Answer:
Wireless LAN
Wireless MAN
Explanation:
I use these methods to connect my wireless devices all of the time and most of my friends do it as well so I am pretty sure it is a commonly used method.
what are the different types of document required for mail merge?
Answer:
More Information. A mail merge is used to create form letters, mailing labels, envelopes, directories, and mass e-mail message and fax distributions. There are three documents that are involved in the mail merge process: the main document, the data source, and the merged document.
Explanation:
The most effective leaders treat everyone alike. True True False
Answer:
you have to have evidence they do that and on the question theirs no evidence so the answer would be false (as long as theirs no evidence)
Explanation:
Answer:
True
Explanation:
Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:
Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.
The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.
What do you mean by term E-mail?
An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..
E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.
Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.
In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.
Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.
Therefore, correct options are A and C.
Learn more about E-mail, refer to the link:
https://brainly.com/question/13313275
#SPJ2
Certain programs, such as Adobe Acrobat
Reader, may install additional tabs to the
Ribbon. These tabs are called add-ins.
True or False
Answer:
true
Explanation:
mark brainliest ☺☺☺☺☺☺
Helppppp plzzzz it's computer science helpp plzzz
1. String
2. "is assigned to"
Examples and meaning of external hardware.
Answer:
External hardware devices include monitors, keyboards, mice, printers, and scanners. external hardware devices are usually called peripherals.
5 examples of hardware?
Mouse, Keyboard, Monitor, Printer, USB, CD Drive, RAM, Hard Drive, Joystick, Scanner, DVD, CPU, Motherboard, Etc.
Explanation:
Hope this help have a good rest of your day
Complete the sentence.
One way to increase the reliability of a hard disk drive is by making it part of ____
an optical array
a capacitator
a RAID
an analog ray
Answer: It is raid
Explanation:
Took the test for edge
A
is the smallest of the network types and provides connectivity for one person’s devices.
Answer:
Personal Area Network (PAN)
Explanation:
A Personal Area Network (PAN) is the smallest of the network types and provides connectivity for one person’s devices.
A personal area network refers to a computer network that is used for interconnecting various electronic devices that are centered on the workspace of an individual. A PAN enables data transmission among the following devices: 1. Computers
2. Smartphones
3. Tablets
4. Personal digital assistants.
Document accurately describes the differences between servers and computers and between local and wide area networks. Document provides at least four suggestions including password managers and safe browsers.
Thinks someone could help me out with this?
Answer:
Cell towers and internet uses allow local and wide area networks, but they also allow you to steal IP and things like that.
Explanation:
This is quite difficult. I appologize if I get this wrong.
(Also if you upload a file for someone to answer, and they give you a link, don't click on it!! They track your IP address and things like that!)
What is the most important function of a network operating system (NOS)?
Answer:
One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.
Explanation:
One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.
What is network operating system?An operating system for computers known as a "network operating system" (NOS) is primarily made to handle workstations, personal computers, and occasionally older terminals that are linked together over a local area network (LAN).
A NOS's supporting software enables resource sharing and communication amongst various networked devices. A NOS's usual hardware configuration consists of several personal computers, a printer, a server, and file servers that are linked by a local network.
Because earlier iterations of the fundamental operating system weren't created with network use in mind, network operating systems
Therefore, One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.
To learn more about network operating system, refer to the link:
https://brainly.com/question/28356173
#SPJ2
Discussion Topic
How does social media affect the process of globalization? Give examples. In what
ways does social media help in creating global communities? Discuss other positive
influences of social media. What might be the adverse effects of excessive use of social
media?
Answer:
Social media positively affects and impacts the process of globalization. ... Global communities is a social infrastructure tool and as social media helps in strengthening social relationships and bringing people and communities together it leads to creating a string global community.
Decrypt this message: P ht uva h zwf
It has been encrypted with a shift of 7 (remember each letter needs to go backwards.
uhhh pls help with this ill mark brainliest
Sorry this ain't bout HW but how do I get this off my screen it's pretty annoying
list any four e-commerce website
Answer:
Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.
eBay. ...
Walmart. ...
Etsy. ...
Home Depot. ...
Target. ...
Best Buy. ...
Wayfair.
Answer:
I'm sorry is this a question?
how can i help?
Explanation:
a___ is a placeholder where you can enter text to manipulate and give new graphical effects.
Answer:
A "text box" is a placeholder where you can enter text to manipulate and give new graphical effects
Click the above image
Ask the user to enter two numbers. The first number is for the multiplication table. The second number is the number of rows to display.
Use a for loop to print the table.
Answer:
Follows are the cdo0de to this question:
import java.util.*;//package
public class Table //defining class Table
{
public static void main(String[] asx)//main method
{
int x,y,i;//defining integer variables
Scanner bg=new Scanner(System.in);//creating Scanner class object
System.out.print("Enter first number: ");//print message
x=bg.nextInt();//input value
System.out.print("Enter Second number: ");//print message
y=bg.nextInt();//input value
for(i = 1; i <= y; i++)//defining for loop for print Table
{
System.out.printf("%d * %d = %d \n", x, i, x * i);//calculate and print table
}
}
}
Output:
Enter first number: 5
Enter Second number: 3
5 * 1 = 5
5 * 2 = 10
5 * 3 = 15
Explanation:
In the above code, three integer variable "x,y, and i" is declared, in which "x,y" variable is used to input value from the user end, and after input, the value the for loop is used, in which the second variable "y" count the rows, and "i, x" variable is used for calculates the multiplication of the table.
A computer game picks a random number between 1 and 100, and asks the player to guess what the number is. If the player makes a correct guess, the game congratulates them, and stops. If the player does not make a correct guess, the game tells the player that their guess is either too high, or too low. If the player guesses with an answer that is not a number between 1 and 100, an error message is displayed. The game continues to give the player chances to guess, until the player guesses correctly. You are going to plan an interactive program to implement this game. do this using scratch
Answer:
In Python:
import random
computerguess = random.randint(1,101)
userguess = int(input("Take a guess: "))
while not (userguess == computerguess):
if userguess<1 or userguess>100:
print("Error")
elif not (userguess == computerguess):
if userguess < computerguess:
print("Too small")
else:
print("Too large")
userguess = int(input("Take a guess: "))
print("Congratulations")
Explanation:
This imports the random module
import random
Here, a random number is generated
computerguess = random.randint(1,101)
This prompts the user for a guess
userguess = int(input("Take a guess: "))
The following loop is repeated until the user guess correctly
while not (userguess == computerguess):
If user guess is not between 1 and 100 (inclusive)
if userguess<1 or userguess>100:
This prints error
print("Error")
If the user guessed is not correct
elif not (userguess == computerguess):
If the user guess is less
if userguess < computerguess:
It prints too small
print("Too small")
If otherwise
else:
It prints too large
print("Too large")
This prompts the user for a guess
userguess = int(input("Take a guess: "))
The loop ends here
This prints congratulations when the user guess correctly
print("Congratulations")
Select the best answer to the following question.
Remote data storage and the ability to access data from any device using the Internet is called
Answer:
I think its called "cloud computing"
Answer:
cloud computering
Explanation:
what if the result of conectivity testing is 100%Loss?Explain.
Answer:
If you have a 100% packet loss, it means that all packets get lost between certain hops on your connection. Which, in turn, renders you unable to reach the destination server
is a way og saving a file so it can be used by a different program
Answer:
what are you even asking
ANSWER ASAP!!!!!
Which statement is true regarding achievers?
A.
Achievers bring about a reduction in socializers.
B.
Achievers interact with the environment.
C.
Achievers cause grief to other players.
D.
Achievers like to interact with other players.
E.
Achievers like to collect points and earn rewards.
Answer:
The correct answer will be:
E. Achievers like to collect points and earn rewards.
Explanation:
Charles was supposed to present his PowerPoint slides to his classmates in a classroom, but now he has to present in the auditorium in front of his entire grade. What change will Charles have to make when he presents his slides?
He will have to change his topic.
He will have to rearrange his slides.
He will have to speak more loudly and clearly.
He will have to tell his friends about the change.
HELP ASAP
Answer:
it is c
Explanation:
cus of the long and huge hall of u have in ur school
Answer: C
Explanation: Because he will need the whole grade to hear, or you know grab a mic :D HOPE YOU ENJOY YOUR DAY
round 74,361 to the nearest 10
Answer:
74,400 i think
Explanation:
Can someone urgently help me with my java code (I WILL GIVE BRAINLIEST)?! Ive been working on it for hours and its not working! (please give an actual answer...)
*examples of required output at the bottom*
code: public class CircularList
{
private ListNode head;
private ListNode tail;
private int size;
public CircularList()
{
head = tail = null;
size = 0;
}
public int size()
{
return size;
}
public boolean isEmpty()
{
return (size == 0);
}
public int first()
{
if (head != null) {
return head.getValue();
}
return -1;
}
public Integer last()
{
if (tail != null) {
return tail.getValue();
}
return -1;
}
public void addFirst(Integer value)
{
head = new ListNode(value, head);
if (tail == null) {
tail = head;
}
size++;
}
public void addLast(Integer value)
{
ListNode newTail = new ListNode(value, null);
if (tail != null) {
tail.setNext(newTail);
tail = newTail;
} else {
head = tail = newTail;
}
size++;
}
public void addAtPos(int pos, Integer value)
{
if (pos == 0) {
addFirst(value);
return;
}
if (pos <= 0 || pos > size) {
return;
}
if (pos == size) {
addLast(value);
return;
}
ListNode ptr = head;
for(int i=0; i = size) {
return retVal;
}
if (pos == 0) {
return removeFirst();
}
ListNode ptr = head;
for(int i=0; i
ptr = ptr.getNext();
}
retVal = ptr.getNext().getValue();
if (pos == size-1) {
tail = ptr;
tail.setNext(null);
} else {
ptr.setNext(ptr.getNext().getNext());
}
size--;
return retVal;
}
public int findNode(Integer find)
{
ListNode ptr = head;
for(int pos=0; pos
if (ptr.getValue() == find) {
return pos;
}
ptr = ptr.getNext();
}
return -1;
}
public void rotate()
{
addLast(removeFirst());
}
public String toString()
{
String output = "";
ListNode iter = head;
while(iter != null) {
output += String.format("%d ", iter.getValue());
iter = iter.getNext();
}
return output;
}
}
size = 6 first = 50 last = 60
50 20 10 40 30 60
removeFirst = 50
size = 5 first = 20 last = 60
20 10 40 30 60
removed = 30
size = 4 first = 20 last = 60
20 10 40 60
size = 4 first = 20 last = 60
20 10 40 60
found at -1
removed = -1
size = 4 first = 20 last = 60
20 10 40 60
size = 4 first = 10 last = 20
10 40 60 20
Answer:
code 345code 4537
Explanation:
Hello Everyone,
Please I have been have problems answering this question. I do not know if anyone could be of help to me.
Describe the difference between objects and values using the terms “equivalent” and “identical”. Illustrate the difference using your own examples with Python lists and the “is” operator.
Describe the relationship between objects, references, and aliasing. Again, create your own examples with Python lists.
Finally, create your own example of a function that modifies a list passed in as an argument. Describe what your function does in terms of arguments, parameters, objects, and references.
Create your own unique examples for this assignment. Do not copy them from the textbook or any other source
Which software documentation guideline did the IEEE establish?
A.
Avoid spelling errors.
B.
A glossary should be present to define technical terms and acronyms.
C.
The font has to be in black.
D.
Documents should not have page numbers.
Answer:
B
Explanation:
I am big brain
After inserting a video into your slide how can you test it
Explanation:
How to insert video into PowerPoint
Click on the slide you want, then go to Menu > Insert.In the top right corner, click Video > Video on My PC.Find the video you want to add and click “Insert”.Adjust the settings in the Video Format toolbar to make sure it plays the way you want.How do I calculate this square footage?
Answer:
To calculate it, you have to break it apart. Sorry for the bad writing but after you break it apart, you multiply the smaller squares. Then with all of the smaller areas, add them together for the final answer which in this case is 456.
libre office is what program
Plzzzzz helppppp hurry plzzzzzzzz