Answer:
gnu gpl
no registration
Answer:
1.non perpetual license 2. no expiration date
Explanation:
In saving a Visual Basic project properly , which of the following: two components part are involved ?
A) Folder and Form
B) Form and File
C) Project and Form
D) Project and Data
Answer:
C) Project and Form
Explanation:
In saving a Visual Basic project properly, the following: two components part that is involved are:
1. Project - this is the project file that will be saved in the computer's memory. On the toolbar of a Visual Basic Editor, there is a "Save Project File" icon, which will be clicked to save a Project file.
2. File - the is the Visual Basic Editor's user interface. Just like "window" in Microsoft Office, it is the space used in writing or building the project file.
The cafeteria is dark except for one light in the kitchen. The cafeteria manager is in there, counting lunch money. She says that there were some strangers in the school today and they ate lunch in the cafeteria.
Answer:
Explan
wha??! do u meana
Why is https used in every link of a website?
Answer:
As a request-response protocol, HTTP gives users a way to interact with web resources such as HTML files by transmitting hypertext messages between clients and servers. HTTP clients generally use Transmission Control Protocol (TCP) connections to communicate with servers.
To indent an entire paragraph or list you should:
A. Use the paragraph spacing icon
B. Use the select icon
C. Use the tab key on your keyboard
D. Use the decrease indent icon
Answer:
C. Use the tab key on the keyboard
(a easier and fastest way to add a indent in the paragraph)
what part of the meat help you identify the less tender cuts
If a muscle gets a lot of exercise in an animal it will be a less tender cut of meat.
An engineer learns a new security threat mitigation technique. The technique maps an IP address to a non-existent host, and is useful in stopping denial of service attacks. Traffic heading to these IPs can be captured for analysis or discarded. Considering the given strategies, which does this technique relate to? Select all that apply.
A. Black hole
B. Sinkhole
C. Forward proxying
D. Reverse proxying
Your computer monitor’s power switch is in the ‘ON’ position; however, the display is blank. Which of the following is NOT a likely cause of the problem? *
1 point
the interface cable may be loose
the network adapter is malfunctioning
monitor may be in sleep/hibernate mode
the monitor controls are improperly adjusted
PLEASE HELP ILL MARK BRAINLIEST!!!
Which four of the following qualify as fair use?
using a quote from a book that you are reviewing for a school assignment
modifying an image from a website and using it in a flyer for a local business
making a photocopy of a data table for reference while writing an assignment
creating a video parodying a character in a popular movie
paraphrasing a scholarly article in a news report
Answer:
everything but the parody
Explanation:
enjoy
Answer:
modifying an image from a website and using it in a flyer for a local business
Explanation:
This is the only wrong answer.
Summary of how I could use my Video Skills outside of school
Answer:
u can take videos of your journey
- enjoy the moment (like using videos in snap)
- you can record ur life
hope this helps
Answer:
you could make some videos for money
Explanation:
If the amount of food or resources available increases, the carrying capacity for an animal:
Answer: increases
Explanation:
The carrying capacity of an environment simply refers to the maximum population size of the species which the environment can sustain with the available resources such as food and water.
When the amount of food or resources available increases, then the carrying capacity for an animal: will increase as well. Assuming there's a reduction in resources, then there'll be reduction in carrying capacity.
Which phrases suggest that Bob is a web administrator?
Bob logs in to his computer. He checks his email. He then researches online for a system upgrade of a new machine. He fills his timesheet at
his organization detailing the tasks completed during the week. Later in the day, Bob creates a weekly backup from a remote web server.
"creates a weekly backup from a remote web server"
This implies that he is the owner of the server since, one, he backs it up every week, and two, he has access to create a backup.
Which of the following would not be stored in a cell ?
A. Formula
B. Text
C. Number
D. Chart
Answer:
D
Explanation:
Because you can put formulas, text and numbers into a salad, but you can not put a chart interrupt because it won't fit in a cell.
A device that records images of text, or converts printed text into machine-readable form is called a?
Answer:
Its called a scanner
Explanation:
Its a device that helps enable in the reading of daya and info printed on paper like a text, image, photos, and drawing by using optical tech
Which slide should you change so that it reflects on all the slides of your presentation?
Any change that you make to the
will reflect throughout the slides of your presentation.
Answer:
SLIDE MASTER
Explanation:
Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, which protection does the hashing activity provide
Answer: Integrity
Explanation:
Based on the information given, it should be noted that the protection that the hashing activity provides is integrity. In cryptography, hashing is used in the verification of integrity.
To determine integrity, comparison can be made between data and a hash value. When data is hashed at a particular time, the hash value is protected. Then, to ensure integrity, the data can then be hashed again after which it'll be compared to the protected value.
What is self management
Answer:
when you manage or construct something by yourself, taking full reponsiblity, etc
Explanation:
Define computer with its prossing meaning
Answer:
The computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed. Today's computers have both kinds of programming.
Explanation:
did you mean-Define computer with its processing meaning. °•°
Computer is a device that takes input, processes it and gives us output.
fill in the blanks:-
Advanced, began
1)photoshop cc is the_______ version of adobe photoshop CS6.
2)To complete the selection, return to the spot where you__________ and release the mouse button.
Answer:
we can talk here , and tell me about your self
Give five examples of top level domain
Answer: .com — Commercial businesses.
.org — Organizations (generally charitable).
.net — Network organizations.
.gov — U.S. government agencies.
.mil — Military.
.edu — Educational facilities, like universities.
Explanation:
Hope this helps!!! :)
PLEASE HELP!!! ILL MARK BRAINLIEST!!
Match each form of IPR to the protection it affords.
patent
trademark
copyright
protects the specific expression of a creation
protects signs, symbols, names, or short phrases
that reveal the origin of a product or service
protects the idea underlying a creation
Answer:
1. Copyright.
2. Trademark.
3. Patent.
Explanation:
A patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.
Generally, patents are used on innovation for products that are manufactured through the application of various technologies.
An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.
Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.
Basically, the three (3) main ways to protect an intellectual property is to employ the use of the following;
1. Copyright: protects the specific expression of a creation.
2. Trademark: protects signs, symbols, names, or short phrases that reveal the origin of a product or service.
3. Patent: protects the idea underlying a creation.
____coping skills are instinctive.
A. All
B. No
C. Some
Answer:
Some of them
explanation:
What came first, the internet or WIFI?
Answer: wifi
Explanation:
because you can't have the internet if you don't have wifi to power it up
A
is an list of steps to complete a task. *
Explanation:
hope it helps
pls mark me brainliest thanks
______ language is written using 0's and 1's
Answer:
Binary language is written using 0's and 1's.
Explanation:
That language of 1's and 0's is called binary. Computers speak in binary because of how they are built.
Which is the default data type of Ms-Access? (i) Memo (ii) Number (iii) Text (iv) Auto number
Answer:
(iii) Text
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Hence, a software that enables the organization to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data, is called a Data Base Management System (DBMS).
Text is the default data type of Microsoft Access (Ms-Access).
First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newline followed by the string" reports.".
Ex: If the input is 3 70 65 75, the output is:
70 reports.
65 reports.
75 reports.
Answer:
The program in Python is as follows:
valCount = int(input())
reports = []
for i in range(valCount):
num = int(input())
reports.append(num)
for i in reports:
print(i,"reports.")
Explanation:
This gets input for valCount
valCount = int(input())
This creates an empty list
reports = []
This gets valCount integer from the user
for i in range(valCount):
num = int(input())
Each input is appended to the report list
reports.append(num)
This iterates through the report list
for i in reports:
This prints each element of the report list followed by "reports."
print(i,"reports.")
Explain two ways by which the calendar meets or fails to meet the criteria of showing the correct data
Answer:
The two ways the calendar meets the criteria of showing the correct date are;
1) The calendar can give dates in the 12 months in a year
2) The calendar can show up to the 31 different days in a month
Explanation:
The two ways in which the calendar meets the criteria of showing the correct date are;
1) The number number of long blocks with 4 different months each = Three
Therefore, the total number of months the blocks can hold = 3 × 4 months = 12 months = The number of months in a year
2) The number of faces on each dice = 6 faces
The number of dice = 2 dice
The total number of faces = 12
The number of identical faces = 2 (11th and 22nd of the month)
The number of unique faces = 10
The number of combinations of the dices = ₁₀C₂ = 45
The number of combination of faces required to show = 1 to 31 = 31 combination
Therefore, there are adequate combinations on the dice to show all the dates of month
Alt +f4 is a short cut of close a document in MS word /ture /false
Answer:
True.
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.
In Computer science, there are specific key combinations (short cut) that avail end users the opportunity to perform specific functions without having to go through a series of step.
For example, when you press the Alt button and function key 4 (F4) at the same time, it would close the current open window.
Hence, Alt + F4 is a short cut key that can be used to close a document in MS word.
The output for the following code will be: Pasta (1 mark)
My FavFood=Pasta
print (My FavFood)
Answer:
The output is "Pasta"
Explanation:
Given
The attached code segment
Required
The output
The first line of the program implies that:
MyFavFood="Pasta"
This means that, the value of the variable MyFavFood is string "Pasta"
Next,
print (MyFavFood)
This prints the value of the variable MyFavFood which is "Pasta"
Hence, the output is "Pasta"
There is___fatality rate among vulnerable road users.
A. a lower
B. an equal
c. a greater