Which file format cannot be added to a word document.

Answers

Answer 1

Answer:

MP4

Explanation:


Related Questions

for jhoantm please don't answer

Answers

I had to answer lol, I’m curious who Jhoantm is?

Answer:

its been a month, i dont think hes going to answer

Explanation:

A(n) ___________________ is a broad term that applies to a wide range of systems used to manage information security.

Answers

Answer:

Information Security Management System -

Avoid useing suggestive

Answers

The Internet is much more anonymous than the real world. People can hide their identities or even pretend to be someone they're not. This can sometimes present a real danger to children and teens who are online. Online predators may try to lure kids and teens into sexual conversations or even face-to-face meetings. Predators will sometimes send obscene material or request that kids send pictures of themselves. Therefore, it's important to teach your kids to be on their guard whenever they're online.

Teens are generally more at risk from predators. Because they are curious and want to be accepted, they may talk to a predator willingly, even if they know it's dangerous. Sometimes teens may believe they are in love with someone online, making them more likely to agree to a face-to-face meeting.

Hope it helps :)!~ (Sorry if you get it wrong or if I got it wrong-)

~The Confuzzeled homan

Which of the following could be a method for an object-oriented class called Student?
Group of answer choices

1.startCar

2.pages

3.teacher

4.printGrades

Answers

A method for an object-oriented class called Student could be: 4. printGrades.

What is a class?

In object-oriented programming (OOP) language, a class can be defined as a user-defined blueprint (prototype) or template that is typically used by programmers (software developers) to create objects and define the data types, categories, and methods that should be associated with these objects.

Additionally, an object class In object-oriented programming (OOP) language represents the superclass of every other classes when a programming language such as Java is used.

In conclusion, printGrades could be a method for an object-oriented class called Student.

Read more on object-oriented class here: brainly.com/question/20264183

A feature that allows you to quickly apply the contents of one cell to another cell or range of cells selected.

O auto fill

O auto sum

O fill down

O fill right

Answers

Answer:

Auto fill

Explanation:

I took the test!

Which of the following least illustrates inequity caused by the digital divide?

Answers

The head of government is in the prime Minister

Leslie’s parents put a big dry-erase board on the refrigerator and let the kids write suggestions for how to organize and assign household chores. Which step of problem solving does this situation illustrate?

A. Define the problem
B. Evaluate the solution
C. Determine possible solutions
D. State and check assumptions

Answers

Answer

determine possible solutions

Explanation:

im assuming

ty for the thanks

What tool should you use to extend network services beyond the demarc.

Answers

Punchdown tool is the tool should you use to extend network services beyond the demarc.

What is a punchdown tool?

The punch down tools are known to be set of tools that one can use to stop wires into punch down patch panels and bring down keystone jacks.

Note that a tool head blade is often employed  to push a wire conductor into a IDC terminal slot and as such this Punchdown tool can help you to extend network services beyond the demarc.

Learn more about network services  from

https://brainly.com/question/3521925

does anyone know how to by pass this pls help?

Answers

Answer:

Yeah all you Gotta do is press download file

Explanation:

mark me brainliest!!

what is the full form of icimod?

Answers

Answer:

International Centre for Integrated Mountain Development

Explanation:

you're welcome

The TechWorld goes on a fast pace, what do you think would be the solution to the growing amount of data being collected by the software applications to have a fully sustainable usage for customers like us?

Answers

The solution to the growing amount of data in software applications to have fully sustainable usage for customers is;

Development of a sustainable model for the future now requires data storage that is engineered to be lower power requirements, lower cooling requirements, and lower waste production.

Sustainable data storage and usage

The objective of Sustainable Data Storage Initiative is to spread awareness of the solutions that can reduce the environmental impact of high waste producing data centers.

The environmental impact of data infrastructure is growing as data workloads increase. Hence, building a sustainable model for the future now requires data storage that is engineered to be lower power requirements, lower cooling requirements, and lower waste production.

Read more on Sustainable data storage and usage;

https://brainly.com/question/24882256

40 points!!! Which of the following is a disadvantage of outsourcing?

A) The contracting company may not be able to preform the task.

B) Outsourcing does not allow business to focus on important tasks.

C) Outsourcing has higher costs.

D) It is harder to communicate with an outside company

Answers

Answer:

C.

Explanation:

All the other options are obtainable.

That which can be considered as a disadvantage of outsourcing is;  D) It is harder to communicate with an outside company

What is Outsourcing?

Outsourcing refers to the act of assigning work to contracted employees. This is a very good measure that can be used to help the business save costs and focus on more important tasks.

The money that would have been used in maintaining the staff is used to pay the outsourced company for an agreed period of time.

Usually, the contracted company is specialized in the aspect of the business for which they receive the contract.

The option that qualifies as a disadvantage of outsourcing is that it is harder to communicate with outside companies.

Linguistics with foreign organizations might not be as smooth as with employees.

Learn more about outsourcing here:

https://brainly.com/question/4456416

1. An auto repair shop charges as follows. Inspecting the vehicle costs $75. If no work needs to be done,
there is no further charge. Otherwise, the charge is $75 per hour for labour plus the cost of parts, with a
minimum charge of S120. If any work is done, there is no charge for inspecting the vehicle. Write a program
to read values for hours worked and cost of parts (cither of which could be 0) and print the charge for the job. ​

Answers

Answer:

charge = 0

hours_worked = int(input("Enter the hours worked: "))

cost_of_parts = float(input("Enter the cost of parts: "))

if hours_worked == 0:

   charge = 75

else:

   charge = 120 + (75 * hours_worked) + cost_of_parts

   

print("The charge is $" + str(charge))

Explanation:

*The code is in Python.

Initialize the charge as 0

Ask the user to enter the hours_worked and cost_of_parts

Check the hours_worked. If it is 0, that means there is no inspecting. Set the charge to 75

Otherwise, (That means there is an inspecting) set the charge to 120, minimum charge, + (hours_worked * 75) + cost_of_parts

Print the charge

>>> password = "sdf345"
>>> password.isalpha()
>>>

Answers

Answer:

False

Explanation:

just took this on edge. have a good one!

Answer:

The answer is False because the first number isn't capitalized.

Explanation:

Have a great day today, and be safe

Commands under menu bar in a computer

Answers

Answer:

File, Edit, and View

Explanation:

These are the standard ones that come with the software.

Question: 7 What is a Distributed Denial of Service (DDoS) attack?

A: An attempt by a government to deny Internet access to its citizens

B: An attempt to deny access to a website by flooding the website's servers with millions of requests from different computers

C: An attempt by one user to deny service to another user by posting malicious material on a social network

D: An attempt by an Internet user to access private information stored in a private database Nuesti

answer B ​

Answers

Answer:

B

Explanation:

your answer B is correct because it is Distributed meaning it is not just from one user or one government, but a network of computers flooding a server and denying the service offered by the server

An exception thrown from outside a try block:_________. a. will cause the program to terminate execution b. will be caught outside the catch block c. will be caught inside the catch block d. will remain inside the throw block None of these

Answers

Answer: A, It will cause the program to terminate execution.

Explanation: If an exception is thrown **inside** of a try block then it will be caught inside of the catch block but in this instance it’s asking what happens if the exception is thrown on the **outside** the try block so because the error cannot be caught in the catch block it leads to the program terminating.

The presentation programs' basic commands are found in ____.

Answers

Answer:

taskplane

Explanation:

Write a program that asks the student for his name and the month in which he/she was born. Students are then divided into sections, according to the following: Section A: Name starts between A - E Born between months 1 - 6 Section B: Name starts between F - L Born between months 1 - 6 Section C: Name starts between M - Q Born between months 7 - 12 Section D: Name starts between R - Z Born between months 7 - 12 Section E: All others

Answers

The program is an illustration of loops and conditional statements

What is a loop?

A loop is a program statement that is used to perform repetitive operations

What is a conditional statement?

A conditional statement is a statement that is used to make decisions

The main program

The program written in Python, where comments are used to explain each line is as follows:

#This creates an empty list for the sections

A = []; B = []; C = []; D = []; E = []

#This gets input for the number of students

count = int(input("Number of students: "))

#This iterates count times

for i in range(count):

   #This gets the name of each student

   name = input("Name: ").upper()

   #This gets the birth month

   month = int(input("Month: "))

   #The following if conditions determine the section of the student

   if name[0] in ['A','B','C','D','E'] and (month >= 1 and month <=6):

       A.append(name)

   elif name[0] in ['F','G','H','I','J','K','L'] and (month >= 1 and month <=6):

       B.append(name)

   elif name[0] in ['M','N','O','P','Q'] and (month >= 7 and month <=12):

       C.append(name)

   elif name[0] in ['R','S','T','U','V','W','X','Y','Z'] and (month >= 7 and month <=12):

       D.append(name)

   else:

       E.append(name)

#This prints the students in each section

print(A,B,C,D,E)

Read more about loops and conditional statements at:

https://brainly.com/question/24833629

True or False: Data in a smart card can be erased

Answers

Answer:

I think its true but i can't explain it

Answer:

False

Explanation:

optical memory cards can store up to 4MB of data.but once the data is written it cant be changed or erased

how the changes to the engines of the aircraft have made it more aerodynamic

Answers

Explanation:

Winglets are devices mounted at the tip of the wings. Winglets are used to improve the aerodynamic efficiency of a wing by the flow around the wingtip to create additional thrust. They can improve airplane performance as much as 10% to 15%.

_____ is typically used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).
a) The motherboard
b) The control unit
c) Main memory

Answers

Answer:

A register

Explanation:

Registers are small memory used to store data or values and supply them to the processor as and when needed. These register hold the data temporarily and hold small units of program instructions. So whenever the CPU wants to work on data they have to be made available through the registers. Even after a arithmetic operation the registers serve as buckets for holding the value.

There are different types of registers such as register A, B, C etc and these registers lie in close proximity to the CPU so that we could provide the data immediately and much faster when asked by the CPU.

Therefore we can say that registers are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).

Is this statement true or false?

Electric currents flow easily through materials that are conductors and through materials that are insulators.

True
False

Answers

True cuz think of it like this a conductor of a train is traviling the conductor(electricity) is traviling through the insulators

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless access point with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat? Group of answer choices Evil twin Evil networking Evil attacker Evil access control

Answers

Answer:

evil attacker or evil control

The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C 01 00 00 20 65 58 74 65 6E 64 65 64 20 03.

Answers

The correct word for the blank space about the given header that starts with the given hexadecimal and the given offset bytes is; XIF header

What is the computer header?

The correct answer is the XIF Header also called the EXIF (Excahangeable Image File format header).

EXIF file format is the same thing as JPEG file format. The EXIF inserts some of image information data and thumbnail image to JPEG in order to achieve conformity to the JPEG specification.

Finally, this XIF header starts with hexadecimal 49 49 2A and has an offset of four bytes.

Read more about headers at; https://brainly.com/question/12435434

Which student is demonstrating the most effective time-management skills?

Answers

could you please elaborate? i’m not sure what you’re trying to ask!

Answer:

Carlo sticks to a regular study schedule.

Explanation:

I did this already.

When a client PC is booted, it broadcasts a __________________________ message over the network to locate DHCP servers on the same subnet.

Answers

When a client PC is booted, it broadcasts a Dhcpdiscover message over the network to locate DHCP servers on the same subnet.

What is a Dhcpdiscover message?

The Dhcpdiscover message is known too be a message that has a kind of an identifier that is specific  to a client (such as the MAC address).

This message is one that also has some other requests, such as:

Requested options e.g  subnet mask, domain name server, etc.

Note that if client PC is booted, it shares a Dhcpdiscover message over the network to locate DHCP servers on the same subnet.

Learn more about network from

https://brainly.com/question/1167985

A storeowner rents movies to customers. How can a database help the store owner?

Answers

The database can help the store owner as it will help them to monitor  the movies, customers, orders, and movie suppliers for their single movie rental store.

What is database?

A database is known to be a kind of organized composition of structured information, or data, that are said to be stored electronically in a computer system.

Conclusively, An example are MySQL, SQL Server, MongoDB, etc. These modern databases are managed by DBMS.

Learn more about database from

https://brainly.com/question/518894

The telephone, invented in 1876, converted acoustic sound to electric signals. However, the audio production industry began using the electrical recording system only in 1925. Why was there a delay in using this technology in audio production? The missing piece of technology that prevented the audio production industry from using the electrical recording system earlier was a device that could the electric signal. The device that made this possible was the .

Answers

Answer:

The missing piece of technology that prevented the audio production industry from using the electrical recording system earlier was a device that could amplify the electric signal. The device that made this possible was the Audion valve

Explanation:

The telephone system in the passage is able to convert sound to electronic signals in a crude manner, without amplification. The electrical recording system, whereby a microphone converted sound into amplified electrical signals  was, made possible by the invention of the electronic valve, known as the Audion triode vacuum tube by Lee De Forest in 1906. Electrical sound systems were built based on the Audion tube before transistor-based audio equipment became commercially available in the 1950s.

What will be the output of the following code?int p = 3,ch = 2;switch(ch){case 1: System. Out. Println("The square is: " + p*p);break;case 2: System. Out. Println("The cube is: " + p*p*p);break;default: System. Out. Println("No Output Value");}

Answers

“The cube is: 27”
or p^3
The switch function uses the ch int and identifies a matching case. Because ch is 2
We use case 2
Thus the following line at the top is printed.
Then automatically breaks the function, so we don’t continue.
Other Questions
Which one is correct?A)If you were to do your homework tomorrow, you would be relaxed today.B)If you did your homework tomorrow, you would be relaxed today.C)Both A and B are correct. The authors of The Little Rock Nine and A Sit-in at Woolworths use different text structures to communicate their ideas. Identify the text structure of each passage and give one detail from each passage that helps illustrate its structure. Fill in the blank with the correct form of the verb "ir". How did carpetbaggers influence the social structure of the South during Reconstruction?Question 5 options:They set up a system in which African Americans could buy and invest in landThey policed southern states and helped enforce Reconstruction lawsThey moved from the North to the South and helped Republicans get more votersThey terrorized African Americans and their alliesQuestion 6 (1 point) How did carpetbaggers and scalawags influence the structure of the South during Reconstruction?Question 6 options:They helped create a Republican voter alliance, providing votes that supported civil rights in southern statesThey were African American groups that won election to office, creating new laws that protected civil rightsThey sought to overturn the legislative branch of governmentThey created the sharecropping system, preventing African Americans from gaining economic power in the SouthQuestion 7 (1 point) How did black codes affect people living in southern states during Reconstruction?Question 7 options:They allowed African Americans to own only certain kinds of propertyThey provided opportunities for African Americans to take up leadership positions in governmentThey prevented African Americans from owning any propertyThey made it illegal to deny voting rights to African Americans spanish :look at the pictures 7. a. dilate point c using center d and scale factor 3/4 b. dilate segment ab using center d and scale factor 1/2. 1. Which of the following triangles is classified as a right triangle?a triangle with side lengths of 5, 12, 16a triangle with side lengths of 10, 11, 14a triangle with side lengths of 3, 4, 6a triangle with side lengths of 12, 16, 20 Please help :)It would be really helpful if your formatted your answer like 8b. (Answer)Its fine if you cant answer them all juts say which ones your can :) tysm! Which word best describes the rocks grain shape? jagged oval round smooth. please help!! a circular garden has a diameter of 16 yards. what is the area of the garden. use 3.14 for pi.A. 50.24 yd2B. 100.48 yd2C. 200.96 yd2D. 803.84 yd2 (CO 3) On the production line the company finds that 90.2% of products are made correctly. You are responsible for quality control and take batches of 30 products from the line and test them. What number of the 30 being correctly made would cause you to shut down production write about nomadic and barbarian society the legs of a right triangle measure 52 cm and 42 cm. find the area Which is the correct order of events for hormones activating gs proteins?. 3. Similar cells work together in a_which is part of an_which is part_ Analyze the given diagram of the carbon cycle below.Part 1: Which process does arrow A represent?Part 2: Which type of energy transformation does arrow A represent?Part 3: Justify why this process is a recycling of carbon in the carbon cycle.Use complete sentences to explain your answer. 1. Which of the following models is an exponential decay model?a) y = 12 (3.57)^t b) y = 4 (1.21)^tc) y = 1 + 6td) y = 7 (0.98)^t2. Which of the following models is an exponential decay model?A) y = 2,000 (0.07)^tB) y = 4,000 (3.84)^tC) y = 26t^2D) y = 1 + 17t3. Exponential decay models have a base between ____ and ____. How does the generals comment, Do you know now youre the general of the army when the generals left behind?prove to be a decisive moment in the conversation between him and Joby? What theme is developed through their interaction?- The Drummer Boy of Shiloh A box of dried fruit has 52 Calories in 4 servings how many calories are there per serving The expression, 2/3, can mean which of the following?A. 2 parts of size 3 eachB. 3 parts of size 2 eachC. 3 parts of size eachD.2 parts of size each(PLEASE I NEED HELP)