Answer:
The file extensions of files created with Microsoft Office Access is .adb for Access project
The file extension of files created with Microsoft publisher is .pub
Explanation:
The file extensions of files created with Microsoft Office Access are;
.adp = Access project
.adn = Access blank project template
.accdb= Access database for 2007, 2010, 2013, and 2016 versions
Other file extensions include
laccdb, .accdw, .accdc, .accda, .accdr, .accdt, .mdb, .mda, .mdw, .mdf, .mde, .accde, .mam, .mad, .maq, .mar, .mat, .maf
The file extension of files created with Microsoft publisher is the .pub
The website allrecipes is a clearinghouse for recipes of all kinds, with users being able to post new ones as well as try and comment on the recipes of others. Members can get personalized recommendations and find ways to use ingredients they already have on hand. The allrecipes website would be considered
Answer:
The right answer is "web community ".
Explanation:
A digital community, commonly known as a social community as well as a web community, seems to be a virtual environment where representatives predominantly communicate over the internet. They become web-based community centers for stakeholders, specialists, collaborators, and many others to resolve issues, post feedback, including communicate with someone on the goods, services, and reputation of an organization. For several internet platforms, a "gang of silly superstitions" can feel most comfortable.Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?a. /23b. /24c. /27d. /28
Answer:
The answer is "Option c"
Explanation:
In the given question only option c is correct because "/27" is the IP "255.255.255.224" is the same as "/27" in the terminology in CIDR, in which it uses the compact IP address as well as corresponding prefix expression and it terminology consists of an IP with a slash ('/') or a decimal number. Its count of 1-bit proceeding to the mask traditionally referred to it as the network mask.
You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?
a. motherboard
b. CPU
c. graphics card
d. sound card
Answer:
all options
a, b and c the most important
Explanation:
Payroll deductions are the same for all employees. True False
Answer:
The answer is "False".
Explanation:
The Payroll deductions are the amount of each pay period, that is paid out of the paycheck of the employee. It is also considered as the money, which is deducted from its employees' paychecks so, if paid by the employers.
All staff members are not identical. Workers' paychecks determine the amount individuals receive during each pay cycle. It also is referred to it as payroll retainers.
Xavier wants to use a solver to find optimal solutions for a decision problem. What should he select as X in the series of clicks for this purpose: Data tab > X > Solver > Enter Solver parameters (read on) > Check "Make Unconstrained Variables Non-Negative" > Select "Simplex LP" > Solve?
Answer:
The answer is "Analyze"
Explanation:
The term Analyze is the use of a machine or critical thinking to enable more effective management by companies and their information systems, in which the Xavier wishes to use a method for solving to find ideal decision-making strategies. Its object of the series analyses X selects, that's why the "Analyze " is correct.
ou have spent the last two hours creating a report in a file and afterwards you use cat to create a new file. Unfortunately the new file name you used was the same as the name you used for the report, and now your report is gone. What should you do next time to prevent this from happening
Answer:
The answer is "Set -o noclobber command before starting."
Explanation:
Whenever this prevent is happening we set the -o noclobber command, this command( -o noclobber ) is used to prevents its > driver to overwrite system files. Or whenever the user may want to violate their file in certain cases. For this case, users can use > instead of just turn -o noclobber off! Push the formal file.
can anyone please help me with this
Answer:
This should do it. I assume the alignment of the numbers is not important?
<!DOCTYPE html>
<html>
<head>
<style>
table {
border-collapse: collapse;
font: 15px Verdana;
font-weight: bold;
}
table, td {
border: 1px solid black;
}
td {
width: 80px;
height: 80px;
text-align: center;
}
</style>
</head>
<body>
<table>
<tr>
<td>1</td>
<td>2</td>
<td>3</td>
<td>4</td>
</tr>
<tr>
<td colspan="2">5</td>
<td>6</td>
<td rowspan="2">7</td>
</tr>
<tr>
<td>8</td>
<td>9</td>
<td>10</td>
</tr>
</table>
</body>
</html>
100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from a server. From your computer, you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate
Answer:
The two factors are:
The default gateway The routersExplanation:
Default gateway:
The default gateway transmits individual information back and forth between the network. This is most consumers and commercial workplaces seem to be a router whereby channels communication from either the local area network to something like the cables or Cellular networks that transfer that one to the broadband service.The routers:
A router would be the first safety boundary from even being intruded into a channel. Order to enable the highest possible level of device public safety eventually turns such as the proxy server into something.Design a webpage on Artificial Intelligence/augmented reality
Answer: is there even an answeR for this? Anyway plz do my question. If you are looking for web page options thou I would offer a Alexa vs VR
Explanation:
Website reputation is an important part of page quality (PQ) rating. Reputation can justify the Highest rating and the Lowest rating.
Answer:
The given statement is false.
Explanation:
A Website reputation seems to be a built-in feature or tool. It retains knowledge about users, through visiting pages. The committed resources for this site depending on either the website as well as the basic details about its design. The reputation including its Website has been used to strengthen the safety of phishing attacks or malicious content.Therefore the solution given above is the right one.
Who are the founders of Microsoft?
Answer:
BILL GATES & PAUL ALLEN
Explanation:
HOPE IT HELPS!!!!!!!!!!!!!!!!!!!!!
When developing a new software package, logically, the software must be designed before the code is written, and the code must be written before it is tested. These activities are dependent on each other by _________ constraints.
Answer: Technical
Explanation: When making decisions, we may have to follow a certain pattern or order due to restrictions brought about by circumstances rules or conditions. These restrictions or limitations are regarded to as constraints. Technicality may be explained as the knowledge, expertise or initiative required for an operation, production or design. Therfore, we may view technical constraint as limitations or restrictions brought about by the technical guidelines or expertise required for a certain products. From a technical perspective, before a software package can be built, the engineer must know why and what he wants the software to be capable of doing, then he writes the code then tests the code. It is a sequence, a test cannot be performed without a written code and code cannot be written without a planned design.
How do I make my mobile number appears switched off to a specific number not with truecaller app...(vivo user)
Answer:
Hello, there is no way you can make your mobile number appear switched off to a particular number unless you really switch it off.
However, you can set your phone to "Call Forwarding" on your Android device. What it would do is that when the person calls your number, he gets the message that you are unreachable.
Explanation:
Here's how to set Call Forwarding on your android
Open your phone dialerGo to your Phone Settings Click on Call SettingsSelect Call Forwarding (in some Androids, you'll have to select 'Calling Accounts' first)Select 'Always Forward', 'When Busy', 'When Unanswered' or 'When Unreachable'After selecting your preferred option, you can set the forwarding numberEnable the settings or click 'Ok'state the function of font group in the home tab
Explanation:
This group provides access to all the Character Formatting commands.
In python,_______ are used to define the conditions necessary for a while loop to run.
Answer:
Relational Operators
Explanation:
We can make a while loop run only when some variable or whatever is relative to something else.
The valid operators are:
<, >, =, <=, >=, and =!
Hope this helped!
Answer:
sorry not sure
Explanation:
A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.
Answer:
A. Document findings, actions, and outcomes.
F. Run a virus scan.
Explanation:
When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O
Answer:
The answer is "Option d".
Explanation:
In the question, the numbering of the choices is missing so, in the attached the file defines it numbering after that we provide its solution:
In the question the "option d" is correct, because when we call the function "stop", it ends the store space assigned to the local variables and "called" function parameters, since the variables are no longer used, so the memory is released and once the process is called, the memory is reassigned and then once again assigned when the function ends.
An IP subnetting design requires 200 subnets and 120 hosts/subnet for the largest subnets, and requires that a single mask be used throughout the one private IP network that will be used. The design also requires planning for 20 percent growth in the number of subnets and number of hosts/subnet in the largest subnet. Which of the following answers lists a private IP network and mask that, if chosen, would meet the requirements?a. 10.0.0.0/25b. 10.0.0.0/22c. 172.16.0.0/23d. 192.168.7.0/24
Answer:
b. 10.0.0.0/22
Explanation:
Variable length subnet masking is a concept in networking that helps minimize wasting of Ipv4 ( IP version 4) network addressing. It takes a networking address and splits it to variable length.
The question above requires 120 hosts and a future host update of 20%, which is 144 hosts and a subnet of the same address of 200 to 240 in update. The host octet of the network address is totally used, which gives 254 hosts, that is extract 110 hosts. This can be further subnetted.
The two bits from the third octet is used for subnetting to give over 240 subnet mask.
You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It appears to include all of the classification markings including portion, banner, and classification authority block. Is this information authorized for use as a source of derivative classification?
Answer:
Yes
Explanation:
A classified information is piece of information that is hidden from public eyes as it could threaten national security if exposed
A derivatively classified piece of information is a piece of information document that extracts information from a classified information source and incorporates this information into the document. These classified documents bear classification markings which are used to show that the information is classified and give instructions on handling and dissemination. A derivative classifier is one who develops classified information using authorized classified information sources
Section 1.4 of Executive Order 13526 lists categories of information eligible for classification
what is the importance of personal computers in connecting to the internet ?
^please I need an answer, PLEASE ^
Answer:
if you dont you wont be able to do school work or check your email
Explanation
Answer:
security because it very important when we use internet
Difference between switch case and if else statement.
Answer:
SWITCH CASE:☆ STATEMENT WILL BE EXECUTED IS DECIDED BY USER.
☆ SWITCH STATEMENT EVALUATES ONLY CHARACTER 《OR 》INTEGER VALUE.
☆ IT USING SINGLE EXPRESSION FOR MULTIPLE CHOICES.
IF - ELSE STATEMENT.☆ STATEMENT WILL BE EXECUTED DEPEND UPON THE OUTPUT OF THE EXPRESSION INSIDE.
☆ IF THE STATEMENT EVALUATES INTEGER, CHARACTER, POINTER《 OR 》FLOATING- POINT TYPE 《 OR 》BOOLEAN TYPE.
☆ IF USING MULTIPLE STATEMENT FOR MULTIPLE CHOICES.
HOPE IT HELP....
how can development in ICT be utilized to speed up the development and integration efforts
Answer:
Explanation:
1. Sustainability and scale
2. Lack of knowledge
3. Pace of change
4. Funding
5. Changing roles and norms
The game begins with the player having 20 POINTS
The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.
If the POINT is a 7 or 11, the player wins his POINT
If the POINT is a 2, 3, or 12, the player loses his POINT
If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until
The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT
The player rolls a 7 and then he loses his POINT.
The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS
After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work
Answer:
Following are the code to this question:
import random#import package for using random method
def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable
dice1 = random.randint(1,6)
dice2 = random.randint(1,6)
return dice1 + dice2
def rolling(): # defining method rolling
n_roll = 0 # defining num variable that initial value that is 0.
p = 20 # defining variable p for looping, that points in between 1 and 59
while p > 0 and p < 60: # defining loop that counts value dice value two times
d = rolling_dice()#defining d variable that hold method value
n_roll+= 1 #defining n_roll that increment n_roll value by 1
if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable
p+= d # use p variable that adds d variable
elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator
p-= d#defining d variable that decreases d variable variable
else: # defining else block
p1 = d # using p1 variable that store d value
while True:# defining loop that calculates values
d = rolling_dice()#defining d variable that holds method values
n_roll += 1 #increment the n_roll value by 1
if d == 7:#defining if block that checks d value equal to 7
p -= p1#subtract the value of p1 in p variable
break # exit loop
elif d == p:#defining elif block to check d value is equal to p
p += p1#adds the value of p1 in p variable
break#using break keyword
if p<= 0:#defining if block that checks p-value is less then equal to 0
print('Player lost')#using print method
elif p>= 60:#defining else block that checks p-value is greater than equal to 60
print('Player won')#using print method to print the value
print('number of dice rolls:', n_roll)#use print method to print n_rolls value
rolling()
Output:
Player lost
number of dice rolls: 38
Explanation:
In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.
In the next step, another method the "rolling" is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.Could Anyone help me with these two questions?
Answer:1st is b
2nd is d
Explanation:
You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on hand. Another file, called music, lists the music books and scores you own. When you enter the command paste strings music, what happens
Answer is given below
Explanation:
when performing in computer and we have two files on the computer first one is string and another one is the music list so when we enter the command paste strings music than there will they display side by side on the screen.and on the left side of lists the string in screen and the right side is columns list the music bookA(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
Answer:
incremental
Explanation:
An incremental backup backs up only the files on a computer that have changed since the last time a backup was performed.
Which statement is true about teams?
Answer:
Which is true of jet streams
A The subtropical jet stream flows to the east while the polar jet stream flows to the west
B The subtropical jet stream lies between the westerlies and polar easterlies
C The polar jet stream is generally stronger than the subtropical jet stream
D The polar jet stream lies between the polar easterlies and trade winds
The subtropical jet stream lies between the westerlies and trade winds.
Jet stream is defined as "a narrow, variable band of very strong, predominantly westerly air currents encircling the globe several miles above the earth." Each hemisphere has 2 or 3 primary jet streams that follow their same basic courses.
Explanation:
A team is a more collaborative and joint organization of individuals that function to perform similar set of tasks. The team all members work in accords with each other and complete the tasks on time.
The team is formed by a like minded people and has all characteristics of cooperation, coordination and friendliness. Thus the option D is correct . A Teams is more productive than with fewer individuals.Learn more about the true about teams.
brainly.com/question/12078417.
Yara needs to provide step-by-step instructions to her staff on how to use a new system for
conducting performance reviews. What is the best tool for communicating this information?
A) Spreadsheet
B) Email
C) Direct messaging
D) Slides
Answer:
D) Slides
Explanation:
A slide is exactly one page of presentation commonly used in PowerPoint. It is usually shown via a series of image slides on a projected screen.
This is the best tool Yara needs to provide step-by-step instructions to her staff on how to use a new system for conducting performance reviews.
Slides would be very helpful as they would show the steps one at a time to the members of Yara's staff so they can learn better and faster.
What is the key function of a sales team?
A. to maintain customer-retailer interaction
B. to create appealing advertisements
C. to maintain fan–developer communication
D. to develop customer–fan relationships
Answer:
A. to maintain customer-retailer interaction
Explanation:
A sales team is a subdivision in a company that is dedicated to making sales for the company and they are responsible for meeting the growth goals of that company.
The key function of a sales team is to maintain a healthy customer-retailer relationship or interaction because it is from this good relationship that goods and services are sold.
client, Warren, reports CMOS mismatch errors at startup. Further conversation with Warren reveals that he had forgotten the startup password he assigned in CMOS, and he had to clear all CMOS settings for his computer to complete a successful startup. Although he can now start his computer, he continues to observe CMOS errors each time he starts the computer. He replaced the CMOS battery, but the problem continues. Which component should you investigate first to resolve the problem
Answer:
The answer is "The system board jumper settings "
Explanation:
It must first look only at jumpers configurations of its computer motherboard, especially that runner used it to clear the CMOS configuration.
This Jumper is a couple of connecting points positioned also on computer CPU socket or connector card, electric contacts. It placed to jump on the pads, which completes a contact, once they set a jumper. It acts as a switch if an electrical grid is closed or opened.