run only when a condition is met.

It creates new program code when a condition is met.

It allows a programmer to set a condition that must be met.

It incorporates decision-making into a program.

Answers

Answer:

134

Explanation:

Edgenuity

Answer:

1. It allows a programmer to designate a portion of the code that will be run only when a condition is met.

3. It allows a programmer to set a condition that must be met.

4. It incorporates decision-making into a  program.

Explanation:

Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?
Appointment
Meeting
Event
Period

Answers

Answer:

The answer u looking for is event

Answer:

event

Explanation:

2.4 Code Practice: Question 1

Write the code to input a number and print the square root. Use the absolute value function to make sure that if the user enters a negative number, the program does not crash.

Answers

Answer:

num = float(input("Enter a number : "))

ab = abs(num)

sqrt = float(ab ** 0.5)

print(sqrt)

Explanation:

Which of the following would be provided from the use of a GIS?

a. map displaying satellite data of farmland use
b. map displaying projected path of a hurricane
c. Doppler radar images for weather forecasting
d. satellite images used to reconstruct a forest fire

Answers

Itsssssssssssssssssssssssss B

The one that would be provided from the use of a GIS is a map displaying the projected path of a hurricane. The correct option is b.

What is GIS?

A computer system that analyzes and presents spatially related data is known as a Geographic Information System (GIS). It makes use of information associated with a certain place.

People can use GIS technology to compare the locations of various objects to determine how they connect to one another. For instance, utilizing GIS, a single map might show both polluting and pollutant-sensitive locations, such as wetlands and rivers, as well as locations that cause pollution, such as industries.

You need to enable tropical storm tracking if you want to follow a hurricane on our map. Click the symbol in the top-right corner to begin.

Therefore, the correct option is b. map displaying the projected path of a hurricane.

To learn more about GIS, refer to the link:

https://brainly.com/question/14464737

#SPJ2

Edhesive 3.2 code Practice:Question 1

Write a program to a number and test if it is greater than 45.6. If the number entered is greater than 45.6, the program needs to output the phrase “Greater than 45.6.

Sample Run
Enter a number:90

Sample output
Greater than 45.6

Answers

Answer:

a = float(input("Enter a number: "))

if(a > 45.6):

   print("Greater than 45.6")

Explanation:Code is in Python.

The program is an illustration of conditional statements.

Conditional statements are used to execute statements depending on the truth value of the condition.

The program in Python, where comments are used to explain each line is as follows:

#This gets input for the number

num = float(input("Enter a number:"))

#This checks if the number is greater than 45.6

if num > 45.6:

   #If yes, the appropriate text is printed

   print("Greater than 45.6")

#If otherwise, the program is exited

Only numbers greater than 45.6 will cause the statement in the condition to be executed.

See attachment for sample run

Read more about similar programs at:

https://brainly.com/question/19123086

1st row has 3 possible answers software program, web page, and web browser

2nd row has 3 possible answers a web browser, the internet, and a user’s computer

Answers

Answer:

1st row: software program

2nd row: a user's computer

hope i've helped.

Vincent is a digital media professional. His bosses always praise his artwork. His company has just taken on a new project. Vincent has some thoughts and ideas about this new project that he wants to discuss with the senior employees. What kind of skills should he use to pitch his ideas?
A.
technical
B.
manipulative
C.
social
D.
interpersonal

Answers

Answer:

A

Explanation:

I think the answer in A

4.1 Code Practice: Edhesive

Answers

In python 3:

while True:

   name = input("Please enter a name: (Nope to end) ")

   if name == "Nope":

       break

   print("Nice to meet you {}".format(name))

I hope this helps!

   

The program is an illustration of while loops.

While loops are used to perform iterative operations, until the condition is met

The program in Python, where comments are used to explain each line is as follows:

#This prompts the user for name

name = input("Please enter a name (Nope to end) ")

#This checks if input is "Nope"

while name.lower()!="nope":

   #If no, this prints the greetings

   print("Nice to meet you",name)

   #This prompts the user for another input

   name = input("Please enter a name (Nope to end) ")

Note that the loop is repeated until the user enters "Nope" or "nope"

Read more about while loops at:

https://brainly.com/question/18430675

!!!!!!!-------PLEASE HELP--------!!!!!!!
When writing a selection sort or insertion sort algorithm in a class, what type should the final main method be

Answers

Answer:

A cool little 40 Minutes Timer! Simple to use, no settings, just click start for a countdown timer of 40 Minutes. Try the Fullscreen button in classrooms and

Explanation:


3. Which of the following is used as a container to keep salted fish during the
process?
a. bistay
b. oil drum
c. mixing bowl
d.earthen pots​

Answers

Answer:

A. yes A is actually used as a container to keep salted fish

Explanation:

plzzzzzzzzzzzzz give me brainiest

Andy wants to install a new Internet connection. He wants to take the fastest he can get. What are the maximum speeds for the following Internet access technologies?

Answers

Answer:

1. so if i wanted to build a linux server for web services(apache) with 1cpu and 2 gb of memory.-operating at 75% of memory capacity2. a windows server with 2 cpu/ 4gb memory- operating at 85% of memory capacity3. a storage server with 1 cpu/ 2gb memory- operating at 85% of memory capacityhow much memory do i have to add for each server. so that the utilization rate for both cpu and memory is at a baseline of 60%."the details for the cpu like its processor or the memory's speed isnt to be concerned" yeah i kept asking my teacher if he's even sure about the but the whole class seems to be confused and the project is due in 3 days..this is a virtualization project where i have to virtualize a typical server into an exsi hypervisor.

Answer:

PLATOOOOOO

Explanation:

how can we show that heat is liberated during respiration​

Answers

Answer:

To show that heat is liberated during respiration. Make a hole in the cork and insert a thermometer into cork and see the bulb of the thermometer is in the midst of the seeds. Record the temperature in both the flasks at every two or three hour intervals for about 24 hours.

Explanation:

Hope this helps:)

How these technologies influence the user experience and knowledge?

Answers

Answer:

I don't know

Explanation:

Technology can help us study and stuff yet we can still look up the answers. It also allows to know what's happening in the world around us like if a girl gets kidnapped, we get Amber Alerts on our phones about the missing girl. Most of us people today have learned about George Floyd's death on the internet through technology. Technology doesn't really influence us as much as help us out but for some people it can cause us to change under the influence of seeing other people and how they dress and act and stuff.

4.2 Code Practice: Question 1

Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the count of how many numbers were entered.

Sample Run

Enter a number: 1
Enter a number: 41
Enter a number: 36
Enter a number: 25

Sum: 103
Numbers Entered: 4

Hint: If you get an EOF error while running the code you've written, this error likely means you're asking for too many inputs from the user.

Answers

In python:

total = 0

i = 0

while total <= 100:

   number = int(input("Enter a number: "))

   i += 1

   total += number

print("Sum: {}".format(total))

print("Numbers Entered: {}".format(i))

I hope this helps!

To allow a document to be opened easily on most computers, save the document as a _____.

a hyperlink
require a password
a template
read only

Answers

Answer:

PDF

Explanation:

Answer:read only

Explanation:

what are the 2 things you are not sure about evaluating functions​

Answers

Answer:

every thing

Explanation:

Answer:

To evaluate a function, substitute the input (the given number or expression) for the function's variable (place holder, x). Replace the x with the number or expression. 1. Given the function f (x) = 3x - 5, find f (4).

A function is a relation in which each input has only one output. In the relation , y is a function of x, because for each input x (1, 2, 3, or 0), there is only one output y. x is not a function of y, because the input y = 3 has multiple outputs: x = 1 and x = 2.

A formula is an expression which calculates the value of a cell. Functions are predefined formulas and are already available in Excel. For example, cell A3 below contains a formula which adds the value of cell A2 to the value of cell A1.

Explanation:

Please helpp!! I need it quickly!

Answers

Answer:

a

Explanation:

Question 3 :The easiest way to become a victim of malware, spyware or viruses is through:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

texting.
B

online chatrooms.
C

playing games.
D

downloads.

Answers

Answer:

downloads.

Explanation:

A test using various ransomware strains showed that 1,000 Word documents could be encrypted in anything from 18 seconds to 16 minutes.  Thus, option D is correct.

What easiest way to become a victim of malware download?

Phishing emails are by far the most popular way for hackers and state-sponsored hacking groups to disseminate malware.

Adware is malware that targets computer users with unwanted adverts. This makes it possible for the creator of the malware to obtain payment from the companies whose adverts are served by it.

However, certain viruses may be scheduled to begin infecting your computer a few days after they are downloaded. Other viruses may attempt to circumvent antivirus protection by downloading in chunks.

Therefore, Hackers have become adept at crafting emails that lead recipients to click on links or download files that contain malicious software.

Learn more about downloads here:

https://brainly.com/question/29328797

#SPJ2

PLZ BEEN STUCK ON THIS



What is the second software layer of the Open Systems Interconnection reference model called?

data link
protocol
network
TCP/IP

Answers

Answer:

am not really sure but between TCP/IP and data link am sorry for not being precise .

Answer: DATA LINK

Explanation:

SEARCH IT UP!

Two strings are anagrams if they are permutations of each other. For example, "aaagmnrs" is an anagram of "anagrams". Given an array of strings, remove each string that is an anagram of an earlier string, then return the remaining array in sorted order. For example, given the strings s = ['code', 'doce', 'ecod', 'framer', 'frame'], the strings 'doce' and 'ecod' are both anagrams of 'code' so they are removed from the list. The words 'frame' and 'framer' are not anagrams due to the extra 'r' in 'framer', so they remain. The final list of strings in alphabetical order is ['code', 'frame', 'framer'].

Answers

Answer:

Here is the Python program:

def removeAnagram(array):  #method to remove string from array of strings that is anagram of earlier string

   s = set()  #creates a set

   output = []  #creates an output list

   for string in array:  # iterates through each string in array of strings

       if ''.join(sorted(string)) not in s:  #if sorted string of array is not in s

           output.append(string)  #append that string to output list

           s.add(''.join(sorted(string)))  #add that sorted string to s set

   return sorted(output)  #returns output list

   

array = ['code', 'doce', 'ecod', 'framer', 'frame']  #creates a list of words

print(removeAnagram(array))  #calls method to remove each string that is an anagram of earlier string

Explanation:

I will explain the program with an example:

Suppose array = ['code', 'doce', 'ecod', 'framer', 'frame']

Now the for loop works as follows:

At first iteration:

first string of array is 'code'

if ''.join(sorted(string)) not in s: this is an if statement which has two method i.e. join() and sorted(). First each letter of the string i.e. 'code' is sorted in alphabetical order then these separated characters are joined together into a word with join() method. So

sorted(string) becomes:

['c', 'd', 'e', 'o']                                                                                                           and ''.join(sorted(string)) becomes:

cdeo

Now if ''.join(sorted(string)) not in s condition checks if cdeo is not in s set. This is true so the statement:

output.append(string) executes which appends the string to output list. So now output has:

['code']                                                                                                                         Next s.add(''.join(sorted(string))) statement  adds the sorted and joined string of array to s set. So the set has:

{'cdeo'}                                                                                                                        

So at each iteration each word from the array is sorted and joined and then checked if output array contains that word or not. If not then it is added to the output array otherwise not. For example at 2nd iteration the word 'doce' which is anagram of code and it is checked when it is sorted and joined and it becomes cdeo which is already in output array. So this is how the anagram is removed from the array. At the end the output array which returns the remaining array in sorted order is returned by this method. The screenshot of the program along with its output is attached.

The program is an illustration of loops.

Loops are used to perform repetitive and iterative operations.

The program in Python, where comments are used to explain each line is as follows:

#This initializes the list of words

myList = ['code', 'doce', 'ecod', 'framer', 'farmer']

#This creates a set

mySet = set()

#This creates a new list for output

newList = []

#This iterates through the list

for elem in myList:

   #This checks if a sorted list element is not in the set

   if ''.join(sorted(elem)) not in mySet:  

       #if yes, the list element is appended to the new list

       newList.append(elem)

       #And then added to the set

       newList.add(''.join(sorted(elem)))  

#This prints the anagram

print(sorted(output))

Read more about similar programs at:

https://brainly.com/question/19564485

What are some common security threats for our home devices and IoTs?

Answers

Answer:

Botnets. A botnet is a network that combines various systems together to remotely take control over a victim’s system and distribute malware.A denial-of-service (DoS) attack deliberately tries to cause a capacity overload in the target system by sending multiple requests. In a Man-in-the-Middle (MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them.Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.Ransomware attacks have become one of the most notorious cyber threats. In this attack, a hacker uses malware to encrypt data that may be required for business operations. An attacker will decrypt critical data only after receiving a ransom.

Explanation:

For your biology class, you will be giving a presentation of the findings of a plant growth experiment. Which application is best suited for this presentation?


Writer or Word


Impress or PowerPoint


Notepad or Paint


Calc or Excel

Answers

Answer: Powerpoint

Explanation: Easy to give graphs and add pictures. You can also add shapes to create a bar graph if needed.

Answer:

Calc or Excel

Explanation:

According to the video, what tasks do Foresters commonly perform? Check all that apply.

Answers

Common tasks that foresters perform are as follow.

Measuring trees

Supervising timber harvests

Planting seedlings (baby trees)

Hope I could help!!

Answer:

On edge its

receiving money

totaling bills

giving receipts

weighing produce and bulk food

Explanation:

To view data in a graphical format that is easier to understand, use Microsoft Excel
functions
formulas
pictures
charts

Answers

Answer:

i guess charts??

Explanation:

Identify the common features of software applications. (choose all that apply)
a pointer
toolbars
an operating system
buttons
hardware
a mouse

Answers

Answer:

a pointer, toolbars and buttons

Explanation:

got it correct

Answer:

Pointer, toolbars, and buttons

Explanation:

Other Questions
The manager of Triks Burgers keeps track of the number of customers served at different periods of the day in an attempt to plan a schedule for workers that matches the demand for the restaurant's products. By using this tracking system, the manager of Triks Burgers is utilizing ________ control. Bromine is found above iodine in Group 17 of the periodic table. If an ion formed by bromine has a charge of 1-, what is the charge on an ionformed by iodine?A. -7B. -2C. -1D. +1 PLS HELPFrank received a $4.00 tip from a customer who had a $25.00 bill. Which decimal represents the fraction of the bill Frank received as a tip? 0.04 0.16 0.25 0.625 What happens to the radiation that is soaked up by the atmosphere and Earth's surfaces?A.It changes into UV and greenhouse gases send it back to Earth.B.It changes into IR and greenhouse gases send it back down to heat Earth.C.It changes into greenhouse gases and gets released into space.D.All the IR escapes into space. where plasma is found naturally 8. Peter ______ immer noch. (schlafen)9. Du ______ ganz gut mit deiner neuen Brille. (sehen) PLEASE HELP! MARKING AS BRAINLIEST!!Which example illustrates international interdependence? A- A Pennsylvania bell-maker casts an iron bell for a town hall in New England.B- A New England factory buys raw cotton for a Southern plantation. C- French merchants but beaver pelts from American merchants to make fur hats. D- A Plains Indian makes a traditional teepee out of the skins of American bison. Read the excerpt from "Tools of the Spymaster."General Clinton, concerned about what General Howe was planning and doing, made use of a mask to write a secret message in a letter to General Burgoyne.Before writing the letter, Clinton had placed an hourglass-shaped mask on a piece of paper and then had formed the secret message within that shape.The unmasked letter had enough false information in it to fool any American who happened to see it But when Burgoyne viewed the letter with the mask, heread Clinton's view of the real situation: Howe has made a bad move; I don't have enough men to do anything about itWhich statement contains explicit information from the text?a. general howe was a complete failure during the warb. general burgoyne was a better officer than general howec. general clinton sent a letter to general burgoyne by messengerd. general clinton used a mask to write a secret message the green areas on the map above highlight the world region with______ climates please select the best answers from the choices providedA. continentalB. moderateC. polarD. tropicalplz hurry I only have 25 min left -9 - 11 = 2q + 4Solve? A.(-1,6)B.(-6,5)C.(-8,1)D.(-10,1)HELP ASAP Alondra is training for a 5 mile race. The table below shows how many strides Alondra takes as she builds up to running 5 miles. How many strides will Alondra take to run 4 miles? Exercise Log Miles 1 2 4 5. Strides 2,640 5,280 13,200 Which mechanism best describes the process by which nutrients are taken up at the apical surface of the epithelial cells that line the guy and released from their basal and lateral surfaces?a. Proteins are tethered to the cell cortexb. Proteins are tethered to the extracellular matrixc. Protista are tethered to the proteins on the surface of another celld. Protein movement is limited by the presence of a diffusion barrier Fill in the BlankComplete the following sentence. The ________ satellite program photographs the continents and coastal regions.(will mark Brainlist^^) helpp ill mark u as brainlist i need the standard form of seventy billion nine hundred milion sixty Thousand seven thousebth eight hundred ninty nine and one three Which of the following processes has begun as soon as special receptor cells for the senses are activated? 1. Perception2. Sublimination3. Adaptation4. Habituation5. Sensation the remote areas away from the coast is A major airline company is concerned that its proportion of late arrivals has substantially increased in the past month. Historical data shows that on the average 18% of the company airplanes have arrived late. In a random sample of 1,240 airplanes, 310 airplanes have arrived late. If we are conducting a hypothesis test of a single proportion to determine if the proportion of late arrivals has increased, what is the correct statement of null and alternative hypotheses C 24.5D41.5 Which one does not represent map scaleA ratio scaleB Word scaleC Countour scaleD Linear Scale16 The human made feature that has influen