not valid bro so u check again
Which is the hanging indent on the rulern
Answer:
indent is a space between the red line.
Explanation:
Which programming language uses objects?
a. C++
b. ALGOL
c. Pascal
d. BASIC
C++, it's also used as code for video games, so it would make sense.
what is a similarity and difference of email and bulletin board?
a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem. I know answer I want how is it the answer
Answer:
A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.
how should tools be stored
What is the value of creating recurring tasks?
makes task reminders more noticeable
makes task reminders more efficient
saves time spent manually creating multiple tasks
saves time spent manually configuring recurrence settings
Answer:
✔️saves time spent manually creating multiple tasks
Explanation:
I did it on edge
Answer:
saves time spent manually creating multiple tasks
Explanation:
it correct on edge 2021
Navigation buttons found on Web sites that might lead you to information about the Web site publishers are often labeled _____.
Shop
Index
What’s New
About Us
How has the Internet expanded the reach of all of these types of media?
the Internet made it easier for us to find information or to communicate with one another.
Read the following scenario, and then decide if you should upgrade the computer. You have a desktop that you use primarily for writing essays for school and browsing the web at home. The computer is slowing down some, so you check the date on it. Your computer is 6 years old. It is amazing that it lasted this long. You probably need a better CPU and more RAM. What should you do?
Answer:
Upgrade
Explanation:
EDGE 2021
Answer:
B. Upgrade
Explanation:
Because you have a desktop, upgrading the CPU and RAM are an easy and inexpensive fix. Upgrading a laptop is more difficult and often requires purchasing a new computer.
I hope this helps<3
Have a nice day everyone<3
A short-range wireless network is called:
cable modem
cell site
wi fi
personal digital assistant
Answer:
WiFi
Explanation:
WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.
This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. The standard range or distance covered by WiFi is about 50 meters (160 feet).
Hence, a short-range wireless network is called WiFi.
What is pseudo code?
Answer:
a notation resembling a simplified programming language, used in program design.
Explanation:
what might be some challenges if you’re trying to design a product for someone
Answer:
failure
Explanation:
if someone dosnt like it
Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
queries
forms
procedures
Answer:
procedures
Explanation:
Answer:
themes
Explanation:
is willingness to be held accountable for your actions
Answer:
Responsibility.
Explanation:
Responsibility is the willingness to be held accountable for your actions.
A responsible person would always take measured and careful step or engage in well-thought-out actions that will add value to their lives and positively impact their immediate environment.
This ultimately implies that, responsibility is an individual characteristic which typically involves acting in a positive manner and owning up to any of your actions.
In a nutshell, responsibility requires that an individual does the right thing, the right way, at all times.
3. One advantage of online classrooms over physical classrooms is that:
A-You can usually take the classes on your own time.
B-It is easier to access class materials.
C-You can communicate with your teacher more effectively.
D-The quality of the teaching is usually better.
Answer:
c
Explanation:
You can communicate your teachers
Yes or no If the space is crowned make sure there are no white spaces
Explanation:
huh??
I didn't understand
Huzaifa is a grade 5 student who is very enthusiastic to learn coding in computers. He asks his computer teacher to help him choose a language to code. Which level language will the teacher recommend Huzaifa?
Answer:
High level language.
Explanation:
High level language can be defined as a programming language which is generally less complex than a machine (low level) language and easy to understand by the end users (programmers).
This ultimately implies that, a high level programming language is typically a user friendly language and as such simplifies coding or programming for beginners.
Some examples of high level programming language are Python, Java, C#, Ruby, Perl, Visual Basic, PHP, Cobol, C++, Fortran, Javascript, etc.
In this scenario, Huzaifa is a grade 5 student who is very enthusiastic to learn coding in computers. He asks his computer teacher to help him choose a language to code. Thus, the language level the teacher will recommend to Huzaifa is a high level language.
Which portion of the Outlook interface contains commonly accessed commands that a user will require frequently
and is able to be customized by the user based on their particular needs?
Quick Access toolbar
ribbon and ribbon tabs
Tell me box
Title bar
Answer:
A
Explanation:
on edge 2021
what are the hardware and software components of a computer
Answer:
I. Hardware components of a computer includes monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
II. Software components of a computer includes operating system, registry keys, antivirus, media player, word processor, etc.
Explanation:
The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
A software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.
In conclusion, the hardware components of a computer are the physical parts that can be seen and touched while the software components cannot be touched but rather are installed as a program.
What is binary ????????
Binary (or base-2) a numeric system that only uses two digits — 0 and 1. Computers operate in binary, meaning they store data and perform calculations using only zeros and ones. A single binary digit can only represent True (1) or False (0) in boolean logic.1. Binary is a base-2 number system invented by Gottfried Leibniz that is made up of only two numbers: 0 and 1. This number system is the basis for all binary code, which is used to write data such as the computer processor instructions used every day.
Answer:
it is a numeric system that only uses two digits 1 and 0, computers can operate using binary meaning they store data and perform calculations only using 0 and 1
how does a USB flash drive get its files?
Answer:
The flash drive is inserted into a computer's USB port, or type-A USB connector. The USB connector communicates between the drive and the computer. The computer recognizes the drive as a separate hard drive, allowing users to move files from the computer's hard drive to the flash drive.
Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a business card format. Which option should she choose?
Small Booklet style
Medium Booklet style
Memo style
Card style
Answer:
D
Explanation:
did the quiz
Answer:
D: card style
Explanation:
just took the unit test on edge and made a 100%
What is a working model used to test a design called?
Answer:
mockup is the working model
How does password encryption primarily protect a presentation?
O It prevents other users from saving the presentation.
O It restricts other users from opening the presentation.
O It restricts other users from emailing the presentation.
O It prevents other users from copyrighting the presentation.
The answer is B.) It restricts other users from opening the presentation.
Answer: B: It restricts other users from opening the presentation.
Explanation: I just got it right
it refers to the ability of different parts of a computer to work together as one. please answer this
Multiseat o multipuesto,
Na2CO3 → Na2O + what
Answer:
CO3
Explanation:
Answer:
C02
Explanation:
In this assignment, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a clear theme and tell a story. You may pick any school-appropriate theme that you like.
The program must include a minimum of:
5 circles
5 polygons
5 line commands
2 for loops
1 global variable
You may wish to use the standard code for simplegui graphics below:
In Python please.
I have attached pictures.
Hope this helps!
Buying the newest phone as soon as it is released when your current phone works perfectly is not a good idea for all but which of the following reasons?
Answer:
You are gonna waste money and it might not be the best idea
Explanation:
Answer:
waste money
Explanation:
Select the correct category of cybersecurity described.
It prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks.
network security
information security
operational security
infrastructure security
Answer:
Network security
Explanation:
Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network
The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.
Answer:
network security
Explanation:
How would our lives be different without computers at home?
Answer:
It would be so difficult to spend a life without computers. We would not be aware of technology or what things are being discovered. We could get information by newspaper, television, radio or some other medium but on computers.
Explanation:
Thanks for the points have a good day <3