you press the F9 key to convert an object to a symbol true or false​

Answers

Answer 1

Answer:

False,

Reason

F8 key is used for the coversion of object to symbol


Related Questions

hardware and software are........... to each other​

Answers

Answer:

Hardware and software are interconnected to each other​

Hope this is what you´re looking for!

Define Artificial Intelligence(AI) in 5 sentence​

Answers

Answer:

Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. ... The ideal characteristic of artificial intelligence is its ability to rationalize and take actions that have the best chance of achieving a specific goal.

which of the following would not transmit signals from one point to another? a. telephone line. b. modem. c. fibre optics. d. coaxial cable​

Answers

Answer:

b

modem

Explanation:

modem is used to receive signals not transmit

1. Answer the following questions: a. What are the different types of number system? Name them.​

Answers

Answer:

binary,decimal, hexadecimal and octal number system

Analog computers are general purpose computers : true ? or false ?​

Answers

Answer:

false

Explanation:

Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.

When media is used to communicate with a very large audience, it is referred to as media.

Answers

Answer:

mass media

Explanation:

Answer:Mass media communication

Explanation:

You are working as a Solutions Architect in a large healthcare organization. You have many Auto Scaling Groups that you need to create. One requirement is that you need to reuse some software licenses and therefore need to use dedicated hosts on EC2 instances in your Auto Scaling Groups. What step must you take to meet this requirement

Answers

Answer:use launch template with your ASG

Explanation:

Select the best answer for the ques
12. A business has a goal of communicating frequently with its customers to offer specials and increase sales. What element should it consider adding to its website
O A. Database
O B. Payment system
O C. Calendar
O D. Mailing list opt-in

Answers

The element that should consider adding to its website is Mailing list opt-in. Option D is the correct answer.

Adding a mailing list opt-in to the website would allow the business to collect email addresses from customers who are interested in receiving updates, specials, and promotions.

By building a mailing list, the business can communicate frequently and directly with its customers, informing them about new products, exclusive offers, and other relevant information.

Having a mailing list opt-in provides several advantages. Firstly, it gives the business a direct channel of communication with customers, allowing them to reach a targeted audience interested in their products or services.

Secondly, it helps to increase sales by sending promotional emails and offers to the subscribers, which can encourage them to make purchases. Lastly, it enhances customer engagement and loyalty as customers feel connected to the business and stay informed about its latest offerings. Option D is the correct answer.

For such more question on element:

https://brainly.com/question/4966688

#SPJ8

What does RoHS stand for and why is RoHS compliance important?

Answers

Answer:

It stands for Restriction of Certain Hazardous Substances.

Web search says it is important because,

RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.

Explanation:

express in Qbasic assignment statement
[tex]v = \ \sqrt{t} ^{2} - 4s \div {d}^{4} [/tex]

[tex]K = {8}{x} ^{3} - {2}{y}^{ 6} \div {5}{d}+ {e}^{4} [/tex]

Answers

Answer:

v = sqr(t^(1/2)) - 4 * s / d^4

K = 8 * x^3 - 2 * y^6 / 5 * d + e^4

Explanation:

Given

[tex]v = \ \sqrt{t} ^{2} - 4s \div {d}^{4}[/tex]

[tex]K = {8}{x}^{3} - {2}{y}^{ 6} \div {5}{d}+ {e}^{4}[/tex]

Required

The equivalent in Q Basic

To solve this, we use the following rules:

+ , - and * are written as + , - and *

[tex]\div[/tex] is written as /

^ stands for raise to power

SQR is used for square

^(1/2) stands for square root.

So, the equivalents of the above statements are:

v = SQR(t^(1/2)) - 4 * s / d^4

K = 8 * x^3 - 2 * y^6 / 5 * d + e^4

explain the types of computer on the basis of model

Answers

XT(extra technology) computer: it cannot support GUI Based operating system. its processing speed is 477MHz

AT(advanced technology):it supports GUI Operating system. Its processing speed is 2GHz

PS/2:is a laptop computer which is rechargeable

and battery powered. it's operated with OS/2 operating system.

PLEASE MARK AS BRAINLIEST

Answer:

XT Computers (Extended Technology)  

AT Computers (Advanced Technology)

PS/2 Computers (Personal System 2)

Explanation:

XT Computers :  

            The computers having 8086 or 8088 microprocessor and processing speed of 4.77 Mhz are known as XT Computers. These computers are outdated now because they cannot run on latest software versions.

AT Computers :  

                  The computers having 80286 or later versions of microprocessors are known as AT Computers. Their storage capacity as well as speed is much higher than XT computers. Besides that they have math  co-processor to support main processors to perform complex mathematical calculations.

PS/2 Computers:

                  IBM developed another model of computer in 1990 that have much advanced architecture design that AT computers. They are known as PS/2 computers. They are much faster than AT computers. Most of the laptop computers based on PS/2 model use OS/2 or UNIX operating system and 1.44 MB floppy diskette.

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?

Options are :
A. Enable the host-based firewall on the Internet server
B. Enable HIPS to protect the server until the patch is released
C. Utilize WAF to restrict malicious activity to the Internet server
D. Downgrade the server and defer the new feature testing

Answers

Answer:

i think its C. Utilize WAF to restrict malicious activity to the Internet server

Which of the following are characteristics of centralized version control systems? Select 3 options.

A full copy of all project files is stored on each developer's computer.

Changes to the project are stored in a log file on each developer’s computer.

It allows many developers to work on the same project from anywhere at the same time.

Project files are maintained in a central repository.

The process may require file locking, depending on file type.

Answers

Answer:

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Explanation:

The two main types of version control system are the centralized version control system and distributed control system

The centralized version control system is a control system whereby all programmers work on and make their individual changes to a single single copy of the project stored and maintained in a central repository, such as a server

In order to solve the problem of several developers working on each others work simultaneously, a centralized version control system makes use of the lock-modify-unlock model

The three options are therefore;

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Answer:c d e

Explanation:

PLS HELP ME WITH MY PYTHON HW

Answers

Answer:

name=input('What is your name?')

age=input('What is your age?')

school=input('What is your school?')

print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')

age=int(input('What is your age?'))

if age > 10:

 print('You are a teenager')

for x in range(10):

 print(name)

country='United States or America'

print(country[17:24])

a_list = [0, 2, 4, 8]

maximum = max(a_list)

print(maximum)

minimum = min(a_list)

print(minimum)

numbers = [1, 3, 4, 2]

numbers.sort()  

print(numbers)

What does this mean? it is coming after i ask a question

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

Answer:

To my own opinion I think it means that when you're answering a question here in brainly I think they are referring that your message is rude but sometimes you are not rude but I don't know. Maybe it could be some difficult technical problems.

Which computer can be used where there is no regular electricity?​

Answers

Answer:

A mechanical computer

Explanation:

Created from gears and levers

the paint 3D program is used for drawing picture true or false​

Answers

Answer:

The answer is TRUE we use paint program to draw.

Explanation:

#swag

Answer is truee the paint 3d program is used for drawing pics

Ben is working in an IT services organization that uses the National Institute of Standards and Technology (NIST) functional impact categories to describe the impact of incidents. During a recent construction project, a contractor plugged a network device to the same switch twice, resulting in a network loop and taking down the organization's network for one-third of its users. Which functional impact category should Ben use to classify the event given in the scenario

Answers

Answer:

Medium

Explanation:

The functional impact category in NCCIC Cyber Incident scoring system considers incident impact to the organization. This category isn't severe and can result from such things as minor network breakdowns in the organization. It is given a priority score according to the scoring system of medium which is yellow in the priority level.

A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101. What is the decimal value of the host portion of the address?

Answers

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

Express your opinion on whether a successful business analyst can be a good programmer. support your answers with reason

Answers

I think that a successful business analyst could be a good programmer because if they had the write training and experience they could learn about that field of work and become good at programming

Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard

Answers

Hiii I think the best option would be C. Core

The number of swappings needed to sort the number 8, 22, 7, 9, 31 in ascending order, using bubble sort is

Answers

Answer:

3

Explanation:

swap the 7 with the 22

swap the 7 with the 8

swap the 9 with the 22

Which is the correct html for creating a hyperlink pls answer

Answers

Answer:

c

Explanation:

The correct HTML for creating a hyperlink is <a>http://www.w3c.org</a>. The correct option is c.

What is a hyperlink?

The coding that organizes a web page's content is called HTML (HyperText Markup Language). Content may be organized using paragraphs, a list of bulleted points, graphics, and data tables, among other options.

A hyperlink in computers, or simply a link, is a digital pointer to information that the user can follow or be directed by tapping or clicking. A hyperlink directs readers to either the entire document or a specific section within it. Text having links is known as hypertext. An anchor text is a text from which a link is made.

Therefore, the correct option is c. <a>http://www.w3c.org</a>.

To learn more about hyperlinks, refer to the link:

https://brainly.com/question/9483034

#SPJ2

ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use

Answers

Server and network is 2 different things, just put the server on a different network.  ;) duh

Explanation:

Helpppppppppppppphuhuh

Answers

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a "paper license" and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit on the number of times the key can be used. You decide to update all 20 users.
Which of the following are possible consequences of this decision? (Select TWO.)

• The software will eventually stop working properly for the 10 extra updates you installed.
• You risk losing your job.
• The software company will never detect the violation so negative consequences are unlikely.
• There are no consequences. By law, you are allows 1 to 3 activations per user.
• Your company is exposed to litigation by violating the software license agreement.

Answers

Answer: You risk losing your job.

You expose your company to litigation by violating the software license

Explanation:

The possible consequences of the decision are you risk losing your job and your company is exposed to litigation by violating the software license agreement. The correct options are b and e.

What is a software update?

The software will never be flawless. It should come as no surprise that developer companies regularly offer updates to encourage fixes in software and video games. These adjustments are accomplished via programs referred to as "patch," which literally translates to "mend."

Almost all software has issues like bugs and vulnerabilities when it is released, even if it has been rigorously tested through numerous trial versions. Here's when the patch is useful: It will create a number of patches to fix issues found by programmers or even regular users.

Therefore, the correct options are

b. You risk losing your job.

e. Your company is exposed to litigation by violating the software license agreement.

To learn more about the software update, refer to the link:

https://brainly.com/question/1090549

#SPJ5

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

What contains programming statement written in VB?​

Answers

Answer:

A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.

Other Questions
the Period T of oscillation of a Single Pendulum depends on the length l, and acceleration g. Determine the exact form of the dependence. Mother and Daughter Enterprises is a relatively new firm that appears to be on the road to great success. The company paid its first annual dividend yesterday in the amount of $.28 a share. The company plans to double each annual dividend payment for the next three years. After that time, it is planning on paying a constant $1.50 per share indefinitely. What is one share of this stock worth today if the market rate of return on similar securities is 11.5% Dave and Ellen are newly married and living in their first house. The yearly premium on their homeowner's insurance policy is $450 for the coverage they need. Their insurance company offers a 5 percent discount if they install dead-bolt locks on all exterior doors. The couple can also receive a 2 percent discount if they install smoke detectors on each floor. They have contacted a locksmith, who will provide and install dead-bolt locks on the two exterior doors for $50 each. At the local hardware store, smoke detectors cost $7 each, and the new house has two floors. Dave and Ellen can install them themselves. Read the scenario.Adlai has just returned from the funeral for his uncle. His friends notice he is deeply upset, so they offer tobring meals to his house and help him with yardwork.Is their response helpful to Adlai while he is dealing with his grief, and why?No, it may give grieving people the idea that everyone is underestimating their grief.OYes, grieving people may lack the time or motivation to eat or do regular activities.O No, it is better for grieving people to continue regular activities and ignore their grief.Yes, grieving people cannot manage basic responsibilities for two months after a loss. Eli states that sodium phosphate is a mixture because it is composed of both sodium ions and phosphate ions.Which is the best analysis of Elis statement? Unvoiced and voiced word? Need help please Which of the following was led bywomen in the 1920s?A. 16th AmendmentB. Jazz AgeC. Harlem RenaissanceD. Temperance Movement What is the ninth term in the binomial expansion of (x 2y)13?329,472x5y8329,472x5y841,184x8y541,184x8y5 Is it possible for number of moles to be less than one? answer please i need to pass this class Please Help!!!!What does this online dictionary entry suggest about the etymology of the word theater?theater/'THdr/noun1 a: a building or area for dramatic performances b: a building or area for showing motion pictures c: an outdoor structure for dramatic performances or spectacles in ancient Greece and RomeA.The word changed from a noun to an adjective.B.The word was introduced by the Vikings.C.The word is Greek in origin.D.The word's meaning has changed a lot over time.. A train is accelerating at a rate of 2 m/s. If its intital velocity is 20 m/s,what is its veolcity after 30 seconds Sparky Corporation uses the weighted-average method of process costing. The following information is available for February in its Molding Department:Units: Beginning Inventory: 25,000 units, 100% complete as to materials and 55% complete as to conversion. Units started and completed: 110,000. Units completed and transferred out: 135,000. Ending Inventory: 30,000 units, 100% complete as to materials and 30% complete as to conversion. Costs: Costs in beginning Work in Process - Direct Materials: $43,000. Costs in beginning Work in Process - Conversion: $48,850. Costs incurred in February - Direct Materials: $287,000. Costs incurred in February - Conversion: $599,150. Required:Calculate the equivalent units of conversion. a. 110,000 b. 140,000 c. 144,000 d. 130,250 e. 165,000 PLEASE GIVE AN ANSWER AND EXPLANATION! I BEG YOU. I REALLY NEED SOMEBODY TO ANSWER!!! Is orange a colour or a fruite ? Numbers are formed using the digits 1, 2, 3, 4, 5, 6. If no digit may be repeated, how many two-digitnumbers can be formedA. 15B. 20C. 30D. 6 (I GOT 100%) Francisco has very strong opinions about the rights of citizens. In a debate over dinner with his dad, he claimed that Internet access is a right and that the government should provide free Wi-Fi nationwide.Evaluate the potential evidence, and find the statement that supports Francisco's claim.A) A country of plugged-in citizens will lead to a better-educated and more productive country 2. Jessa is writing a persuasive essay to be read out loud in front of her entire class. She will discuss the benefits of taking public transportation. Here is some of the evidence she has gathered:My dad says that public transportation is the fastest way to get downtown during rush hour.Public transportation is expensive, but so is keeping a car on the road.It is not safe to drive a car these days with so many crazy drivers on the road downtown during rush hour.According to researchers, public transportation is beneficial to the environment, because it helps to decrease carbon dioxide emissions and conserves fossil fuels.She wants to present a solid argument with good evidence. Based on what you've learned about evaluating evidence, which of the above should Jessa include in her essay?D) statements 2 and 43. Aaron is writing an article for the school newspaper about the importance of extracurricular activities. He wants to express to his college-bound peers what kinds of activities will make an application stand out to a university.Using what you have learned about evaluating evidence in an argument, which expert should Aaron consult for his article?C) a college admissions officer4. In writing a blog about his favorite smoothie shop, Daniel claims that their smoothies are healthy, enjoyable after-school snacks.Fruit-and-yogurt smoothies not only contain the recommended daily serving of fresh fruit but also are good sources of protein. Delicious smoothie flavors come from combining many different types of fresh fruit. Because they are blended with ice, smoothies are an excellent way to cool down on a hot day. Best of all, all-natural fruit smoothies taste better than sugary processed foods.Is Daniels evidence sufficient to support his claim? Why or why not?B) The evidence is sufficient because it gives details about nutrition, flavor, and other benefits. The evidence is not sufficient because it does not5. In an article about summer activities published in her neighborhood newspaper, Cara noticed the sound, relevant evidence about the local community center.Our newly renovated community pool now offers a water slide and high dive!For those days too hot for outdoor play, we offer indoor activities like jewelry making and a rock-climbing wall.Our facility has several sand volleyball courts and two covered basketball courts.For word lovers, we host weekly spelling tournaments and literature circles in our air-conditioned clubhouse.Every Friday and Saturday evening, we show a classic movie in the clubhousecomplete with popcorn!Hours: SundayThursday 10 a.m.6 p.m., FridaySaturday 10 a.m.10 p.m.Sorry, no private events during the summer months.What claim does this evidence support?B) The community center offers summer activities for all ages and interests.(I hope this helps those who needs it and yes i got a 100% so hope you all have a lovely day) Where do most organisms that live in water get oxygen from?Give a word, not a formula. the main process by which water moves from the land to the atmosphere is called Fred is a 29 year old golfer, who has been playing for 4 years. He is a 12 handicap. He is considering the Srixon ZX5 or the Mavrik Pro. Talk through major considerations and provide a recommendation that would be well suited for him. Include explanations about forged vs cast features, the look of the club, and overall feel.