Answer:builder
Explanation:
Answer:
Some Technology used to build a closet organizer would be
A Drill
And ofc your going to need google, to help build it
I really do hope this helps I'm on the verge of falling asleep so I couldn't think of anything else.
High Hopes^^
Barry-
GIVING BRAINLIST TO WHOEVER ANSWERS
Which element of the spreadsheet is most similar to a pixel in an image?
1: Row
2: Column
3: Formula
4: Cell
Host A is sending a file to Host B. There are 3 links (therefore 2 switches) between the hosts. The file is segmented into packets of 40 bytes, with a 10 byte header added to each packet. Each link has a transmission rate of 100 kbps and a speed of 1000 km per sec. The switches are 100km away from each other. Host A is 50 km away from the first switch while Host B is 150 km away from the second switch. Data travels from Host A to the first switch, on to the second switch and then to Host B. What is the propagation delay (in seconds) when a packet of data travels between the 2 routers?
Answer:
The propagation delay is "0.1 Sec".
Explanation:
Please find attachment of the figure.
The given values are:
Transmission rate of each link
= 100 kbps
Distance
= 100 km
Speed
= 1000 km
Now,
The propagation delay between R1 as well as R2 will be:
⇒ [tex]\frac{DR_1 R_2}{speed}[/tex]
On substituting the estimated values, we get
⇒ [tex]\frac{100 \ km}{1000} \ Sec[/tex]
⇒ [tex]0.1 \ Sec[/tex]
GIVING BRAINLIEST
Sending messages electronically to one or more recipients is called
cloud computing
emailing
social networking
web conferencing
Answer:
Sending messages electronically to one or more recipients is called emailing.
Explanation:
Please mark brainliest
Sending messages electronically to one or more recipients is called, ''Emailing''. So option (2) is true.
Given that,
The sentence to define,
''Sending messages electronically to one or more recipients.''
Since, When you send messages electronically to one or more recipients, it is referred to as emailing.
It's a convenient and widely used method of communication.
Hence, Sending messages electronically to one or more recipients is called, ''Emailing''.
So, Option 2 is true.
Learn more about Email, here;
brainly.com/question/14380541
#SPJ6
If you are logged on to Windows Live Messenger, why would you be unable to engage
in an instant messaging session with your brother, who is logged on to his AOL
Instant Messenger account?
a. Because you use Windows and your brother uses Apple OS X
b. Because Windows Live Messenger has built-in security and AOL Instant
Messenger does not
c. Because AOL Instant Messenger and Windows Live Messenger use their own
proprietary protocols
d. Because AOL Instant Messenger encrypts
Answer:
C: Because AOL Instant Messenger and Windows Live Messenger use their own proprietary protocols
Explanation:
Write a compound inequality that is represented by the graph.
5
6
7
8
9
10 11 12
13 14
15
A compound inequality using the variable x is
Answer:
[tex]7 < x < 14[/tex]
is the answer
Question 2 / 5
Which of the following is a drug?
a.)alcohol
b.)water
c.)tea
d.)coffee
Answer:
alcohol
Explanation:
Answer:
alcohol
Explanation:
i mean it's self explanatory
Match the terms with their meaning.
cookie
JavaScript
Google
gzip
a popular search engine
arrowRight
a text file storing preferences
arrowRight
a scripting language for web pages
arrowRight
a file compression software
arrowRight
Answer:
cookie - a text file storing preferences
javascript- a scripting language for web pages
Google- a popular search engine
Gzip- a file compression software
Which of the following is a way to keep you safe online? (select all that apply)
set up a spam folder
give out personal information to strangers
only open e-mails from people you know
keep anti-virus software up to date
Answer:
1). set up a spam folder
3).only open e-mails from people you know
4).keep anti-virus software up to date
Explanation:
IM DIFFERENT BREEED!
The options that are a way to keep you safe online are:
Set up a spam folder.Only open e-mails from people you know.Keep anti-virus software up to date.What ways can keep you safe online?When a person keep their personal information private and from online views, one can be able to keep themselves safe.
Conclusively, Note that a lot of Hackers do make use of the profile of people on social media and as such, doing the above things can help keep you safe.
Learn more about online from
https://brainly.com/question/2014724
#SPJ2
Use the drop-down menus to complete statements about the effects of using junk email options.
Some allowed messages can still be blocked by the client or the
Obvious spam or junk messages will be blocked by the
The Safe Lists Only option is the protection level.
Answer:
✔ server
✔ client
✔ most restrictive
Explanation:
Correct on edg
Answer:
^ their correct
Explanation:
In these ones all your finding is the mean(average).
What is a help desk
technician?
O An individual who troubleshoots and repairs smartphone hardware components
O An individual who manages and maintains network servers
O An individual who diagnoses and resolves users' technical hardware and software problems
An individual who manages and maintains a network infrastructure
Answer:
C: An individual who diagnoses and resolves users' technical hardware and software problems
A _____ is a device that sends data from one network to another.
router
server
client
switch
Answer:
Router
Explanation:
i did it on edj
Answer:
router
Explanation:
On Edge, a router is described as a device that sends data from one network to another.
(Confirmed on EDGE)
I hope this helped!
Good luck <3
What might happen if a computer has too many applications running at one time?
a. become worth more money
b. freeze or run slowly
c. your wifi will stop working
d. become more efficient
Answer:
b freeze or run slowly
Explanation:
If your computer is running slowly, which of the following is most likely to solve the problem?
Scanning, cleaning, and optimizing your hard drive
Checking to make sure all of the computer’s cords are plugged in
Reentering the serial numbers of the software programs the computer is running
Searching the hard drive for missing DLL files
Answer:
Purchase Anti-virus
Explanation:
Delete old files.
clear your temp
update to a ssd
Answer:
A. Scanning, cleaning and optimizing your hard drive
Explanation:
IM A DIFFERENT BREEED!
also... when your computer is slow, you usually scan and clean your computer files and delete unnecessary files you don't need so that your computer can run more smoothly and faster.
Suppose you have a word processing application on your smartphone, your tablet, and your laptop. You are at home, and you need to write a paper for a class. A [_____] would be easiest to use for writing your paper.
the words you can use are
desktop
tablet
smartphone
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct option for the fill-in-blank of this question is desktop.
Because you can easily use the word application using the desktop. You can also use tablet and smartphone for writing a paper on a word processing application. But you cannot comfortably and easily write the paper as compared to using the desktop for writing the paper. Furthermore, some wordprocessing features are limited in tablets and in smartphones as compared to desktop wordprocessing application.
So a desktop wordprocessor would be easiest to use for writing your paper.
Answer:
It's "Laptop"
Explanation:
Describe the first time you met one of your friends.
When comparing programming languages, what is commonly used by all software developers?
elements, controls, and variables
variables, loops, and nouns
elements, commands, and variables
variable, loops, and tags
Answer:
The answer to this question is given below in the explanation section
Explanation:
This question is about when comparing programming languages, what is commonly used by all software developers? The correct answer is elements, controls, and variables.
elements, controls, and variables
Every programmer used these three elements, controls, and variables. for example elements are buttons, link, input field etc, controls are loops and decision statements and variables are to store value for some object. so, elements, controls, and variables are most commonly used by all software developers.
variables, loops, and nouns (false)this is not correct, because nouns are not most commonly used by all developers. However, it is noted that a noun is used mostly in the requirement elicitation phase for capturing objects.
elements, commands, and variables (false)commands are not most commonly used by developers, commands are used by those programmers who are doing console programming.
variable, loops, and tag (false)tag are used in HTML language but it is not most commonly used by the developers.
20 points if sombre
What might be the best method for creating a scene where one vital actress, with a leading role, is missing from the scene?
deletion of the scene from the script
use of a green screen
importing the actress’s voice
use of a lookalike
Answer:
Use of a lookalike
Explanation:
Try distracting audience so that you don't miss or lose the whole show
Answer:
c: use of a green screen
Explanation:
edg2021
Which of the following accurately completes this sentence? The Internet is ____.
open to everyone who can access it
only available in the US
a computer
not a network
it's a
Answer:
open to anyone who can access it.
Answer:
Open to anyone who can access it!
Explanation:
The internet Is for everyone all over the globe!
Omar wants to print out a document to give to his audience to follow along with his presentation. However, he does not want his classmates to see the slides in advance.
Which type of document should Omar print?
outlines
full slides
handouts
notes pages
Answer:
A on Edg
Explanation:
Answer:
Outlines
Explanation:
an excellent website design delights its audience and is the product of innovation built on a foundation of
A: creative layout templates
B: careful site planning
C: an appealing theme
D: audience feedback
Answer:
B
Explanation:
took test
An excellent website design delights its audience. The product of innovation is built on a foundation with respect to create layout templates. Thus, option A is correct.
What is a website design?The term "web design" describes the layout of websites that can be seen online. Instead of software development, it usually describes the user engagement components of website design.
It offers a positive consumer experience and makes it easier for website traffic to access and browse your website. The audience is delighted by website design, which is the result of creativity based upon imaginative layout patterns.
Each website has a strong online presence, clear content, and enticing web pages with user-friendly designs to entice the target audience.
Therefore, option A is the correct option.
Learn more about website design, here:
https://brainly.com/question/13479505
#SPJ6
Question # 2
Multiple Choice
Which of the following statements reflects the pros and cons of continuous software updating?
Continuous software updates make digital products more useful and secure; however, they can lead to more frequent device replacements.
Continuous software updates increase security in digital devices; however, the updates can make certain apps obsolete.
Continuous software updates serve no real purpose for the consumer; they only secure a profit for technological corporations.
Continuous software updates allow multimedia artists to innovate more; however, they slow down the production process.
my answer is continuous software update increase security in digital devices however the updates can make certain apps absolute
Explanation:
if the answer is correct in your opinion then mark MI as brain list
Complete the statement below using the correct term.
All digital devices use software programs to function. Software
create these programs.
Answer:
System software and Application software
Explanation:
System software Includes Operating System, Database Management Systems, and Software Utilities
Application software Includes performance of a particular application
[Edhesive] 4.1 Code Practice
Write a program that asks the user to enter a name, and then prints Nice to meet you NAME. Your program should repeat these steps until the user inputs Nope.
Sample Run:
Please enter a name: (Nope to end) Antonio
Nice to meet you Antonio
Please enter a name: (Nope to end) Jonathan
Nice to meet you Jonathan
Please enter a name: (Nope to end) Tyler
Nice to meet you Tyler
Please enter a name: (Nope to end) Brianne
Nice to meet you Brianne
Please enter a name: (Nope to end) Nope
Answer:
name = input("Enter a name, type Nope to end loop: ")
while (name != "Nope"):
print("Nice to meet you " + name)
name = input("Enter a name, type Nope to end loop: ")
print("Done")
Explanation:
It works on python/Edhesive perfectly!
Following are the Python program to an input string value and print value with the message:
Program Explanation:
Defining the while loop that runs condition is true.Defining a variable "user_name" that uses the input method to input value from the user-end.After input value the if conditional block is used that checks input value is equal to "Nope" when the condition is true it uses the break keyword and print values with the message.Program:
while True:#defining loop that runs when condition is true
user_name = input('Enter your name:(Nope to end): ')#defining a variable user_name that input value
if user_name == 'Nope':#defining if block that checks input string value equal to Nope
break#using break keyword
print('Nice to meet you {}'.format(user_name))#print message
Output:
Please find the attachment.
Learn more:
brainly.com/question/18502091
Complete each sentence to describe features of the VLOOKUP function. The VLOOKUP function structure begins with =VLOOKUP( , …) To use the VLOOKUP function, the lookup value should be in the of the table.
Answer:
The complete sentences are:
The VLOOKUP function structure begins with =VLOOKUP(value, table, col_index, [range_lookup])
To use the VLOOKUP function, the lookup value should be in the first column of the table.
Explanation:
Required
Complete the given sentence with the right values
In Excel, the syntax of the VLOOK function is:
=VLOOKUP (value, table, col_index, [range_lookup])
value -> The value to look up to and it should be located in the first column of the table
table -> The table name
col_index -> The column number to check
[range_lookup] -> This is optional and it returns either true of false depending on the result of the query,
Answer:
Complete each sentence to describe features of the VLOOKUP function.
The VLOOKUP function structure begins with =VLOOKUP(lookup value, table array... )
To use the VLOOKUP function, the lookup value should be in the first column of the table.
Explanation:
Use the drop-down menus to complete the steps for creating a new note.
1. Open the Notes view by clicking Notes in the
2. Click New Note and type the information.
3. Change the
to categorize the note.
4.
off of the note to save it on the Notes view.
Answer:
✔ Navigation bar
✔ color
✔ Left-click
Explanation:
on edg
Answer:
1. Open the Notes view by clicking Notes in the Navigation bar
2. Click New Note and type the information.
3. Change the color to categorize the note.
4. Left-click off of the note to save it on the Notes view.
Explanation:
These are the answers from Edge2020
Which option exists to turn multiple calendars on or off at the same time?
change to overlay view
create a calendar group
use Office 365 in merge view
link multiple calendars in single view
Answer:
B is correct
Explanation:
On edg
Answer:
B. create a calendar group
Explanation:
just did the assignment on edge 2020
Dayla is concerned about managing her digital footprint. What does she mean by this? *
Answer:
The answer to this question is given below in the explanation section.
Explanation:
First we know what is digital footprint.
A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and the information you submit to online services.
So, Dalya is concerend about managing her digital footprints means she has concerned to store password that used to be login and make them secure, the email she is sending to the correct address and text in the email is grammatically correct, information that she is submitting online does not violate the security concerns, etc.
The right answer is D).
What is the definition of delimited text?
Answer:
A delimited text file is a method of representing a table of data in a text file using characters to indicate a structure of columns and rows. This is typically used to provide an import/export function for services, software and databases that represents data in a neutral format. The following are common types of delimited text file. Hope this helps!
Answer:
Characters are separated by commas or tabs.
Explanation:
I just did it on edg 2020
Use the drop-down menus to describe the Time Zone feature in the Outlook calendar.
Outlook only allows a maximum of
time zones to be set in a calendar.
Time zones are set by accessing the calendar options
When creating a second time zone, it is helpful to
both.
Answer:
✔ two
✔ in Backstage view
✔ label
Explanation:
on edg
Answer:
two, in Backstage view, label
Explanation: