0.3. Fill in the blanks,7marks
a. A smart____uses IoT to save electricity.
b._____are devices that can sense , store and analyse signals from the body and display the information on the gadget and an app.
c. The full form of CSS is_____.
d. The syntax of CSS is made of_____
and_____.
e._____CSS is used to beautify one particular tag.
f. Internet of Things makes use of connected devices, smartphones and_________.
g._____track the number of steps a person has walked in a day.​

Answers

Answer 1

Answer:

a) phone

b)

c) cascading style


Related Questions

An insurance company utilizes SAP HANA for its day-to-day ERP operations. Since they can’t migrate this database due to customer preferences, they need to integrate it with the current AWS workload in the VPC in which they are required to establish a site-to-site VPN connection. What needs to be configured outside of the VPC for them to have a successful site-to-site VPN connection?

Answers

Answer: An Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network

Explanation:

Based on the information given, an Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network need to be configured outside of the VPC for them to have a successful site-to-site VPN connection.

The Internet-routable IP address will be used in the identificatiob of each computer through the use of the Internet Protocol for the communication over a network.

Within the DNS system, a primary server (SOA) holds and maintains all records for the zone. Secondary servers will periodically ask the primary if there have been any updates, and if updates have occurred, they will ask for a zone transfer to update their own copies. Under what conditions will the secondary name server request a zone transfer from a primary? Group of answer choices

Answers

Answer:

- When the primary SOA record serial number is higher than the secondary's

Explanation:

DNS(Domain Name System) is described as the distributed database that sometimes includes all the supporting hardware or software infrastructure. This system employs the internet to translate hostnames into IP addresses and provide other information related to domain.'

Under this system, the secondary name server would request the primary server to pass on a zone transfer 'in case the record serial number of the primary server zone is greater than the secondary.' This will help in promoting forbearances against any kind of faults and also in establishing synchrony between the zone files.

Which option allows users to access the handout master to modify it?

Click Home and select the Handout Orientation tab in the ribbon.
Click View and select the Handout Master tab in the ribbon.
Click View and select the Slide Master tab in the ribbon.
Click Home and select the Slide Size tab in the ribbon.

Answers

The option that allows users to access the handout master to modify it is: Click View and select the Handout Master tab in the ribbon.

What is the access  about?

The Handout Master tab, which is found in various presentation software like Microsoft PowerPoint, is intended for the purpose of modifying the layout and design of handouts.

To access the handout master view, users can simply click on the "View" menu and choose the "Handout Master" tab. Here, they have the ability to modify the handout layout, add or delete elements, tweak formatting, and tailor the appearance of the handouts to their liking.

Learn more about access  from

https://brainly.com/question/27961288

#SPJ1

You have a sales chart and excel that you want to include in a 3rd quarter report to include in a 3rd quarter report quit it in word you want to make sure the data in the you want to make sure the data in the chart continues to show only 3rd quarter results in the world the 3rd quarter results in the word document after the excel cell's data is updated sales data is updated with the 4th quarter information what pay function should you use

Answers

Answer:

The paste function to use is the Advanced Paste Function that reads Use Destination Theme and Link Data or Keep Source Formatting and Link Data.

Explanation:

The first function adopts the Theme (such as colors, fonts, and other formatting) whilst retaining links to the data in the excel workbook. The latter imports the formatting or theme as-is from excel.

In both scenarios, (for as long as both documents are open and are in the same file) when the data in excel is opened and updated, it reflects automatically in the chart on the Microsoft Word document.

Cheers

if a= ‘ Stay home, Stay safe’ , print its value
a. 3 times in the same line
( 2 x 1 = 2)
b. 2 times in different lines using one print statement

Answers

Answer:

Since the language isn’t stated, I’ll give answers in the two most-used (?) languages: Java and Python.

a) To print a’s value 3 times in the same line, in Java we would do:

System.out.print(a+a+a);

In Python, we would write:

print(a*3)

b) 2 times in different lines using one print statement

In Java, we would write

System.out.println(a+”\n”+a+”\n”+a);

In Python we would write:

print(a,a,a,sep=’/n’)

Hope this helps!

What is difference between reserved and user defined word

Answers

Answer:

A user defined word is a name we give to a particular data structure. Reserved keywords are words which are pre-defined by the programming language. Reserved keywords are mostly lowercase like int, long, short, float etc.

User defined words can be made up of capital letters, low case letters, digits and underscores.

variable index has a value of 4, and variable accessValid has a value of False. What value does variable, accessPoints, have after the if is executed?
accessPoints = 0
if ((index >=2) or accessValid):
accessPoints += 10
else:
accessPoints = 1

Answers

Answer:

10

Explanation:

If index is greater than or equal to 2, accessPoints will increase by 10 even if accessValid is false because the if statement states that if index is greater than or equal to 2 OR accessValid is true. The if statement gets executed if either expression is true, and index is greater than 2 because index has a value of 4.

What is the first thing to do when planning an experiment on your own?

ask your teacher

wear an apron

prepare the work area

gather your materials

Answers

Answer: ask your teacher

Explanation: I'm quite sure this is the answer.  

list five applications field of a computer?​

Answers

list five applications field of a computer?

answer= home , school, hospital, bank, super markets, etc....

10 POINTS!! Picture below: NOT A QUIZ

Answers

Answer:

a. Windows Photo Viewer: PNG

b. MS Word: DOCX

c. MS Excel: XLS

d. Go-ogle Chrome: HTML

e. MS PowerPoint: PPT

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc.

On a related note, all software applications (programs) are designed and developed for use with specific file extensions or formats and as such, when a particular software is used to open a file it isn't developed for, it result in an error.

a. Windows Photo Viewer: PNG. This software application is specifically designed for viewing images (photos) which could either be in a PNG or JPEG format.

b. MS Word: DOCX. Microsoft (MS) Excel is a word processing software application (program) developed by Microsoft Inc. to enable its users type, format and save text-based documents with a DOC or DOCX file extension.

c. MS Excel: XLS. Microsoft (MS) Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents having a XLS file extension.

d. Go-ogle Chrome: HTML. HTML is an acronym for hypertext markup language and it is a standard programming language that is used for designing, developing and creating web pages. Go-ogle Chrome is a web browser designed for browsing websites or opening HTML files.

e. MS PowerPoint: PPT. Microsoft (MS) PowerPoint is a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

knowledge of HTML and CSS is considered essential for the job of a(n)

a) podcaster
b) browser manager
c) blogger
d) webmaster

Answers

The knowledge of HTML and CSS is considered essential for the job of a webmaster. The correct option is (d).

What is HTML?

An HTML is a basic computer programming language. Any webpage or code can be written using HTML.

CSS stands for Cascading Style Sheets and HTML  stands for Hypertext Markup Language.

HTML and CSS are two of the core technologies for making Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

So, the knowledge of HTML and CSS is considered essential for the job of a webmaster.

Thus, the correct option is (d)

Learn more about HTML.

https://brainly.com/question/15093505

#SPJ2

Consider a system having buddy system with physical address space 128 KB. Calculate the size of partition for 18 KB process

Answers

Answer:

size of partition for 18 KB process is 32 KILOBYTES. It divides by 2, till possible to get minimum block to fit 18 KB.

Chris needs to modify the default bullets that are used in a nonnumbered list in Word.

Which method should he use?

Select the arrow next to the bullet list option in the Paragraph group.
Select the arrow next to the number list option in the Paragraph group.
Use the Styles group on the Home tab.
This cannot be done.

Answers

Answer:

Select the arrow next to the bullet list option in the Paragraph group.

Explanation:

This allows you to decide what shape of bullets you would like to have.

Hope this helps!

Note: I personally recommend using stars :)

Which statement gives an advantage of multicellular organisms?

Answers

Answer:

D and B

Explanation:

Multicellular organisms thus have the competitive advantages of an increase in size without its limitations. They can have longer lifespans as they can continue living when individual cells die. Multicellularity also permits increasing complexity by allowing differentiation of cell types within one organism.

Answer:

B and D

Explanation:

srry i am a bit late can u give me Brainliest i rlly need it plz

write a note on antispyware progrmaes?​

Answers

Answer: See explanation

Explanation:

Spyware refers to the software that has

a malicious behavior which gathers information about an individual or organization and then sends the information gathered to another entity which is used in causing harms to the user such as the privacy violation of the user.

Antispyware programmes are also called the spyware removal tools and they're the software which are used in the detection of harmful spyware which are then removed from the system. Examples include Avira, Norton, Avast, McAfee etc.

Answer:

Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Detection may be either rules-based or based on downloaded definition files that identify currently active spyware programs.

Suppose you are designing a marketing website and you would like it to be as user-friendly as possible. In particular, you do not want repeat customers to have to enter their address, email, telephone number, and credit card data every time they make an online purchase. Rather, you would like your Website to recognize each customer by name every time he or she visits the website and to retrieve all the information about that customer automatically whenever he or she wishes to make a purchase. To achieve this goal, you would most likely use Group of answer choices search engine. spam/canspam webrooming/showrooming. cookies. customerization.

Answers

Answer: cookies

Explanation:

Cookies refers to small files which are sent by websites to the device of the user which are used in monitoring the user and remembering certain information about the user such as login information, phone number, email addresses, etc. Cookies are necessary in enhancing a website user-friendliness.

Following the information given in the question, since the user will like th website to recognize each customer by name every time he or she visits the website and to retrieve all the information about that customer automatically whenever he or she wishes to make a purchase, the cookies will be used.

How can the Column settings be accessed?

Layout tab, Page Setup group
Layout tab, Paragraph group
Layout tab, Arrange group
Design tab, Document Formatting group

Answers

Your answer would be LAYOUT TAB, PAGE SETUP OR GROUP

Zoe needs to ensure that a larger spreadsheet fits on a single page. How can she achieve this?

Orientation settings
Margin settings
Collation settings
Label settings

Answers

Answer: Orientation settings

Explanation:

Zoe's problem can be solved if she went to orientation settings in the Page layout tab and changed the page orientation from portrait to landscape. This would rotate the page 90° to the right.

The new orientation would provide more space for the information contained in the spreadsheet and would be ideal for a scenario where there are a lot more columns that rows.

The use of desktop computer equipment and software to create high-quality documents such as newsletters, business cards, letterhead, and brochures is called Desktop Publishing, or DTP. The most important part of any DTP project is planning. Before you begin, you should know your intended audience, the message you want to communicate, and what form your message will take. The paragraph best supports the statement that *

Answers

Answer: the first stage of any proposed DTP project should be organization and design.

Explanation:

The options to the question include:

A. Desktop Publishing is one way to become acquainted with a new business audience.

B. computer software is continually being refined to produce high quality printing.

C. the first stage of any proposed DTP project should be organization and design.

D. the planning stage of any DTP project should include talking with the intended audience.

The paragraph best supports the statement that the first stage of any proposed DTP project should be organization and design.

This can be infered from the statement that "Before you begin, you should know your intended audience, the message you want to communicate, and what form your message will take".

I have a very quick question. So im applying for Early college and i need some future educational goals and maybe im just thinking about it ENTIRELY too much but what are some goals?? like are they asking for what i plan on doing in my future as in job?? Or what?? I put it in Computers and tech bc thats the subject i plan on pursuing

Answers

Answer:

no sé no entiendo inglés

Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleting temporary files Removing device drivers Organizing data Updating malware Removing partitions

Answers

Answer:

Cleaning inside the computer

Defragmenting the hard drive

Deleting temporary files

Organizing data

Explanation:

ASAP

There are two competing scientific theories that try to explain the illusion of animation. Which of these answers is NOT one of the competing theories?


Persistence of Vision


Image-permanence


Phi Phenomenon


The first who answers correct will get brainlest and those that are incorrected will be marked with a red flag.

Answers

It’s image-permanence. Hope that helps

a. What is computer




Answers

a computer is electronic machine that can perform two or more task

You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?

Answers

Answer:

change the NTFS permissions on the folder that you are sharing

Explanation:

In order to solve this, you are going to need to change the NTFS permissions on the folder that you are sharing. These are permissions that allow or prevent the files in that current system location from being modified. In order to do this, you will need to first, right-click on the folder that you are sharing. Next, click on "Properties" and head to the Security tab. Finally, choose the groups or user names of the individuals who have access and check allow on all the boxes. This will give them full control over the data in the folder.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?

Answers

Answer:

access the computer remotely

Explanation:

The best option would be to access the computer remotely. This allows you to remotely view the computer and control it from anywhere in the world. This allows you to take full control, analyze, and fix the problem that the individual is having without having to explain step by step to the user what they have to do. This can be accomplished through a direct IP connection or through a third-party software, which the user will need to have installed on their computer.

#It helps in the proper function ing of computer hardware.
1 Application Software
2Users
3 hardware software
4 system software

#_____is designed to solve a specific problem or to do a specific task
1 Application Software
2 System software
3 utility Software
4 user

#Set of programs which can sit of full set of document is termed as:
1 Database package
2 file package
3 bus package
4 Software package


#Translator for low level programming language were termed as:
1 Assembler
2 Compiler
3 Linker
4 Interpreter

#What is the name of a utility that protects your computer against downloading malicious code:
1 file compassion program
2 antivirus program
3 backup program
4 troubleshooting program

Answers

4- system software
2- application software
4- software package
1- assembler
2- antivirus program

How can you create a safe and secure password? Choose a password unassociated with your personal history. Choose the same password for every account you open. Choose a password consisting entirely of numbers. Choose two passwords and combine them into one.

Answers

Answer:

Choose a password unassociated with your personal history.

Explanation:

Your company provides testing services that help customers identify and resolve performance issues with their software and e-commerce sites before they go live. To perform accurate testing, a large number of computers are required, sometimes numbering in the hundreds.Recently, you have noticed that the lights in the testing lab seem dimmer than normal and sometimes flicker.Which of the following electrical terms BEST describes the condition you are most likely experiencing?A. BrownoutB. BlackoutC. Power spikeD. Power surge

Answers

Answer:

A. Brownout

Explanation:

From the description, it seems that the term that would best describe this would be a Brownout. This is because a brownout occurs when there is very low system voltage passing through the electrical system in comparison to the normal everyday voltage. This would cause lights to become dimmer because they are not getting the necessary voltage, while electrical devices would still function because they are still receiving the minimum voltage required. The sudden flicker may be due to certain devices shutting down in the company and therefore allowing a sudden surge of voltage to be used in the system.

escribe un texto argumentativo donde expreses tu opinión acerca del acoso cibernético ​

Answers

Respuesta:
El acoso cibernético es uno de los problemas menos tratados por la sociedad y a la vez uno muy recurrente. Este tipo de acoso rastrea a la persona a través de redes sociales y la investiga con fines degradantes para el afectado, sin embargo, para prevenir este se deben tomar medidas de seguridad como no compartir toda tu vida en el internet y así evitar estos casos que generalmente terminan con abuso sexual o secuestro.

Read the Python program below: num1 = int(input()) num2 = 10 + num1 * 2 print(num2) num1 = 20 print(num1) Question 1 When this program is executed, if the user types 10 on the keyboard, what will be displayed on the screen as a result of executing line 3? A. 30 B. 40 C. 10 + 10 * 2 D. 10 + num1 * 2

Answers

Answer

B. 30

Explanation:

Assuming the code is written like this:

1. num1 = int(input())

2. num2 = 10 + num1 * 2

3. print(num2)

4. num1 = 20

5. print(num1)

Line 3 will print 30 when the number 10 is inputted at line 1.

Remember to use Order of Operations! :)

Other Questions
Use properties to evaluate - (- = {)6.O A. 1B.c.-O D. 1 /SUBMIT Select the correct answer. How do the underlined words affect the meaning of this excerpt? A. They show how the statue brings out each townsperson's personality. B. They create an eerie atmosphere to indicate the statue is haunted. C. They indicate that the Town Leader plans to steal the Happy Prince statue. D. They suggest that the Happy Prince statue actually is not very happy. How many liters of carbon dioxide can be scrubbed, or removed, with 3.45 Liters of 0.10 M of lithium hydroxide solution? Question 12 ( 5 points ) Which behavior would best describe someone who is productive at work ? a) Multitasks as much as possible b) Takes frequent breaks to answer personal calls and emails c) Sticks to routines and prioritizes work d) Waits for directives from the boss before simple tasks he perimeter of the scalene triangle is 54.6 cm.A scalene triangle where all sides are different lengths. The base of the triangle, labeled 3 a, is three times that of the shortest side, a. The other side is labeled b.Which equation can be used to find the value of b if side a measures 8.7 cm? x^2-1/4y^2, if x=9, and y=2 Complete the paragraph by using the drop-down menus. hired burglars to break in to the Watergate complex, which was home to . A Nixon administration official named testified that the president knew about the break-in. Soon after, another official testified that a was located in the Oval Office. The Communist Revolution tried to stamp out the practice of religion by closing temples and expelling monks and nuns from monasteries because the communists believed ______ Group of answer choices that the main purpose of religion was to keep the oppressed classes of society from rebelling. that Karl Marx was a god. that everyone should be focused on science not superstition. all of these that the cult of personality was foolish. You are the regional sales manager for Standard Publishing Co. The company is preparing adjusting entries for the year ended March 31, 2021. On September 1, 2020, customers in your region paid $180,000 cash for three-year magazine subscriptions beginning on that date. The magazines are published and mailed to customers monthly. These were the only subscription sales in your region during the year. What amount should be reported on the income statement for subscription revenue for the year ended March 31, 2021 Molander Corporation is a distributor of a sun umbrella used at resort hotels. Data concerning the next months budget appear below: Selling price per unit $ 24 Variable expense per unit $ 18 Fixed expense per month $ 4,800 Unit sales per month 950 Required: 1. What is the companys margin of safety? (Do not round intermediate calculations.) 2. What is the companys margin of safety as a percentage of its sales? A state's lottery winner is promised $200,000 a year for twenty years (starting at the end of the first year). How much must the state invest now to guarantee the prize if the state can earn annually 7 percent on its funds? How much must the state invest if the annual payments were made at the beginning of the year? Which sentence describes a key feature of a collaborative discussion?Everyone asks quiz-type questions to see who can recall details about the book.Everyone votes on one student to represent the group and to do all of the speaking.Everyone is given an equal opportunity to share their thoughts and ideas.Everyone picks a side and then creates a debate until everyone agrees. who is thomas jeffersons brother? PLEASE HELP ME ASAP!!! The imagery in this excerpt most reflects A.the sense of sight to emphasize the fear that Doodle was feeling.B.the sense of sight to emphasize how difficult it was for the boys to see.C.the sense of sound to emphasize the frustration of the narrator.D.the sense of sound to emphasize the intense volume of the storm. Hello Guys I need help with...The highest common factor of 6x;,8xy Define Life in your own words be honest.What kind of life do you have.Write at least 7 line. Disability rights organizations backed laws requiringA. public places to provide access for people with disabilities B.free education for all children C.programs such as Medicare D.private homes to provide access for people with disabilities Evaluate 6 + 3b if b = 7 6 in.what is the area of the rhombus ? in..?6 in.6 in. 15.5 in.6 in.