In most presentation software, custom animations are added from the _____.
Slide pane
Normal view
Task pane
Insert menu
Answer:
Explanation:
the answer is.....normal view
Answer:
Task pane is the answer
Explanation:
Which of the following actions is most likely to raise legal or ethical concerns?
A
An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic.
Sut
B
A computer scientist adds several features to an open-source software program that was designed by another individual.
с
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
D
A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license
Q
Answer:
C. A musician creates a song using samples of a work and then uses a Creative Commons license to publish the song.
Explanation:
Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.
A copyright can be defined as an exclusive legal right granted to the owner of a creative work (intellectual property) to perform, print, record, and publish his or her work. Also, the owner is granted the sole right to authorize any other person to use the creative work. The copyright law which protects the sharing and downloading rights of music is known as the Digital Millennium Copyright Act (DMCA).
Furthermore, an intellectual property can be defined as an intangible creation of the human mind, ideas, thoughts or intelligence.
In this scenario, a musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song. This is an action that is most likely to raise legal or ethical concerns because he didn't get a license from the other musicians who he used their work.
A Creative Commons license is simply a public copyright license that allows for the free distribution of a copyright protected material and it can only be used by the intellectual property owner.
Which of the following BEST describes the differences between sequential and event-driven programming?
Answer:
In sequential programming, commands run in the order they are written. In event-driven programming, some commands run in response to user interactions or other events.
Explanation:
Event-driven program : A program designed to run blocks of code or functions in response to specified events.
Sequential programming: The order that commands are executed by a computer, allows us to carry out tasks that have multiple steps. In programming, sequence is a basic algorithm: A set of logical steps carried out in order.
The missing options are;
A) In sequential programming commands run one at a time. In event-driven programming all commands run at the same time.
B) In sequential programming commands run faster than in event-driven programming.
C) In sequential programming each command is run many times in sequence. In event-driven programming all commands are run a single time as an event.
D) In sequential programming commands run in the order they are written. In event-driven programming some commands run in response to user interactions or other events.
This question is about sequential programming and event-driven programming.Option D is correct.
To answer this question, we need to first of all define what the two terminologies in computer programming are;Event-driven programming; This is a programming pattern whereby the program flow is determined by a sequence of events that arise from activities/interaction of the user or the system. Sequential programming: This is a programming pattern whereby the program flow is determined by the sequence in which it was written.Looking at the given options, the only one that fits perfectly into the description I have given above about sequential and event-driven programming is Option D.Read more at; brainly.com/question/17970226
Which statements describe the use of sound in presentations?
Sound cannot be used in presentation programs.
Sound can distract the audience when it is overused.
Sound can only be used with transitions.
Sound can only be used with animations.
Sound can be used with both animations and transitions.
Answer:
b and e
Explanation:
The statements that best describe the use of sounds in the presentation are as follows:
Sound can distract the audience when it is overused.Sound can be used with both animations and transitions.Thus, the correct options for this question are B and E.
What do you mean by Presentation?The Presentation may be defined as the type of process through which an individual who is known as the speaker conveys information on a particular topic to the number of people known as the audience.
As normally sound makes the presentation more attractive and understandable but the excess sound in the presentation makes the mood of the audience saturated and finally distracts. A standard level of sound must be required in both animations and transitions to make the presentation more influencing one.
Therefore, the correct options for this question are B and E.
To learn more about the Advantages of presentations, refer to the link:
https://brainly.com/question/11972945
#SPJ2
Use the drop-down menus to complete statements about importance and sensitivity levels. The Low Importance level is rarely used, and the High Importance level should be used . The sensitivity levels are personal, private, and . Sensitivity levels are basically only , as they appear on the Info Bar in the message.
Answer:
first blank- cautiously
second blank- confidential
third blank- informational
Explanation:
i got it correct on edge 2020
The Low Importance level is rarely used, and the High Importance level should be used cautiously.
What is cybersecurity?Cybersecurity can be defined as a preventive practice that involves the protection of computers, networks, software programs, servers and data (information) from unauthorized access, potential theft, attack, or damage, especially by using a body of technology, frameworks, processes and network engineers.
In Cybersecurity, the use of the various security levels include:
The sensitivity levels are personal, private, and confidential. Sensitivity levels are basically only informational, as they appear on the Info Bar in the message.Read more on Cybersecurity here: https://brainly.com/question/14286078
#SPJ2
Jeff took a picture of his dog that he wants to include in his paper titled “Rescue Dogs of Florida.” What tab should Jeff choose to place the picture in his document?
Home
Insert
Layout
View
Answer:
insert
Explanation:
Why is file extension important when naming the file
Answer:
Extensions are important because they tell your computer what icon to use for the file and what application can open the file
Explanation: For example, the doc extension tells your computer that the file is a Microsoft Word file.
Which of the following may be purposes of packaging?
O Help the product stand out from the competition
O Make the product easier to use
O Protect the product and the people who buy it
O All of the above
Answer:
D
Explanation:
who presented pakistan resolution
Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose for this purpose?
Answer:
The answer to this question is given below in the explanation section.
Explanation:
This question is about how to insert caption or text below the image. Marry have to follow the following steps:
Open the article in MS WordSelect the image to insert the text below it.Then go to the References menuUnder the reference group, click on the insert caption buttona popup, windows will get open, fill in it the required detail.If you want to insert the image below the text, then you have to follow the following option.
Select the text where you want to insert the imageGo to insert menUnder the Illustration group of menu, click on pictures button, or online pictures button and select the image and click ok.Mary needs to choose the REFERENCE menu in order to place the text in a desired fashion around the image.
Consider the following numeric values.
Binary 1011
Binary 1101
Decimal 5
Decimal 12
Which of the following lists the values in order from least to greatest?
Answer:
d 5, b 1011, d 12, b 1101
Explanation:
If you convert the binary, 1011 is 11 and 1011 is 13.
The ordered list of values from least to greatest is Decimal 5, Binary 1011, Decimal 12, and Binary 1101.
Binary refers to the numbers consisting of only "0" (zero) and "1" (one), while decimals are digits from "0" to "9".In computation, binary numbers are used in order to store any type of data, these numbers consist of binary digits (bits).A sequence of binary numbers must be read in a digit-by-digit manner, conversely to decimal numbers, which are read by ten, hundred, etc.The decimal numbers can be estimated as the sum of the binary numbers times their power of 2 (2n).In conclusion, the ordered list of values from least to greatest is Decimal 5, Binary 1011, Decimal 12, and Binary 1101.
Learn more in:
https://brainly.com/question/16612919
what is marc railberts goal for the robots his company (Boston Dynamics) builds?
Answer:
. We wanted to build a robot that could go where people go
Explanation:
Does anyone know how to use a while loop and ask a user to input positive integers until the user enters 0 and print the sum so far after each input, then print final sum at the end in edhesive?
In python:
total = 0
while True:
num = int(input("Enter a number: "))
if num == 0:
break
total += num
print(f"The final sum is {total}")
critics of media consumption
A. do not believe we should do away with media altogether
B. agree that our society would be better off without media
C. argues that all media is a deterrent to the growth of society
D. do not want obese children to use technology and media
Answer:
b
Explanation:
make me brainlyest plzz
sorry if i got it wrong
Answer:
b i think
Explanation:CHECK IT FIRST
Which term refers to a fact that naturally occurs in the universe?
A.
scientific law
B.
scientific inquiry
C.
conclusion
D.
hypothesis
Answer: a scientific law
Explanation:
HERES A RIDDLE!!
What is more useful when it’s broken??
Answer:
an egg
Explanation:
Name three organic materials that technology turns into products.
Answer:
Useful forms of energy that can be produced include
heat
steam
electricity
renewable natural gas
and fuels.
Please help!! Thank youu
1. What is JavaScript?
2. Who designed the Apple 1 Computer?
3. Who founded Apple?
Help me, it would be a pleasure if you could.
Answer:
1. JavaScript is a dynamic computer language used to primarily code and create system functions.
2. The people who designed the Apple 1 Computer were
Steve WozniakSteve Jobs3. The founder of Apple was Steve Jobs. He passed away from pancreatic cancer.
Hope this helps you!
5 steps in cleaning and sanitizing smokehouse
Answer:
Scrape or remove food bits from the surface. Wash the surface. Rinse the surface. Sanitize the surface. Allow the surface to air-dry.Explanation: These are steps for cleaning and sanitizing.
The steps in cleaning and sanitizing smokehouse include:
Scrape or remove food bits from the surface.Wash the surface.Rinse the surface.Sanitize the surface.Allow the surface to air-dry.Sanitization simply refers to the disinfection and cleaning of an area. This is vital on order to prevent humans from being infected or contaminated.
When sanitizing a smokehouse, it's essential to remove food bits from the surface, wash the surface. rinse the surface, sanitize the surface and then allow the surface to air-dry.
Read related link on:
https://brainly.com/question/18996117
HOW MEANY PEOPLE PLAY AMONG US
Answer:
up to 1.5 million people are playing Amoung Us
Explanation:
Answer: I Play Among Us But this is a website for learning and questions so please ask that somewhere else. Thank You Have A Nice Day!
Explanation:
jordan needs to create an employee handbook. the handbook will have several written pages with bold text, plain text, and numbered lists. jordan should use a (n)
A) Spreadsheet
b) database
c) e-mail
d) word processor
D
is most likely the correct answer
What is an enterprise system
Answer:
Explanation:
Enterprise system is a cross- functional information system that provides organization-wide coordination and integration of the key business processes. Enterprise system helps in planning the resources of an organization.
people with healthy media diets:
A.do not have problems with addictions, obesity, or other health issues
B. make good choices about what media to use and when not to use them
C. do not eat while engaging in media and avoid unnecessary weight gain
D. choose to leave media and technology out of their lives entirely
Answer:
b
Explanation:
HELP HELP BRAINLIEST A student learns that a classmate is being cyberbullied. He wonders if it is a serious situation and how it is affecting his classmate.
What areas of his classmate’s life may be impacted by cyberbullying? Check all that apply.
physical health
recent memories
school performance
emotional health
athletic ability
Answer:
physical health
school performance
emotional health
Why does a computer need primary and secondary memory ?
some critics aruge that excessive media consumption can encourage______.
A. deeper reading
B. taking breaks from using digital media
C an unhealthy lifestyle
D. healthy friendships
Film directors generally earn more money than theater directors. True False
Answer:
Yes, it's true on edge 2022.
Which type of document would be best created in Word? HELLP!!!!
Spreadsheet
Resume
Presentation
Animation
Answer:
presentation
Explanation:
because maths
Answer:
I think spreadsheet
Explanation:
Please correct me if I am wrong!
Jennifer works as a programmer. She has fixed certain bits of code in a program while developing it. She has purposely left specific code in the program so she can access the program later and obtain confidential information. Which programming threat has she created?
A. logic bomb
B. trap door
C. Trojan horse
D. virus
Answer:
B. trap doorExplanation:
It's also referred to as the back door