The factor which most establishes an internet search as efficient and useful for a business is:
A.the number of people who use it.
B.the ancillary options it has (reverse image search, audio search, etc.).
C. a well-curated index.
D. how it monetizes searches.

Answers

Answer 1

Answer:

a well-curated index.

Explanation:

Got it right on a test

Answer 2

The factor which most establishes an internet search as efficient and useful for a business is the number of people who use it. The correct option is A.

What is internet?

The Internet, also known as "the Net," is a worldwide system of computer networks a network of networks in which users at any one computer can obtain information from any other computer if they have permission.

The Internet is referred to as a network of networks because it is a global network of computers that are linked together by cables and telephone lines, allowing them to communicate with one another.

A well-curated index is the factor that most establishes an internet search as efficient and useful for a business.

A Curator selects and manages the assets in a Curated Index vault. A curator selects the assets and determines their respective valuations before adding them to the vault and issuing vault shares.

Thus, the correct option is A.

For more details regarding internet, visit:

https://brainly.com/question/13308791

#SPJ5


Related Questions

Works in the public domain have copyright that are expired or abandoned true or false

Answers

Answer:

False

Explanation:

Only one of the two are true. Works in the public domain have a copyright that has expired only. E.g. Works of classical music artist, are almost always expired, in accorance with American Copyright law. Abandoning a copyright doesn't do anything because so long the copyright has remained unexpired, the copyright remains. Thats why it can take decades for a new movie in a series to release, like "IT" by Stephen King. The copyright hasn't expired but rather was 'abandoned'. Before "IT" 2017 was relasesed, the copyright was abandoned.

What are the steps In order that Jonah needs to follow to view the renaissance report ?

Answers

Incomplete question. The full question reads;

Jonah needs to add a list of the websites he used to his report. He opens the "Websites" document and copies the information. He now needs to change his view to the "Renaissance" report to add the information before saving his report.

What are the steps, in order, that Jonah needs to follow to view the "Renaissance" report?

Click on the View tab.

Go to the ribbon area.

Click on the "Renaissance" report.

Click on the Switch Windows tab.

Explanation:

Step 1.

Jonah should⇒ Go to the ribbon area

Step 2.

At the ribbon area, he should find and⇒ Click on the View tab.

Step 3.

Next⇒ Click on the Switch Windows tab.

Step 4.

Lastly, he can then⇒ Click on the "Renaissance" report.

I need help. People who know computer science. I have selected a word from the first 1000 words in my dictionary. Using the binary search algorithm, how many questions do you have to ask me to discover the word I have chosen?
a. 8 b. 10 c. 12 d. 14

Answers

Answer:

14

Explanation:

Question 8 (3 points) Which of the following is an external factor that affects the price of a product? Choose the answer.
sales salaries
marketing strategy
competition
production cost​

Answers

Answer: tax

Explanation: could effect the cost of items because the tax makes the price higher

oh sorry i did not see the whole question

this is the wrong awnser

Answer is competition

Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which principal of programing should Alice review?

Answers

Answer:

sequencing

Explanation:

from flvs

Answer:

Sequencing

Explanation:

Language: C
Introduction
For this assignment you will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The cipher you will write will use a pair of numbers corresponding to each letter in the text. The first number denotes the position of a word in the key text (starting at 0), and the second number denotes the position of the letter in the word (also starting at 0). For instance, given the following key text (the numbers correspond to the index of the first word in the line):
[0] 'Twas brillig, and the slithy toves Did gyre and gimble in the wabe;
[13] All mimsy were the borogoves, And the mome raths outgrabe.
[23] "Beware the Jabberwock, my son! The jaws that bite, the claws that catch!
[36] Beware the Jubjub bird, and shun The frumious Bandersnatch!"
[45] He took his vorpal sword in hand: Long time the manxome foe he sought—
The word "computer" can be encoded with the following pairs of numbers:
35,0 catch
5,1 toves
42,3 frumious
48,3 vorpal
22,1 outgrabe
34,3 that
23,5 Beware
7,2 gyre

Answers

The .cpp code is avaiable bellow

Code:

#include <stdio.h>

#include <string.h>

int main()

{

    char **kW;

    char *fN;

    int nW = 0;

    kW = malloc(5000 * sizeof(char*));

    for (int i = 0; i<5000; i++)

    {

         kW[i] = (char *)malloc(15);

    }

    fN = (char*)malloc(25);

    int choice;

    while (1)

    {

         printf("1) File text to use as cipher\n");

         printf("2) Make a cipher with the input text file and save result as output file\n");

         printf("3) Decode existing cipher\n");

         printf("4) Exit.\n");

         printf("Enter choice: ");

         scanf("%d", &choice);

         if (choice == 1)

         {

             nW = readFile(kW, fN);

         }

         else if (choice == 2)

         {

             encode(kW, fN, nW);

         }

         else

         {

             Exit();

         }

         printf("\n");

    }

    return 0;

}

int readFile(char** words, char *fN)

{

    FILE *read;

    printf("Enter the name of a cipher text file:");

    scanf("%s", fN);

    read = fopen(fN, "r");

    if (read == NULL)

    {

         puts("Error: Couldn't open file");

         fN = NULL;

         return;

    }

    char line[1000];

    int word = 0;

    while (fgets(line, sizeof line, read) != NULL)

    {

         int i = 0;

         int j = 0;

         while (line[i] != '\0')

         {

             if (line[i] != ' ')

             {

                  if (line[i] >= 65 && line[i] <= 90)

                  {

                       words[word][j] = line[i]; +32;

                  }

                  else

                  {

                       words[word][j] = line[i];

                  }

                  j++;

             }

             else

             {

                  words[word][j] = '\n';

                  j = 0;

                  word++;

             }

             i++;

         }

         words[word][j] = '\n';

         word++;

    }

    return word;

}

void encode(char** words, char *fN, int nwords)

{

    char line[50];

    char result[100];

    if (strcmp(fN, "") == 0)

    {

         nwords = readFile(words, fN);

    }

    getchar();

    printf("Enter a secret message(and press enter): ");

    gets(line);    

    int i = 0, j = 0;

    int w = 0, k = 0;

    while (line[i] != '\0')

    {        

         if (line[i] >= 65 && line[i] <= 90)

         {

             line[i] = line[i] + 32;

         }

         w = 0;

         int found = 0;

         while (w<nwords)

         {

             j = 0;

             while (words[w][j] != '\0')

             {

                  if (line[i] == words[w][j])

                  {

                       printf("%c -> %d,%d \n", line[i], w, j);

                       found = 1;

                       break;

                  }

                  j++;

             }

             if (found == 1)

                  break;

             w++;

         }

         i++;

    }

    result[k] = '\n';

}

void Exit()

{

    exit(0);

}

To write a letter using Word Online, which document layout should you choose? ASAP PLZ!

Answers

Traditional... See image below

Answer: new blank document

Explanation: trust is key

You want to look up colleges but exclude private schools. Including punctuation, what would you
type?
O nonprofit college
O college -private
O private -college
O nonprofit -college

Answers

private-college. hope this helped :)

You want to look up colleges but exclude private schools. Including punctuation, The type is private -college. The correct option is c.

What are institutions of higher studies?

The institutions for higher studies are those institutions that provide education after schooling. They are colleges and universities. Universities, colleges, and professional schools that offer training in subjects like law, theology, medicine, business, music, and art are all considered higher education institutions.

Junior colleges, institutes of technology, and schools for future teachers are also considered to be part of higher education. There are different types of colleges, like government colleges and private colleges. Private colleges are those which are funded by private institutions.

Therefore, the correct option is c. private -college.

To learn more about excluding, refer to the link:

https://brainly.com/question/27246973

#SPJ2

Which situation best illustrates how traditional economies meet their citizens needs for employment and income

APEX!!

A. A parent teaches a child to farm using centuries old techniques.
B. A religious organization selects a young person to become a priest
C. A government agency assigns a laborer a job working in a factory
D. A corporation hires an engineer who has just graduated from college

Answers

The situation that best show how traditional economies meet their citizens needs for employment and income  is that a parent teaches a child to farm using centuries old techniques.

What is a traditional economy about?

A traditional economy is known to be a type of system that depends on customs, history, and time framed/honored beliefs.

Tradition is know to be the guide that help in economic decisions such as production and distribution. Regions with traditional economies are known to depend on agriculture, fishing, hunting, etc.

Learn more about  traditional economies from

https://brainly.com/question/620306

Assume you are using an array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements, dequeue 5 elements, and then enqueue 1 more element. Which index of the internal array elements holds the value of that last element you enqueued

Answers

Answer:

The answer is "5".

Explanation:

In the queue based-array, it follows the FIFO method, and in the question, it is declared that a queue has a capacity of 10 elements, and insert the 5 elements in the queue and after inserting it enqueue 5 elements and at the last, it inserts an element 1 more element on the queue and indexing of array always start from 0, that's why its last element index value is 5.

Explain why it is not necessary for a program to be completely free of defects before it is delivered to its customers?

Answers

Answer:

Testing is done to show that a program is capable of performing all of its functions and also it is done to detect defects.

It is not always possible to deliver a 100 percent defect free program

A program should not be completely free of all defects before they are delivered if:

1. The remaining defects are not really something that can be taken as serious that may cause the system to be corrupt

2. The remaining defects are recoverable and there is an available recovery function that would bring about minimum disruption when in use.

3. The benefits to the customer are more than the issues that may come up as a result of the remaining defects in the system.

For this lab you will do 2 things:


Solve the problem in an algorithm

Code it in Python

Problem:


Cookie Calories


A bag of cookies holds 40 cookies. The calorie information on the bag claims that there are 10 "servings" in the bag and that a serving equals 300 calories. Write a program that asks the user to input how many cookies he or she ate and the reports how many total calories were consumed.


*You MUST use constants to represent the number of cookies in the bag, number of servings, and number of calories per serving. Remember to put constants in all caps!


Make sure to declare and initialize all variables before using them!


Then you can do the math using those constants to find the number of calories in each cookie.


Make this program your own by personalizing the introduction and output.




Sample Output:


WELCOME TO THE CALORIE COUNTER!!

Answers

Answer:

Here is the Python program:

COOKIES_PER_BAG = 40 #sets constant value for bag of cookies

SERVINGS_PER_BAG = 10 #sets constant value for serving in bag

CALORIES_PER_SERVING = 300 #sets constant value servings per bag

cookies = int(input("How many cookies did you eat? ")) #prompts user to input how many cookies he or she ate

totalCalories = cookies * (CALORIES_PER_SERVING / (COOKIES_PER_BAG / SERVINGS_PER_BAG)); #computes total calories consumed by user

print("Total calories consumed:",totalCalories) #displays the computed value of totalCalories consumed

Explanation:

The algorithm is:

StartDeclare constants COOKIES_PER_BAG, SERVINGS_PER_BAG and CALORIES_PER_SERVINGSet COOKIES_PER_BAG to 40Set SERVINGS_PER_BAG to 10Set CALORIES_PER_SERVING to 300Input cookiesCalculate totalCalories:                                                                                                                       totalCalories ← cookies * (CALORIES_PER_SERVING / (COOKIES_PER_BAG / SERVINGS_PER_BAG))Display totalCalories

I will explain the program with an example:

Lets say user enters 5 as cookies he or she ate so

cookies = 5

Now total calories are computed as:

totalCalories = cookies * (CALORIES_PER_SERVING / (COOKIES_PER_BAG / SERVINGS_PER_BAG));  

This becomes:

totalCalories = 5 * (300/40/10)

totalCalories = 5 * (300/4)

totalCalories = 5 * 75

totalCalories = 375

The screenshot of program along with its output is attached.

Write a program that finds the number of items above the average of all items. The problem is to read 100 numbers, get the average of these numbers, and find the number of the items greater than the average. To be flexible for handling any number of input, we will let the user enter the number of input, rather than fixing it to 100.

Answers

Answer:

Written in Python

num = int(input("Items: "))

myitems = []

total = 0

for i in range(0, num):

     item = int(input("Number: "))

     myitems.append(item)

     total = total + item

average = total/num

print("Average: "+str(average))

count = 0

for i in range(0,num):

     if myitems[i] > average:

           count = count+1

print("There are "+str(count)+" items greater than average")

Explanation:

This prompts user for number of items

num = int(input("Items: "))

This creates an empty list

myitems = []

This initializes total to 0

total = 0

The following iteration gets user input for each item and also calculates the total

for i in range(0, num):

     item = int(input("Number: "))

     myitems.append(item)

     total = total + item

This calculates the average

average = total/num

This prints the average

print("Average: "+str(average))

This initializes count to 0

count = 0

The following iteration counts items greater than average

for i in range(0,num):

     if myitems[i] > average:

           count = count+1

This prints the count of items greater than average

print("There are "+str(count)+" items greater than average")

1.2
Is media a curse or a blessing? Explain.​

Answers

Answer:

i think its both because if there is misunderstanding between media and government then the media distroys the government and if there us no misunderstanding between media and government and if it goes smoothly then its like a blessing for government

Answer:

Media is a blessing...a curse as well when it's misguiding the world and hiding the real sinner and juxtaposing the culprit as the saviour

Select the items that you may see on a Windows desktop.
Shortcuts to frequently used programs
System tray
Recycle Bin
Taskbar
O Database
Icons
O Quick Launch

Answers

Answer:

You may see:

The taskbar

The startmenu

Program icons within the taskbar

Shortcuts

Documents

Folders

Media files

Text files

The Recycle Bin

and so on...

There is a company of name "Baga" and it produces differenty kinds of mobiles. Below is the list of model name of the moble and it's price model_name Price reder-x 50000 yphone 20000 trapo 25000 Write commands to set the model name and price under the key name as corresponding model name how we can do this in Redis ?

Answers

Answer:

Microsoft Word can dohjr iiejdnff jfujd and

Microsoft Word can write commands to set the model name and price under the key name as corresponding model.

What is Microsoft word?

One of the top programs for viewing, sharing, editing, managing, and creating word documents on a Windows PC is Microsoft Word. The user interface of this program is straightforward, unlike that of PaperPort, CintaNotes, and Evernote.

Word documents are useful for organizing your notes whether you're a blogger, project manager, student, or writer. Because of this, Microsoft Word has consistently been a component of the Microsoft Office Suite, which is used by millions of people worldwide.

Although Microsoft Word has traditionally been connected to Windows PCs, the program is also accessible on Mac and Android devices. The most recent version of Microsoft Office Word.

Therefore, Microsoft Word can write commands to set the model name and price under the key name as corresponding model.

To learn more about microsoft word, refer to the link:

https://brainly.com/question/26695071

#SPJ5

What does the measurement tell you?

Schedule performance index

Answers

Answer:

how close the project is to being completed compared to the schedule/ how far ahead or behind schedule the project is, relative to the overall project

Explanation:

Cable television systems originated with the invention of a particular component. What was this component called?​

Answers

Answer:

Cable television is a system of delivering television programming to consumers via radio frequency (RF) signals transmitted through coaxial cables, or in more recent systems, light pulses through fibre-optic cables. This contrasts with broadcast television (also known as terrestrial television), in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television; or satellite television, in which the television signal is transmitted by a communications satellite orbiting the Earth and received by a satellite dish on the roof. FM radio programming, high-speed Internet, telephone services, and similar non-television services may also be provided through these cables. Analog television was standard in the 20th century, but since the 2000s, cable systems have been upgraded to digital cable operation.

Explanation:

[tex]hii[/tex]have a nice day ✌️✌️

Cable television systems originated with the invention of a particular component. The component is a coaxial cable. The correct option is A.

What is a cable television system?

Radiofrequency (RF) signals are transferred through coaxial cables, or in more current systems, light pulses are transmitted through fiber-optic cables, to deliver television programming to viewers via cable television networks.

This is in contrast to satellite television, which transmits the television signal via a communications satellite orbiting the Earth and receives it via a satellite dish.

It broadcast television, in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television.

Therefore, the correct option is A. coaxial cable.

To learn more about the cable television system, refer to the link:

https://brainly.com/question/29059599

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A. coaxial cable

B. analog transmission

C. digital transmission

D. community antenna

In this exercise you will debug the code which has been provided in the starter file. The code is intended to take two strings, s1 and s2 followed by a whole number, n, as inputs from the user, then print a string made up of the first n letters of s1 and the last n letters of s2. Your job is to fix the errors in the code so it performs as expected (see the sample run for an example).
Sample run
Enter first string
sausage
Enter second string
races
Enter number of letters from each word
3
sauces
Note: you are not expected to make your code work when n is bigger than the length of either string.
1 import java.util.Scanner;
2
3 public class 02_14_Activity_one {
4 public static void main(String[] args) {
5
6 Scanner scan = Scanner(System.in);
7
8 //Get first string
9 System.out.println("Enter first string");
10 String s1 = nextLine(); 1
11
12 //Get second string
13 System.out.println("Enter second string");
14 String s2 = Scanner.nextLine();
15
16 //Get number of letters to use from each string
17 System.out.println("Enter number of letters from each word");
18 String n = scan.nextLine();
19
20 //Print start of first string and end of second string
21 System.out.println(s1.substring(1,n-1) + s2.substring(s1.length()-n));
22
23
24 }

Answers

Answer:

Here is the corrected program:

import java.util.Scanner; //to accept input from user

public class 02_14_Activity_one { //class name

    public static void main(String[] args) { //start of main method

    Scanner scan = new Scanner(System.in); //creates Scanner class object

  System.out.println("Enter first string"); //prompts user to enter first string

          String s1 = scan.nextLine(); //reads input string from user

  System.out.println("Enter second string"); //prompts user to enter second string

          String s2 = scan.nextLine(); //reads second input string from user

    System.out.println("Enter number of letters from each word"); //enter n

          int n = scan.nextInt(); //reads value of integer n from user

          System.out.println(s1.substring(0,n) + s2.substring(s2.length() - n ));

         } } //uses substring method to print a string made up of the first n letters of s1 and the last n letters of s2.

Explanation:

The errors were:

1.

Scanner scan = Scanner(System.in);

Here new keyword is missing to create object scan of Scanner class.

Corrected statement:

 Scanner scan = new Scanner(System.in);

2.

String s1 = nextLine();  

Here object scan is missing to call nextLine() method of class Scanner

Corrected statement:

String s1 = scan.nextLine();

3.

String s2 = Scanner.nextLine();

Here class is used instead of its object scan to access the method nextLine

Corrected statement:

String s2 = scan.nextLine();

4.

String n = scan.nextLine();

Here n is of type String but n is a whole number so it should be of type int. Also the method nextInt will be used to scan and accept an integer value

Corrected statement:

int n = scan.nextInt();

5.

System.out.println(s1.substring(1,n-1) + s2.substring(s1.length()-n));

This statement is also not correct

Corrected statement:

System.out.println(s1.substring(0,n) + s2.substring(s2.length() - n ));

This works as follows:

s1.substring(0,n) uses substring method to return a new string that is a substring of this s1. The substring begins at the 0th index of s1 and extends to the character at index n.

s2.substring(s2.length() - n ) uses substring method to return a new string that is a substring of this s2. The substring then uses length() method to get the length of s2 and subtracts integer n from it and thus returns the last n characters of s2.

The screenshot of program along with its output is attached.

Order the steps for accessing the junk email options in outlook 2016

Answers

Answer:

1 Select a message

2 Locate the delete group on the ribbon

3 Click the junk button

4 Select junk email options

5 Choose one of the protection levels

Explanation:  

Correct on Edg 2021

Answer:

In this Order:

Select Message, Locate delete group, click the junk, choose one of the...

Explanation:

Edg 2021 just took test

Your program is going to compare the distinct salaries of two individuals for the last 5 years. If the salary for the two individual for a particular year is exactly the same, you should print an error and make the user enter both the salaries again for that year. (The condition is that there salaries should not be the exact same).Your program should accept from the user the salaries for each individual one year at a time. When the user is finished entering the salaries, the program should print which individual made the highest total salary over the 5 year period. This is the individual whose salary is the highest.You have to use arrays and loops in this assignment.In the sample output examples, what the user entered is shownin italics.Welcome to the winning card program.
Enter the salary individual 1 got in year 1>10000
Enter the salary individual 2 got in year 1 >50000
Enter the salary individual 1 got in year 2 >30000
Enter the salary individual 2 got in year 2 >50000
Enter the salary individual 1 got in year 3>35000
Enter the salary individual 2 got in year 3 >105000
Enter the salary individual 1 got in year 4>85000
Enter the salary individual 2 got in year 4 >68000
Enter the salary individual 1 got in year 5>75000
Enter the salary individual 2 got in year 5 >100000
Individual 2 has the highest salary

Answers

In python:

i = 1

lst1 = ([])

lst2 = ([])

while i <= 5:

   person1 = int(input("Enter the salary individual 1 got in year {}".format(i)))

   person2 = int(input("Enter the salary individual 1 got in year {}".format(i)))

   lst1.append(person1)

   lst2.append(person2)

   i += 1

if sum(lst1) > sum(lst2):

   print("Individual 1 has the highest salary")

else:

   print("Individual 2 has the highest salary")

This works correctly if the two individuals do not end up with the same salary overall.

Write a function that takes a string and return the back half of the string. If the string has an odd number of characters, include the extra character. Your solution should also work if given and empty string. Examples: back_half('abba') should return 'ba' back_half('abcba') should return 'cba'

Answers

Answer:

Written in Python

def back_half(inputstring):

    outputstring = ""

    lent = len(inputstring)

    if lent == 0:

         outputstring ="Empty String"

    elif lent%2 == 0:

         begin = lent/2

         for i in range(int(begin),lent):

              outputstring = outputstring + inputstring[i]

    else:

         begin = (lent+1)/2

         for i in range(int(begin-1),lent):

              outputstring = outputstring + inputstring[i]

    return outputstring

Explanation:

This line defines the function

def back_half(inputstring):

This line initializes outputstring to an empty string

    outputstring = ""

This calculates the length of the input string

    lent = len(inputstring)

This checks if the length of inputstring is 0. If yes, the function returns empty string

    if lent == 0:

         outputstring ="Empty String"

This checks if the length of inputstring is even.

    elif lent%2 == 0:

         begin = lent/2 This line gets the beginning of the half string

         for i in range(int(begin),lent):

              outputstring = outputstring + inputstring[i] This generates the half string

    else: This checks for odd length

         begin = (lent+1)/2 This line gets the beginning of the half string

         for i in range(int(begin-1),lent):

              outputstring = outputstring + inputstring[i] This generates the half string

    return outputstring This returns the outputstring

The hide/unhide feature only hides in the
_____ view?​

Answers

Answer: main...?

Explanation:

what is a computer ?it types​

Answers

Answer:

A computer is a digital device that you can do things on such as play games, research something, do homework.

Explanation:

Answer:

A computer can be best described as an electronic device that works under the control of information stored in it's memory.

There are also types of computers which are;

Microcomputers/personal computerMini computersMainframe computerssuper computers

Ms. Myers commented that _____ she slept in at the hotel was better than _____ she slept in at home.

Answers

The bed/ the bed is the answer

1. Write a function named problem1 to simulate the purchases in a grocery store. Write statements to read the price of each item until you enter a terminal value to end the loop. Calculate the subtotal and add a sales tax of 8.75% to the subtotal. Return the subtotal, the amount of the sales tax, and the total. Call the function and display the return results. (25 pts)​

Answers

Answer:

ok

Explanation:

Type the correct answer in the box
in which phishing technique are URLs of the spoofed organization misspelled?
anon
is a phishing technique in which URLs of the spoofed organization are misspelled

Answers

Answer: Link manipulation

Explanation:

Answer:

Typo Squatting

Explanation:

Reading for comprehension requires _____ reading?

1. passive
2. active
3. slow
4. fast

Answers

Answer:

IT is ACTIVE

Explanation: I took the quiz

Answer:

not sure sorry

Explanation:

Use the drop-down menus to explain how to personalize a letter.
1. Place the cursor where the name and address should appear.
2. Select
v in the mail merge wizard.
3. Select the name and address format and
if needed to link the correct data to the field.
4. Place the cursor below the address block, and select
from the mail merge wizard.
5. Select the greeting line format and click

Answers

Explanation:

Address block

Match Fields

Greeting Line

Ok

Place the cursor where the name and address should appear: This step is important as it identifies the exact location where the personalized information should be placed in the letter.

What is personalization?

Personalization refers to the process of customizing a communication, such as a letter or email, to make it more individualized and relevant to the recipient.

To explain how to personalize a letter:

Place the cursor where you want the name and address to appear: This step is critical because it determines where the personalised information should be placed in the letter.

In the mail merge wizard, enter v: This step involves selecting the mail merge feature in the word processor software. The mail merge feature is typically represented by the "v" symbol.

Choose the name and address format, and then [link] to link the correct data to the field: This step entails selecting the appropriate name and address format, such as "First Name," "Last Name," and "Address Line 1." It also entails connecting the data source (for example, a spreadsheet or database) to the relevant fields in the letter.

Place the cursor below the address block and use the mail merge wizard to select [Insert Greeting Line]: This step involves deciding where to place the greeting line in the letter, which is usually below the address block. The mail merge wizard offers formatting options for the greeting line based on the data source.

Choose the greeting line format and press [OK]: This step entails deciding on a greeting line format, such as "Dear [First Name]" or "Hello [Full Name]." Once the format is chosen, the user can finish personalising the letter by clicking "OK."

Thus, this can be concluded regarding the given scenario.

For more details regarding personalization, visit:

https://brainly.com/question/14514150

#SPJ2

Complete the following sentences using the drop-down menus.

is considered by some to be the most important program because of its popularity and wide use.

applications are used to display slide show-style presentations.

programs have revolutionized the accounting industry.

Answers

Answer:

✔ E-mail

is considered by some to be the most important program because of its popularity and wide use.

✔ Presentation

applications are used to display slide show-style presentations.

✔ Spreadsheet

programs have revolutionized the accounting industry.

Explanation:

just did it on edg this is all correct trust

the answers are:

- e-mail

- presentation

- spreadsheet

Other Questions
Please help and i will brainliestttt Find the cos of angle cA.3/5B.6/5C.5/3D.1 What is the goal of the Sherman Anti Trust Act? Every Friday, Jesse puts $3 into his piggy bank. is it discrete or continuous? Solve for n 3m+2n=8 how do you do theseee? How did the national debt increase to 54 million? En cardo uno de estos grupos, slo un animal corresponde a la definicion que turned al lado. Cul es? Can someone help me on 10-14 Lawn Master Company, a manufacturer of riding lawn mowers, has a projected income for the coming year as follows: Sales $ 44,000,000 Operating expenses: Variable expenses $ 28,600,000 Fixed expenses 7,700,000 Total expenses 36,300,000 Operating profit $ 7,700,000 Required: 1. Determine the breakeven point in sales dollars. 2. Determine the required sales in dollars to earn a before-tax profit of $9,152,500. (Do not round intermediate calculations. Round your answer to the nearest whole dollar amount.) 3. What is the breakeven point in sales dollars if the variable expenses increases by 9% Which best describes the thirteenth century invaders and conquerors of Russia? The two objects have different masses, the more massive object pulls with a greater force. TRUE OR FALSE? Your friend is worried about the growing power of military men in Rome government some others senators want to take Violent actions to stop generals from taking over as dictators your friend wants your advice is violent justified to save the Roman republic N 0 Q. What are the solutions to the graphed system?A. 0,-2 B. -2,0 and 2,0C. 3,1D. 0,-2 and 3,1 The following transactions occurred at the Daisy King Ice Cream Company.1. Started business by issuing 10,000 shares of capital stock for $23,000.2. Signed a franchise agreement to pay royalties of 5% of sales.3. Leased a building for three years at $530 per month and paid six months' rent in advance.4. Purchased equipment for $5,700, paying $2,000 down and signing a two-year, 10% note for the balance.5. Purchased $2,100 of supplies on account.6. Recorded cash sales of $1,100 for the first week.7. Paid weekly salaries and wages, $470.8. Paid for supplies purchased in item (5).9. Paid royalties due on first week's sales.10. Recorded depreciation on equipment, $70.Required:Prepare journal entries to record each of the transactions listed above. (If no entry is required for a transaction/event, select "No journal entry required" in the first account field.)Journal Entries Needed as followed:1. Started business by issuing 10,000 shares if capitol stock for $23,0002. Signed a franchise agreement to pay royalties of 5% of sales3. Leased a building for 3yrs st $530 per month and paid 6 months rent in advance4. Purchased equipment for $5700, paying $2000 down and signing a 2yr 10% note for the balance.5. Purchased $2100 of supplies on account6. Recorded cash sales of $1100 for the 1st week7. Paid weekly salareies and wages $47008. Paid for suplies purchased in item (5)9. Paid royalites due on 1st weeks sales10. Recorded depreciation on equipment $70 ActivityEXplain why a complex food web is better than a simple food chain for the survival of the community. A merchant surveyed 370 people to determine the way they learned about an upcoming sale. The survey showed that 170 learned about the sale from the radio 140 from television 190 from the newspaper, 90 from radio and television, 120 from radio and newspapers, 80 from television and newspaper, and 70 from all three sources. how many people learned of the sale from newspapers or radio, but not both? I need some help on this problem. Can anyone help me with the ones you know please check both images when a river deposits sediment which 2 spheres are interacting The running back deftly evaded the opposing team on the football field. Would he be surprised if the coach called him clumsy? Why or why not?