Ok can someone tell me why I can’t do this? I’m trying to put a video as my background but it won’t show up when I go to add video there is no video

Ok Can Someone Tell Me Why I Cant Do This? Im Trying To Put A Video As My Background But It Wont Show

Answers

Answer 1

Answer: money

Explanation:


Related Questions

Desktop computers are often provided in the workplace by organizations, and laptops may be as well. However, portable devices (such as tablets and smartphones) may more commonly be allowed on a BYOD basis. For a BYOD (personally-owned) device:

Answers

Answer:

Organizations may have requirements about how BYOD devices may be configured to access the information resources of the organization.

Explanation:

Desktop computers and laptops are often provided for the employees in the workplace. On a BYOD basis, portable devices such as tablets and smartphones may more commonly be used.

For a BYOD (personally-owned) device, organizations may have requirements about how BYOD devices may be configured to access the information resources of the organization.

What is a slide master ?​

Answers

Explanation:

Slide Master is a tool used in Microsoft PowerPoint to create slide templates. Slide Master can save slide layouts, including the background, color, fonts, effects, positioning, etc.

hope it helps!

Answer:

A slide master is the top slide in a hierarchy of slides that stores information about the theme and slide layouts of a presentation, including the background, color, fonts, effects, placeholder sizes, and positioning. Click to select the master slide, then click Master Layout on the Slide Master tab.

Brainly, ""helping you get better grades"
ahem im sorry but uh ur lying because i made a C on my exam and im really mad smh

Answers

Answer: What do you except? All of this is user generated..

Explanation:

Yikes- well I mean these are real people answering so they could make mistakes too

What are presenter notes?

Answers

Presenter notes are for showing to other people

Answer:

notes on like a presenting app that will help you present better so like your notes

Explanation:

How do you send friend requests?

Answers

Answer:

i dont know how too i dont think you can

PLEASE SOMEONE PLEASE HELP ME OUT!!!!

Answers

Answer:   Ideate

Explanation:

Answer:

the 1st one

Explanation:

What is Ce stands for?
O Carbon character
O Carbon calender
Carbon copy
O character change​

Answers

Explanation:

hello I don't know ok sorry

What does the National Institute of Standards and Technology do? Promotes innovation by advancing measurement standards promotes cooperation in metrology among several regions provides certifications to individuals working in the field of metrology provides mentors to individuals working in the field of metrology

Answers

Answer:

Promotes innovation by advancing measurement standards

Explanation:

The National Institute of Standards and Technology was Founded in the year 1901, this agency is a non-regulatory body that is found within the United States Department of Commerce.

The mission of this agency is the promotion of innovation and also industrial competitiveness through the advancing of measurement science, standards, and also technology in several ways that raises economic security and also brings about improvement in the quality of life.

Answer:

(D) promotes innovation by advancing measurement standards

Explanation:

to generate a series of first ten counting number of algorithm​

Answers

uhh i need points so i don’t fail math.

Please help! Due by tonight! Greatly appreciated!

Answers

Answer:

Im sorry if im wrong but i took a class for coding a long time ago but i think  it is 6 :)

The speed of mainfarme computer is measured in...... fill in the blanks​

Answers

Mainframe computers are huge towering machines with lots of processing power and are measured in MIPS (Million Instructions Per Second). Windows Explorer is the operating system's file and folder manager. A minicomputer can support about 200 users at the same time. They are referred to as small or mid-size servers.

Explanation:

Mainframe computers are huge towering machines with lots of processing power and are measured in MIPS (Million Instructions Per Second).3 days

What is the size of 5th generation of computer and what language does they use??​

Answers

Answer:

The period of fifth generation is 1980-till date. In the fifth generation, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components

Fifth-generation languages are used mainly in artificial intelligence research. OPS5 and Mercury are examples of fifth-generation languages. as is ICAD, which was built upon Lisp. KL-ONE is an example of a related idea, a frame language

Explanation:

1980 until the present is the fifth generation's time frame. When VLSI technology evolved into ULSI (Ultra Large Scale Integration) technology in the fifth generation, microprocessor chips with 10 million electronic components were created.

What is 5th generation computer?

Artificial intelligence research is the principal application for fifth-generation languages. Examples of fifth-generation languages are OPS5 and Mercury. ICAD, which is based on Lisp, is also. KL-ONE is an illustration of a frame language, a related concept.

After the creation of the fourth-generation computers, the fifth generation was introduced. Modern computers, also referred to as fifth-generation computers, are currently under development and are based on artificial intelligence.

In 1982, the FGCS was developed in Japan (Fifth Generation Computer System). This generation of computers uses parallel processing and microelectronic technology, which has a high processing capacity.

Therefore, 1980 until the present is the fifth generation's time frame. When VLSI technology evolved into ULSI (Ultra Large Scale Integration) technology in the fifth generation, microprocessor chips with 10 million electronic components were created.

To learn more about computers, refer to the link:

https://brainly.com/question/21080395

#SPJ2

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data

Answers

in ciphertext-only.

EXPLANATION: it is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. The attack is completely successful if the corresponding plaintexts can be extracted or, even better, the key.

Which step in the software development life cycle involves making improvements based on user feedback?
Coding
Design
Maintenance
Testing

Answers

Answer:

The step is Testing oki doki

Answer:

Maintenance

Explanation:

Maintenance

This primarily involves updating and making improvements based on user feedback, as well as resolving any defects that are found.

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the internet, but you are unable to perform secure credit card transactions when making purchases from e-commerce websites. Which port needs to be enabled to allow secure transactions

Answers

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

please help please I will count your answer brainiest if you help!
In what ways are math and computer science similar? How are they different?

Answers

Answer:

Without mathematics, computer science would not exist. Computers use algorithms to obtain certain information, and output certain information. Linear equations and algebra are used to create gaming graphics.

Have you ever wondered how your online quizzes were made? Inside the online quizzes there is code behind it, this code uses variables, integers, and booleans.

Variables use equations like x and y to find sum. A boolean is a basic algebraic notation, it's a binary variable.

Everything uses math, nothing would exist without math, including even digging dirt.

Question 4Write a C++ program which display the following shape.
*****

Answers

Answer:

The code to this question can be defined as follows:

#include <iostream>//header file

using namespace std;//namespace

int main()//main method

{

int x,y;//defining variable

for(x = 1; x <= 7; x++)//defining outter for loop for print rows

{

for(y = 1; y <= 7; y++)//defining inner for loop for print column

{

if(y <= x)//defining if block to check y less then equal to x

cout << "*";//print asterisk value

else//defining else block

cout << " ";//use for spacing

}

for(y = 7; y >= 1; y--)//defining for loop for print right triangle

{

if(y <= x)//defining if block to check y less then equal to x

cout << "*";//print asterisk value

else//defining else block

cout << " ";//use for spacing  

}

cout << "\n";//use for line break

}

return 0;

}

Output:

please find the attachment.

Explanation:

In the above program code, two integer variable "x, y" is declared, which is used in the for a loop. In this, two for loop is used to print the left triangle, and the last loop is used to print the right triangle. In both, the loop uses if block to check y is less than equal to x and print the asterisk value with the spacing.

Nadia has inserted an image into a Word document and now would like to resize the image to fit the document better.

What is the quickest way to do this?

keyboard shortcut
sizing handles
context menu
sizing dialog box

Answers

Sizing handles but I’m not super sure

Can someone please give me Python test 3 it would help me tremendously

Answers

Question 1:  To tell what will happen when an if-statement is false.

Question 2: The = should be ==

                    elseif should be elif

                    The else should have a :

Question 3: All algorithms can only do number calculations.  

Question 4: and

Question 5: To make a follow-up True/ False decision

Question 6: if (text1 > 15):

Question 7: if (text1 == 78):

Question 8: if (num1 != num2):

Question 9: >=

Question 10: 4

Question 11: 3

Question 18: a < b and a != b  

Question 19: !=

Sorry about 12 - 17 and 20 i can't seem to find those questions guessing you wanted edhesive. I dont have an account on it.

Who knows songs that are sad,happy,excited, and calm

Tell me three 4 each i will give out brainliest

Also include the author

Answers

sad-

you broke me first

can we kiss forever

love the way you lie

happy-

Say Yes

Valerie

Walking on Sunshine

excited-

who let the dogs out

September

calm-

heather

put your records on

lonely

What three actions happen when you cloak a folder or file?

Answers

Answer:

A three actions happen when you cloak a folder or file is explained below in details.

Explanation:

You can cloak data and folders on the forgotten or local site. Cloaking eliminates cloaked data and folders from the subsequent actions:

Presenting Get, Check-In, and Check-Out executions

Producing reports

Getting newer local and newer forgotten files

Accomplishing sitewide executions, such as monitoring and modifying links

Synchronizing

Working with Asset panel contents

Refreshing templates and libraries

If the transmitting device would like for the receiving device to push currently buffered data to the application on the receiving end immediately, it would set the ____ flag.

Answers

Answer:

The right approach will be "PSH".

Explanation:

The PSH flag seems to be an acceptable solution through TCP which always encourages the submit implementation to immediately transfer data but only whenever the buffer isn't complete. The implementation helps to formulate this same flag towards true for something like the connection, as well as TCP will instantly begin transmitting the relevant information.

Define data, information and the relation between the two?

Answers

Answer:

Program data is a type of information that a computer processes or retains. This data can be in the context of text records, photographs, etc.

Explanation:

In a particular context, information is a collected from different source, structured data provided which is beneficial to society. Data is a core objectives containing raw material which carries no special significance. Info is a collection of facts that bears a logical sense collectively.

1.portable hard drive is an example of internal memory true or false

2.Command i’m user interface are using currently true or false

3. Temperature sensor is an input device true or false

4. Draft few headers and footers are visible true or false

Answers

1. false

2. false

3. false

4.true

1.False
2.False
3.False
4.True

You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has digitally signed the driver you are installing. What benefits does driver signing provide

Answers

Answer:

1)The driver has been tested by Microsoft

2)The driver file has not been altered

Explanation:

From the question, we are given an instance whereby I'm installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has digitally signed the driver you are installing.

The benefits that this driver signing provide are;1)The driver has been tested by Microsoft

2)The driver file has not been altered

driver reffered to group of files that give room for communication between one or more hardware devices and the operating system of the computer, it is through a driver that a computer will be able to receive/send data to hardware device correctly. The device could be a printer. to digitally sign drivers by Microsoft, the drivers must be certified by Microsoft and a signature will be provided for the driver by Microsoft.

Reason Microsoft do digitally signed drivers is that during Windows device installations , digital signature is used in verification of integrity of the driver package and also the identity of the vendor can be known, window might not run a driver that is not certified by Microsoft on 64/32 bit system.

what is CPU ????....................​

Answers

Cumputor its just a short way to say it

Answer: Central Processing Unit

Explanation: The CPU is the “brain” of the computer. It means Central Processing Unit!

hope this helps ;)

Write negative impacts of ICT in our lives. atleast 4​

Answers

Answer:

#1: Reduced physical activity

#2: Eye strain/ easily prone to headaches

#3: Poor social skills

#4: Decline in mental health

Answer:

Reduced physical activity: A third negative effect of ICT is that users may adopt a more sedentary lifestyle. This can lead to health problems such as obesity, heart disease, and diabetes.

about IPO cycle with a digram

Answers

Answer:

The IPO Cycle is termed as Input-Processing-Output cycle. A computer receives data as input, processes it, stores it and then produces output. ways. This manipulation is called processing.

A tree topology is a combination of
topology and
topology.

Answers

Answer:

Tree topology is a combination of star and bus topology. This topology is mostly used on larger networks. It is the best topology cuz the signals that are transmitted by the root nodes are received by all the computers at the same time.

in which genre of games do players most often have the power to shape how the story will end?

platformer games
shooter games
role-playing games
puzzle games

Answers

Role playgames are the most customizable

Answer:

role-playing games

Explanation:

Other Questions
what is business and what is occupation Which equation represents the graph of Charli's line? A. y= -3/4x-3. B. Y= 3/4x- 4. C. y = -4/3x- 4. D. y= 4/3x- 3. LOOK AT THE PHOTO PLZZ PLS HELP ASAP I DONT KNOW WHAT TO WRITE AND I ONLY HAVE 6 MINUTES HELPP give example of local leval vocational occupation A car salesman has a salary of $600 a week. He also earns a 25% commission on the profit of his total sales. One week, he sold several vehicles for a final profit of $8500. How much money will he make that week in total. Which of these organisms would most likely be found at the top of an energy pyramid?A. clams - a primary consumerB. sardines - a primary consumerC. sharks - a secondary consumerD. kelp - a primary producer Jasons checkbook had a balance of $525.02 on May 5. On May 6, he wrote a check for $107.65 at the grocery store. On May 8, he wrote a check for $228.00 for his car payment. On May 9, his grandmother sent him $55.00 and he deposited this in his account. What is the balance of Jasons account after this deposit? define vector quantity giving examples Need helpp fastt plss will give brainliest to who is correct plss helpp If anyone knows the answer please help me n automobile manufacturer claims that its van has a 37.4 miles/gallon (MPG) rating. An independent testing firm has been contracted to test the MPG for this van since it is believed that the van has an incorrect manufacturer's MPG rating. After testing 280 vans, they found a mean MPG of 37.8. Assume the standard deviation is known to be 2.3. A level of significance of 0.05 will be used. Find the value of the test statistic. Round your answer to 2 decimal places. PLEASEEEEE HELPPPPP!! Jesse added two more numbers to his expression, but the sum did not change. What could the two new numbers be? Explain why the numbers you chose would not affect the sum of Jesses expression. List the causes of natural degradation and classify them as natural and anthropogenic causes. What options did women have in education and the workforce during the 1800s?Mark each statement as true or false.Young women were banned from working in factories.Unmarried women had more job opportunities outside the home than married women.Educated women often became doctors or lawyers.Many educated women became schoolteachers. data collected showes that the more you water the larger your plant will grow if you use the following equation y=1/2+2 how tall will a plant be at 25 weeks if x is the number of weeks waterd andby represents rhe height of the plantSOMEONE PLEASE HELP DONT SKIP NO ONE EVERY HELPS ME AND MY GRADE DEPENDS ON THIS PLSSSSS The temperature in the morning was8 F. The temperature dropped 13 degrees by night. What is the temperature at night? The radius of a circle is 8 millimeters. what's the circle's area Which war is often described as America's second war for independence? -What allies are against ISIS?-Who has a stronghold in Syria and parts of Iraq?-Why do we need to spend American dollars and risk the lives of our men and women in uniform, to fight so had from home?(PLSS ANSWERRR)