Answer:
it is most likely Hip Hop
Explanation:
the name makes it sound like Hip Hop
Answer:
um id.k
Explanation:
Which views can be used to see appointments in Outlook 2016? Check all that apply. Today Tomorrow Next 7 Days Work Week Two Weeks Month
Answer:
A D C F
Explanation:
Answer:
A. Today
C. Next 7 Days
D. Work Week
F. Month
Explanation:
hope this helps :)
Which option is not a default when adding voting buttons to an outgoing message?
Approve:Reject
Yes:No
Custom
True:False
Custom option is not a default when adding voting buttons to an outgoing message. Hence option c is correct.
What is message?Message is defined as a specific communication unit that the source intends for some recipient or set of receivers to consume. A broadcast's content could be a message. The information being conveyed during communication is known as the message. Sender and recipient are linked by the message.
Create an email message, respond to one you've already received, or forward it. Click Use Voting Buttons under the Tracking group on the Options tab. Please click Options > Use Voting Buttons > Custom when you are back in the message window. Please enter your preferred voting methods in the Use voting buttons box in the Properties dialogue box before clicking the Close button.
Thus, custom option is not a default when adding voting buttons to an outgoing message. Hence option c is correct.
To learn more about message, refer to the link below:
https://brainly.com/question/28529665
#SPJ2
Help plz,l didn’t pay attention in class
Answer:
a) Input the marks value
b) Distinction
c) If marks =>50
d) Fail
Explanation:
The missing box entries in the flow chart from top to bottom are as follows -
a) Input the marks value
b) Distinction
c) If marks =>50
d) Fail
What is the output of print str if str = 'Hello World!'? A - Hello World! ... Q 18 - What is the output of print list[1:3] if list = [ 'abcd', 786 , 2.23, 'john', 70.2 ]?.
and Dim Message, Speak
Message=InputBox("Enter text" , "Speak")
Set Speak=Create0bject("sapi.spvoice")
Speak.Speak Message
Dim Message, Speak
Message=InputBox("Enter text" , "speak")
Set Speak=Create0bject("sapi.spvoice")
Speak.Speak Message
I hope someone can answer this 40 points to whoever does
differences between placeholders and textbook in PowerPoint
Answer:
fifthly, if it is an empty box. it disappear completely. sixth the size of a text box changes depending on the length of a text that we type . this is in contrast with a place holder box where changes are made of the font of the text
Explanation:
mark me a brainlist
Computer career skills include:
production software use
organizing
teamwork
hardware use
Answer:
Yes they do include all of the above
Microsoft Access is a
Answer:
an easy-to-use tool for creating business applications, from templates or databases from scratch. With its rich and intuitive design tools, Access can help you create appealing and highly functional applications in a minimal amount of time.
Explanation:
Realizar una lista de las herramientas manuales que se utilizan en carpintería y otra en herrería, dibuja cada una de ellas y explicar su funcionamiento
Answer:
En carpintería se utilizan martillo, cinta métrica, escuadras, niveles de burbuja, navaja, herramientas de marcado, destornilladores y sierra circular.
Explicación:
Las herramientas manuales utilizadas en carpintería son martillos, cinta métrica, escuadras, niveles de burbuja, navaja, herramientas de marcado, destornilladores y sierras circulares, etc. Con martillos se pueden unir dos piezas de madera. La cinta métrica se utiliza para medir. Las herramientas manuales que se utilizan para la herrería son martillos de mano, mazos, cinceles, punzones, punzones y una selección de tenazas con brocas, etc. Estas herramientas se utilizan para cambiar la forma después de estar blandas debido al calentamiento.
I gave brainlest .....!!!!
Answer:
me me me me me me me me me me mw
Explanation:
I hope I can help you
Write down the functions of network layer in your own words.ASAP pleaseeeeeee
Answer:
The network layer is the layer is the layer 3 of the seven layer Open System Interconnect (OSI model) which functions as packet forwarder for the intermediate routers by implementing technologies used for switching that provides virtual circuits' logical path
The function of the network layer includes;
1) Routing and forwarding of packets to destination which enables connectionless communication
2) Enabling internetworking
3) Hierarchical host (IP) addressing
4) Sequencing of packets
5) Handling of errors
6) Control of network congestion to prevent the collapse of the network
Explanation:
A person is sledding down a hill at a speed of 9 m/s. The hill gets steeper and his speed increases to 18 m/s in 3 sec. What was his acceleration?
Answer:
3 m/s^2
Explanation:
You are given their initial velocity and their final velocity, as well as the time.
This allows you to use the equation for acceleration, a = Δv/Δt (change in velocity over change in time):
vfinal - vinitial = Δv
(18 m/s - 9 m/s)/ 3 sec = 3 m/s^2
4 cups
2 pints
Write the equivalent measure for each amount.
27.
4 quarts
28.
29.
30.
2 cups
31.
16 tablespoons
32.
4 tablespoons
33.
3 teaspoons
34.
16 ounces
Answer:
The correct equivalent measure of each amount are;
27. 1 gallon ≡ 4 quart
28. 1 quart ≡ 4 cups
29. 1 quart ≡ 2 pints
30. 1 pint ≡ 2 cups
31. 1 cup ≡ 16 tablespoons
32. 2.5 ounces ≡ 4 tablespoons
33. 1 tablespoon ≡ 3 teaspoons
34. 0.8 pint ≡ 16 ounces
Explanation:
In the imperial units of volume, we have the following equivalent volumes;
27. 1 imperial gallon is equivalent to 4 imperial quart
28. 1 imperial quart is equivalent to 4 imperial cups
29. 1 imperial quart is equivalent to 2 imperial pints
30. 1 imperial pint is equivalent to 2 imperial cups
31. 1 imperial cup is equivalent to 16 imperial tablespoons
32. 2.5 imperial ounces is equivalent to 4 imperial tablespoons
33. 1 imperial tablespoon is equivalent to 3 imperial teaspoons
34. 0.8 imperial pint is equivalent to 16 imperial ounces
Directions: Asba student of Contact Center Service, you already have an experience using different computer programs. Try to remember some of those by putting name of the computer program that you use in the first line below and its use on the second line.
__________. __________
__________. __________
__________. __________
__________. __________
__________. __________
__________. __________
Explanation:
can u suggest a title about quarantine
ex: My quarantine life
Answer:
I will get back to you later ok :)
I will send your answer as soon as possible :)
in the comments
Explanation:
I WILL PROMISE TO GET BACK TO YOU AS SOON AS POSSIBLE
Write 4 sentences about who advances the computer evolution
Answer: The first generation of computers took place from 1940 to 1956 and was extremely large in size.
The second generation (from 1956 to 1963) of computers managed to do away with vacuum tubes in lieu of transistors.
From 1964 to 1971 computers went through a significant change in terms of speed, courtesy of integrated circuits. Integrated circuits, or semiconductor chips, were large numbers of miniature transistors packed on silicon chips.
The changes with the greatest impact occurred in the years from 1971 to 2010. During this time technology developed to a point where manufacturers could place millions of transistors on a single circuit chip.
Explanation:
25 POINTS!! NEED HELP ASAP!! Which of the following can be a problem for people with certain kinds of epilepsy?
using left-aligned text
using all uppercase text
putting two spaces after a period
flashing images
Answer:
Flashing images
Explanation:
Content that flashes or flickers can trigger seizures in susceptible individuals. Therefore flashing or flickering content should be avoided.
what is the functions of network layer ?
Functions. The network layer provides the means of transferring variable-length network packets from a source to a destination host via one or more networks.
Which of these statements correctly describe aspects of testing code? Check all of the boxes that apply.
Users depend on the information provided by the software program.
Beta testing is the second stage of testing the software program.
All testing is done by the developer of the computer software.
All code is likely to include mistakes, no matter how careful a programmer may be.
Answer:
1 - Users depend on the information provided by the software program.
2 - Beta testing is the second stage of testing the software program.
4 - All code is likely to include mistakes, no matter how careful a programmer may be.
Explanation:
ON EDGE TRUST
plz mark brainest
IT IS THE FIRST ONE AND THE THIRD ONE
Explanation:
i just did it
What is the output of this program?
numA=3
for count in range(4,7):
numA= numA+ count
Print(numA)
(YOU WILL BE MARKED AT BRAINLIEST)
Answer:
18
Explanation:
the loop goes from 4 to 6
so after first loop numA = 3 + 4 = 7
second loop numA = 7 + 5 = 12
thirs loop numA = 12 + 6 =18
The output of the program is 18. In this program the numbers are calculated.
What is program?Program is defined as a series of instructions written in a programming language that a computer may follow. A program's behavior when it is being used defines its functionality, which is frequently illustrated by how a user interacts with it. Low-level access to system memory is made possible by the procedural and general-purpose nature of the C programming language. To create an executable that a computer can run, a C program needs to be run through a C compiler.
As given
The loop goes from 4 to 6
So after 1 st loop numA = 3 + 4 = 7
2 nd loop numA = 7 + 5 = 12
3 rd loop numA = 12 + 6 =18
Thus, the output of the program is 18. In this program the numbers are calculated.
To learn more about program, refer to the link below:
https://brainly.com/question/3224396
#SPJ5
is the area where we createour drawings
Answer:
Answer:
CANVAS IS THE AREA WHERE WE CREATE OUR DRAWING.
Explanation:
.
Answer: CANVAS IS THE AREA WHERE WEE CREATE OUR DRAWING.
Explanation:
Pari needs to correct the information on a slide in her presentation and redo that recording. What is the best
approach to solve this problem?
O She should delete the recording of the entire presentation and start over.
She should delete the entire presentation and create a new PowerPoint file.
O She should delete the recording on that slide, revise the slide, and rerecord.
O She should delete all the slides in that section, create new ones, and rerecord.
Answer:
C
Explanation:
list three quantitative characteristic properties of water explain why they are considered characteristic
Answer:
The three quantitative characteristic properties of water is explained below in detail.
Explanation:
The three quantitative components of water incorporate the following:
1.Freezing point:
The water has a freezing point of 0 degrees Celsius.
2. Boiling point:
The water has a boiling point of 100 degrees Celsius.
3. Melting point:
The melting point of ice is 0 degrees Celsius.
These properties are all uncommon to water. Being uncommon means that these characteristics are only noticeable in water; hence, they can be beneficial in recognizing such a substance.
How can ICT be a tool in connecting all stakeholders in your community?
Answer:
ICT can be a tool in connecting all community stakeholders including the community rulers, residents, workers, rulers and neighbors by providing the communication link and source of reliable information that can be used to connect the stakeholders in terms of the following aspects of living in the community;
1) Surveillance, of community conditions
2) Education on community related issues
3) Information production, retention, processing, dissemination, and exchange between stakeholders
Explanation:
In Batman Arkham Asylum, how did joker turn into a titan
Complete the flowchart to calculate the area of a rectangle
I really need help with this. I've been so lost on this and other FRQ's my class has been doing. I don't have the slightest clue how to start the code after "public class GuessingGame{"
Answer:
ummmmmmmmm the ansswer is a
Explanation:
got it on my test its right
After a security event that involves a breach of physical security, what is the term used for the new measures, incident review, and repairs meant to stop a future incident from occurring
Answer: Recovery
Explanation:
The term that is used for the new measures, incident review, and repairs meant to stop a future incident from occurring after a security breach has occured is known as recovery.
It should be noted that recovery helps in the protection of data after a data breach has occured. The incident that led to the day breach is reviewed and necessary security measures are put in place in order to prevent such from happening again.
What is the smallest number of bits that would be needed to store the number '50' in binary?
Answer:
6 bits
Explanation:
5 bits gets you 2^5=32 possibilities (values 0-31), which is not enough for 50.
6 bits gets you 2^6=64 possibilities (values 0-63), which is enough.
To calculate for an arbitrary number, take the 2-log, and round up:
[tex]\log_2(50) \approx 5.64[/tex]
rounded up is 6.
Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
queries
forms
procedures
Answer:
queries
Explanation:
I just took the Unit test review on edg 2021 :))))
ANo _____ works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end.
Answer: virtual private network
Explanation:
A virtual private network, is normally refered to as a VPN is simply referred to as an encrypted connection which is done over the Internet. We should note that it usually take solace from a particular device to th network.
The function of the encrypted connection is to assist in the transmission of sensitive data. It works by using the Internet to relay communications and it maintains privacy through security procedures.
A director was fined heavily for shooting in his own house in New York. What do you think was his mistake?
A.
He forgot to get the location release approved.
B.
He forgot to get the filming permit.
C.
He forgot to apply for permission rights.
D.
He forgot to take consent for using a brand name.
E.
He forgot to apply for synchronization rights.
Answer: B. He forgot to get the filming permit.
Answer:
b he for got fillming permits