how do you draw first angle of orthographic projection
Computer has brought radical change in every field
Answer:
Yes it has brought change in every field
Explanation:
Which of these is NOT a component of a packet? Choose the answer.
Header
protocol
body (payload)
trailer(footer)
Answer:it is protocol i just took a test with the same question and i got protocol right
Explanation:
Fill in the blank: In a Word chart, text that describes the data represented in a chart and that is typically displayed on the right or at the bottom of the chart is called the ____.
Answer:
Data bar
Explanation:
In a Word chart, text that describes the data represented in a chart and that is typically displayed on the right or at the bottom of the chart is called the data bar.
What is a data bar?Data bars are used to describe a graphic element that inserts bars representing the values within cells. It is a type of conditional formatting that creates a visual effect in the cells of your database that correspond to the contents of the cell. A larger value represents a cell with a longer bar while a smaller value represents cell with a shorter bar.
Read more on data bar:
https://brainly.com/question/9700709
#SPJ2
What are the parts of word?
Answer:
Explanation:
ASIA includes 50 countries, and it is the most populated continent, the 60% of the total population of the Earth live here.
AFRICA comprises 54 countries. It is the hottest continent and home of the world's largest desert, the Sahara, occupying the 25% of the total area of Africa.
NORTH AMERICA includes 23 countries led by the USA as the largest economy in the world.
SOUTH AMERICA comprises 12 countries. Here is located the largest forest, the Amazon rainforest, which covers 30% of the South America total area.
ANTARCTICA is the coldest continent in the world, completely covered with ice. There are no permanent inhabitants, except of scientists maintaining research stations in Antarctica.
EUROPE comprises 51 countries. It is the most developed economically continent with the European Union as the biggest economic and political union in the world.
AUSTRALIA includes 14 countries. It is the least populated continent after Antarctica, only 0.2% of the total Earth population live here.
What is piracy? (1 point)
A.the use of copyright in federal court
B.copying, downloading, reproducing, or distributing materials without permission
C.exercising your intellectual property rights
D.giving others permission to use your tangible property
Answer:
B
Explanation:
Entities allow us to capture specific information in the user input
True
False
Answer:
True
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
An entity can be defined as an object, thing, place, people, etc., that exists in a database. The data are captured and stored as workflow, tables and properties in a computer database.
This ultimately implies that, all entities must have a property and are identifiable from every other object.
Hence, entities allow us to capture specific information in the user input such as people, place, object, thing, unit, etc.
arrange the following devices pendrive , hard disk , compact disc in descending order of storage capacity
Answer:hard disk compact disc
Explanation:
30 POINTS PLS HELP AND DONT PUT ANYTHING IF U DK PLS
Explain what might have gone wrong in the following situation:
Sandra is putting together a new computer and network out of used parts. She has sufficient parts that should work together—NIC card,
cables, hub, etc.—and all of them are functional by themselves, but somehow her computer is not successfully able to connect to the
network. What might be going wrong
Answer:
The issues that may be wrong are;
1) Improper connections
2) The drivers for the Network Interface Card, NIC card is not properly configured, installed, or missing
3) Reset the network settings
4) IPv6and ipv4 Compatibility
5) Other IP related IP issue
Explanation:
From the question, we have that Sandra has the required used and functional hardware for putting a new computer and a network together but her computer is not successfully able to connect to the network, which may be due to the following reasons;
1) Improper connections
Ensure that the connections are properly made and that the network cables are straight through when connected to a network or hub or crossover cables when connected directly between devices used for computing
2) The drivers for the Network Interface Card, NIC card is not properly configured, installed, or missing
When the issue is due to the drivers for the NIC card, it can be resolved by uninstalling and deleting the driver software from the computer and then rebooting the computer for the operating system (Windows 10 etc.) to search for and install the correct drivers for the used NIC
3) Reset the network settings
When the network settings are improperly configured or configured to a setting used in another network, it can lead to not successfully being able to connect to a network
The network settings should be reset
4) IPv6and ipv4 Compatibility
Ensure that the hardware are compatible to IPv6 and/or IPv4 and adjust the settings of the network as required
5) Other IP related IP issue
An IP issue can lead to not being able to successfully connect to a network which can be resolved releasing the IP and flushing the DNS cache.
write a program that asks length,breadth and height of a room and calculate its volume
Answer:
cls
Input"enter length";l
Input"enter breadth";b
Input"enter height";h
v=l*b*h
print"the volume is";v
end
Explanation:
hope you got it
Which of these is NOT an example of intellectual property? O a song you wrote O an article you published O hardware you purchased O a sculpture you created Question 5 9
Answer:
hardware you purchased
Explanation:
Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.
Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.
Generally, patents are used on innovation for products that are manufactured through the application of various technologies.
Basically, the three (3) main ways to protect an intellectual property is to employ the use of
I. Trademarks.
II. Patents.
III. Copyright.
An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.
Hence, a hardware you purchased is not an example of an intellectual property.
Calculate: 13.28 - 1.65
Answer:
13.28 - 1.65 = 11.63
Explanation:
hope it helps
Which printing option results in a word document with images of the slides and an area to take notes
Answer:
handout is the correct answer
Explanation:
on edge
Answer:
It's C - Handout
on edge 2021
Explanation:
Please help me with this lab I will give brainliest . It's about binary search tree. The instructions are in the files please help me.
What is a semiconductor
Answer:
Explanation:
Semiconductors are materials which have a conductivity between conductors and nonconductors or insulators.
Semiconductors can be pure elements
What does the narrator mean when she says Adnan and his friends were........
Answer:
he/she means that Adanan and his friend all were doing the ....
One problem with _______ is that often many copies of the same document are made.
HELPPP
Answer:
computer or internet is that often many copies of the same document .........
Use the factorial operation to evaluate 4!.
10
O 24
04
0 1
Answer:
24
Explanation:
factorial operation 4! = 4×3×2×1 = 24
which element can be changed using the Print pane? Check all that apply
Answer:B C D E
Explanation:
EDGE 2021
Which of the following is an example of an application ?
What is the purpose of the 300 Log?
Answer:
The OSHA Form 300 is a form for employers to record all reportable injuries and illnesses that occur in the workplace, where and when they occur, the nature of the case, the name and job title of the employee injured or made sick, and the number of days away from work or on restricted or light duty, if any.
Explanation: brainliest plzzzz!
the field names in a database are also known as__?
Answer:Here are some common database field types, which are called different names in accordance with the specific database design:
Text, Alphanumeric, Character, String
Byte
Short, Integer
Long, Integer
Single, Real
maybe more
Explanation:
Answer:
Column
Explanation:
I..d...k I’m not 100% sure
I'm kinda lazy if anyone agrees with me. I couldn't write the question but I took a pic.
Answer:
eat the stick
Explanation:
because its long and juicy
Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are completely customized?
Answer:
I just use the search bar in the app and type in shapes. Then you right click on the shape and click on edit points to shape it into whatever shape you want.
Explanation:
I went into the PowerPoint and did it myself.
how will you format date so that dates appear in a format similar to 26-January-2022
Answer:
26/01/2022or01/22/2022
Which one of the following is a type of network security?
a) Login Security
b) Rights Security
c) Both (a) and (b)
d) Neither (a), nor (b)
Answer:
I think it's (login security)
What types of information should have their sources cited to avoid plagiarism? List at least 3
Answer:
Everything.It doesn't matter the information because there's always a way to plagiarize.No matter what the information, always, ALWAYS, cite the source.
Explanation:
Answer:To avoid plagiarism, cite your sources for statistics, opinions, quotes, and judgments.
Explanation:
Write an algorithm and corresponding flowchart for a program that prints multiple of 5 starting with 100 and ending with 180.
Answer:
The pseudocode is as follows:
1. Start
2. total = 0
3. for i = 100 to 180 step 5
3.1 total = total + i
4. print total
5. Stop
Explanation:
This begins the algorithm
1. Start
This initializes the total to 0
2. total = 0
This iterates from 100 to 180 with an increment of 5
3. for i = 100 to 180 step 5
This adds up all multiples of 5 within the above range
3.1 total = total + i
This prints the calculates total
4. print total
This ends the algorithm
5. Stop
See attachment for flowchart
Select the correct answer.
Kristine has been getting many unsolicited emails from a particular address. She thinks that these emails may harm her computer. What action
should she take to automatically send such emails to a separate folder?
ОА.
send all such emails to the Trash folder
ОВ. group the emails and put them into a folder
OC. Send all such emails to the Spam folder
OD
delete these emails manually on a daily basis
C. Send all such emails to the Spam folder
The list blocks that allow for storing and accessing a list of numbers and strings is called.
String manipulation
Arrays
Variable
Random
Hey so the answer to this is a variable because variables can store text and numeral values when an array can only store numbers
hope this helps
have a great day
-scav aka Toby
Answer:Array is the right option because array accessing the list of variables and integers like 1,2,4..etc variables just hold the data.