Answer:
Match the feature to its function. The answers are as below:
1. Normal view the place where creating and editing occurs
2. Notes view an area in which information for handouts can be added
3. Slide pane the place where the slide order can be changed
4. Menu bar contains lists of commands used to create presentations
5. toolbars provide rows of icons to perform different tasks
Explanation:
It is the normal view where the editing and the creation of the slides occur. And it's the notes view where you can add the information for handouts. You can arrange the slides in the slide pane. And you can get a list of commands for creating the presentation in the Menu bar. Also, Toolbar is the rows of icons which helps in performing a various set of tasks. And all these are definitions and prove our above selections are correct.
One way parents and guardians can influence technology use is to establish set boundaries and model proper use for their children. Which of these outcomes would you expect if this guideline was followed?
Answer: Adults and children would look at things online together
Explanation:
Despite the many advantages that technology possesses, it can be dangerous when it's left all alone with children without proper monitoring.
There should be set boundaries and there should be proper use being modelled for their children. To do this, it's essential for the adults and the children to look at things online together.
The cafeteria is dark except for one light in the kitchen. The cafeteria manager is in there, counting lunch money. She says that there were some strangers in the school today and they ate lunch in the cafeteria.
Answer:
Explan
wha??! do u meana
Define computer with its prossing meaning
Answer:
The computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed. Today's computers have both kinds of programming.
Explanation:
did you mean-Define computer with its processing meaning. °•°
Computer is a device that takes input, processes it and gives us output.
To indent an entire paragraph or list you should:
A. Use the paragraph spacing icon
B. Use the select icon
C. Use the tab key on your keyboard
D. Use the decrease indent icon
Answer:
C. Use the tab key on the keyboard
(a easier and fastest way to add a indent in the paragraph)
Andy needs to rank the pages of his website according to importance. What tag will he use on the site map?
Andy will use the ____
tag to rank the pages of his website.
Answer:
tag. Title tags are used to set up those clickable headlines that you see in the SERP: ...
Meta description tag. ...
Heading (H1-H6) tags. ...
Image alt text. ...
Schema markup. ...
HTML5 semantic tags. ...
Meta robots tag. ...
Canonical tag.
Answer: the priority tag
Explanation:
edmentum
((GUITAR))
What is the letter name for the note shown above?
D
E
F
G
If the amount of food or resources available increases, the carrying capacity for an animal:
Answer: increases
Explanation:
The carrying capacity of an environment simply refers to the maximum population size of the species which the environment can sustain with the available resources such as food and water.
When the amount of food or resources available increases, then the carrying capacity for an animal: will increase as well. Assuming there's a reduction in resources, then there'll be reduction in carrying capacity.
There is___fatality rate among vulnerable road users.
A. a lower
B. an equal
c. a greater
PLEASE HELP!!! ILL MARK BRAINLIEST!!
Match each form of IPR to the protection it affords.
patent
trademark
copyright
protects the specific expression of a creation
protects signs, symbols, names, or short phrases
that reveal the origin of a product or service
protects the idea underlying a creation
Answer:
1. Copyright.
2. Trademark.
3. Patent.
Explanation:
A patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.
Generally, patents are used on innovation for products that are manufactured through the application of various technologies.
An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.
Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.
Basically, the three (3) main ways to protect an intellectual property is to employ the use of the following;
1. Copyright: protects the specific expression of a creation.
2. Trademark: protects signs, symbols, names, or short phrases that reveal the origin of a product or service.
3. Patent: protects the idea underlying a creation.
What came first, the internet or WIFI?
Answer: wifi
Explanation:
because you can't have the internet if you don't have wifi to power it up
Adrcle has a diameter of 4 inches. Which statement about the area and circumference of the circle is true?
A comparison of the area and circumference of the circle is not possible because there is not enough information
to find both
The numerical values of the circumference and area are equal
The numerical value of the circumference is greater than the numeste value of the area
The numerical value of the circumference is less than the numerical value of the area
Answer:
The numerical values of the circumference and area are equal
Explanation:
Area of a circle = πr²
Circumference of a circle = 2πr
Radius, r = diameter/2
= 4 inches/2
= 2 inches
r = 2 inches
π = 3.14
Area of a circle = πr²
= 3.14 * 2²
= 3.14 * 4
= 12.56 inches ²
Circumference of a circle = 2πr
= 2 * 3.14 * 2 inches
= 12.56 inches
Area of a circle = 12.56 square inches
Circumference of a circle = 12.56 inches
The numerical values of the circumference and area are equal
____coping skills are instinctive.
A. All
B. No
C. Some
Answer:
Some of them
explanation:
What is self management
Answer:
when you manage or construct something by yourself, taking full reponsiblity, etc
Explanation:
Your computer monitor’s power switch is in the ‘ON’ position; however, the display is blank. Which of the following is NOT a likely cause of the problem? *
1 point
the interface cable may be loose
the network adapter is malfunctioning
monitor may be in sleep/hibernate mode
the monitor controls are improperly adjusted
fill in the blanks:-
Advanced, began
1)photoshop cc is the_______ version of adobe photoshop CS6.
2)To complete the selection, return to the spot where you__________ and release the mouse button.
Answer:
we can talk here , and tell me about your self
Directions. Read and analyze the sentences below. There are words or phrases to be corrected. Rewrite it on the blank accrording to what you have learned in the lesson.
Full question attached
Answer and Explanation:
1. There’s need to ask for help and advice from people who have the
knowledge and skills in making a simple electrical gadget.
2. Adapter is used to plug appliances that are far from the main power source.
3. Do not touch the metal pipes while you are doing electrical repairs.
4. Shut off the power at the main switch or circuit breaker and unplug the equipment when working on electricity.
5. Pliers are tools used to grip, pull or cut electric wires.
From the above, we have corrected some of the errors that could be made in everyday home appliances or home electricity. In number 4, it is also worthy of note that shutting off power at the main switch will only require emergency situations otherwise we need only shut off the one for the problem circuit and leave the rest.
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications. You have launched the CloudHSM cluster but after just a few hours, a support staff mistakenly attempted to log in as the administrator three times using an invalid password in the Hardware Security Module. This has caused the HSM to be zeroized, which means that the encryption keys on it have been wiped. Unfortunately, you did not have a copy of the keys stored anywhere else.
How can you obtain a new copy of the keys that you have stored on Hardware Security Module?
Answer:
you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.
Explanation:
Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.
One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.
Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.
Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, which protection does the hashing activity provide
Answer: Integrity
Explanation:
Based on the information given, it should be noted that the protection that the hashing activity provides is integrity. In cryptography, hashing is used in the verification of integrity.
To determine integrity, comparison can be made between data and a hash value. When data is hashed at a particular time, the hash value is protected. Then, to ensure integrity, the data can then be hashed again after which it'll be compared to the protected value.
Which of the following type of software would be the MOST appropriate for showing information in tables and reports
Answer: B) Database Software
Explanation:
Desktop Publishing software and Multimedia software is not used for storing data, so it can't be that. Spreadsheet software stores data in cells, while Database software stores data in tables.
A
is an list of steps to complete a task. *
Explanation:
hope it helps
pls mark me brainliest thanks
______ language is written using 0's and 1's
Answer:
Binary language is written using 0's and 1's.
Explanation:
That language of 1's and 0's is called binary. Computers speak in binary because of how they are built.
First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newline followed by the string" reports.".
Ex: If the input is 3 70 65 75, the output is:
70 reports.
65 reports.
75 reports.
Answer:
The program in Python is as follows:
valCount = int(input())
reports = []
for i in range(valCount):
num = int(input())
reports.append(num)
for i in reports:
print(i,"reports.")
Explanation:
This gets input for valCount
valCount = int(input())
This creates an empty list
reports = []
This gets valCount integer from the user
for i in range(valCount):
num = int(input())
Each input is appended to the report list
reports.append(num)
This iterates through the report list
for i in reports:
This prints each element of the report list followed by "reports."
print(i,"reports.")
A _____ movement tries to improve a part of society, usually through legal methods.
Answer:
Revisionary
Explanation:
Summary of how I could use my Video Skills outside of school
Answer:
u can take videos of your journey
- enjoy the moment (like using videos in snap)
- you can record ur life
hope this helps
Answer:
you could make some videos for money
Explanation:
PLEASE HELP ILL MARK BRAINLIEST!!!
Which four of the following qualify as fair use?
using a quote from a book that you are reviewing for a school assignment
modifying an image from a website and using it in a flyer for a local business
making a photocopy of a data table for reference while writing an assignment
creating a video parodying a character in a popular movie
paraphrasing a scholarly article in a news report
Answer:
everything but the parody
Explanation:
enjoy
Answer:
modifying an image from a website and using it in a flyer for a local business
Explanation:
This is the only wrong answer.
In saving a Visual Basic project properly , which of the following: two components part are involved ?
A) Folder and Form
B) Form and File
C) Project and Form
D) Project and Data
Answer:
C) Project and Form
Explanation:
In saving a Visual Basic project properly, the following: two components part that is involved are:
1. Project - this is the project file that will be saved in the computer's memory. On the toolbar of a Visual Basic Editor, there is a "Save Project File" icon, which will be clicked to save a Project file.
2. File - the is the Visual Basic Editor's user interface. Just like "window" in Microsoft Office, it is the space used in writing or building the project file.
PLEASE HELP ILL MARK BRAINLIEST!!!
From which two international agreements do most nations derive their intellectual property laws?
Digital Millennium Copyright Act (DMCA)
Berne Convention
Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act (PROTECT IP or PIPA)
World Intellectual Property Organization (WIPO) Copyright Treaty
Stop Online Piracy Act (SOPA)
Answer:
I. Berne Convention.
II. World Intellectual Property Organization (WIPO) Copyright Treaty.
Explanation:
An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.
Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.
An intellectual property (IP) law can be defined as a legal framework and regulations that governs and protects an individual's or organization's intangible and innovative creation of the mind from unauthorized use by a third party. Thus, it is a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.
The two international agreements from which most nations derive their intellectual property laws are the Berne Convention and World Intellectual Property Organization (WIPO) Copyright Treaty.
The Berne Convention is an international agreement governing copyright for the protection and equal treatment of literary and artistic works. It was signed into law on the 9th of September, 1886 in Berne, Switzerland and was adopted by eight (8) countries.
The World Intellectual Property Organization (WIPO) Copyright Treaty is an international agreement under the Berne Convention and it governs the protection of literary and artistic works, as well as the rights of authors. It was signed into law on the 20th of December, 1996.
Answer:
Berne Convention
World Intellectual Property Organization (WIPO) Copyright Treaty
Explanation:
I got it right on the Edmentum test.
Which of the following would not be stored in a cell ?
A. Formula
B. Text
C. Number
D. Chart
Answer:
D
Explanation:
Because you can put formulas, text and numbers into a salad, but you can not put a chart interrupt because it won't fit in a cell.
The output for the following code will be: Pasta (1 mark)
My FavFood=Pasta
print (My FavFood)
Answer:
The output is "Pasta"
Explanation:
Given
The attached code segment
Required
The output
The first line of the program implies that:
MyFavFood="Pasta"
This means that, the value of the variable MyFavFood is string "Pasta"
Next,
print (MyFavFood)
This prints the value of the variable MyFavFood which is "Pasta"
Hence, the output is "Pasta"
What is the name of database of viruses that an antivirus software scan for?
Answer:
Anti virus scanner. i hope :)
Explanation: