Answer:
True.
Explanation:
Hope this helps you!
Dose brainly give you notifications on you're phone when you go into the site
Answer:
Yep it does ^_^
Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?
a. Each person needs to send email with his/her part of the project individually every day
b. Each person should be on a cloud folder and sync their files as they are working through their project
c. Each person needs to send a group email to the team as soon as any updates are completed
d. Each person should post their updated information on a team website so it is available for anyone to see
The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.
What is cloud computing?Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.
In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.
Read more on cloud computing here: https://brainly.com/question/19057393
How would a user ensure that they do not exceed the mailbox quota?
The user can select a mailbox that does not have a quota.
The user can flag the items as Junk Mail.
The user can just move items to the Deleted Items folder.
The user must empty items from the Deleted Items folder or Archive items.
Answer:
I don't know about this one
large technology company hosts hundreds of servers in a datacenter. The company invests a great deal of money into a risk prevention plan to protect the systems. One such solution is insurance that protects the hardware and the data. Which specific risk response strategy does the company utilize in this instance
The specific risk response strategy that the company utilize in this instance is risk transference.
What is Transference risk control strategy?Transference risk control strategy is known to be a type of strategy that firms uses to decides how they can lower or shut down a risk that it has encountered to another firm.
Note that in this situation above, large companies, instead of they trying to work and settle the risk themselves, they tend to give it to another such as a third party.
Learn more about insurance from
https://brainly.com/question/25855858
nums = [30, 10, 30, 14, 10, 3, 9, 7]
print(nums)
nums.extend([24, 3, 21, 19])
print(nums)
What is output by the second print statement in the code above?
Group of answer choices
[30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]
[30, 10, 30, 14, 10, 3, 9, 7]
[24, 3, 21, 19]
[24, 3, 21, 19, 30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]
The range function must have two parameters is False. ~Range has three possible sets of parameters: range(stop) - Returns 0 to the given stop value, counts by one.
What is program?A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.
On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.
Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.
Learn more about program on:
brainly.com/question/30613605
#SPJ3
define a touch-sensitive pad and state one use
Answer:
A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.
Explanation:
What would be considered a benefit of using simulation in the education field?
Simulation can reduce the costs of books.
Simulation can increase the cost of materials.
Simulation can reduce the number of teaching jobs.
Simulation can reduce the amount of homework for students.
Answer:
books cost
Explanation:
the books cost will go down, as they are to become digital, thus, making physical copies cheaper
Answer:
A
Explanation:
Did test
What will her profit be is she sells her CDs at this price?
what is alternative name of home page
Answer:
In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for home page, like: web page, web site, website, webpage and homepage.
Which of the following will Excel recognize as a date?
Group of answer choices
February 6 1947
2,6,47
2-Feb-47
None of the above
The option that shows how Excel recognize as a date is February 6 1947.
How does Excel see date?The Excel date is often seen as a regular number that is said to have been formatted to often look like a date.
One can you change the cell format to 'General' so that one can see the type of date serial number. Most times, the integer portion of the date serial number stands for the day, and the decimal portion stands for the time.
Read more about Excel from
https://brainly.com/question/25879801
Select all examples of ethical and appropriate use of business e-mails.
1 ) Claudia shares a joke with her coworkers.
2) Celia forwards an e-mail asking for donations to the relief fund for hurricane victims.
3) Lucia sets up a 2:00 meeting with her marketing team.
4) Iris sends a message about a rally to stop the sale of furs.
5) Ken deletes a message from his boss without reading it.
6) Karl sends a graphic to his coworker in an attachment. Karl sends a graphic to his coworker in an attachment.
Answer:
Number 3 only I believe, sorry if im wrong.
Explanation:
The most popular productivity suite in the world is microsoft office. please select the best answer from the choices provided t f
Statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).
What is productivity suite?productivity suite is a collection of programs desgined for the computer whcih has a word processor, presentation creater and spreadsheet creater.
Types of productivity suite-
Computer based productivity suite- This type of productivity suite are need to be installed the program on the computer, which can be work offline mode too.Online productivity suite- Online productivity suite are availeble on the internet and can be use whenever required without preinstallation.Microsoft office 365 is the best and the oldest productivity suite. Most of the people are familier with this suite and it is most popular productivity suite in the market.
Thus, the statement, the most popular productivity suite in the world is microsoft office is correct. The statment is ture (T).
Learn more about the productivity suite here;
https://brainly.com/question/2764685
25 points for this answer
Unethical uses of computer devices include _____. Select 3 options.
financial theft
surfing websites
identity theft
media piracy
downloading videos
Answer:
financial theft
identity theft
media piracy
Unethical uses of computer devices include the following:
Financial theft.Identity theft.Media piracy.What is an unethical use of a computer?The unethical use of a computer can be defined as the unauthorized and illegal (illegitimate) use of a computer system to perpetrate cyber crimes and other criminal inclined practices.
In Cybersecurity, unethical uses of computer devices by a hacker include the following:
Financial theft.Identity theft.Media piracy.Read more on computer crime here: https://brainly.com/question/13109173
#SPJ2
FOR loops are considered to be which of the following:
A. primarily pretest conditional loops
B. used for conditional statements
C. counter controlled loops
D. post test conditional loops
Answer:
C. counter controlled loop
Explanation:
A counter controlled loop, is a loop that repeats a specific number of times. If it is known how many times a loop must repeat or perform a certain task, it is a count controlled loop (for loop).
- It must initialize a counter variable to a starting value.
- It must test the counter variable by comparing it to a maximum value. When the counter variable reaches its maximum value, the loop terminates.
- It must update the counter variable during each iteration. This is usually done by incrementing the variable.
disadvantages of using lossless compression rather than lossy compression
Answer:
Larger files
Explanation
Lossless advantages and disadvantages Advantages: No loss of quality, slight decreases in image file sizes. Disadvantages: Larger files than if you were to use lossy compression.
Compression, Explained. We use compression to make files smaller, so that they take up less storage space and can be downloaded more quickly.
Lossless vs. Lossy Formats.
Lossy Compression. Lossy compression is useful because of its ability to shrink a file to a more convenient size
Select the Pixel Format to be either Mono8 or BayerRG8.
Ensure ISP Enable is not selected (disabled).
From the Image Compression Mode drop-down, select Lossless.
Select the Adaptive Compression Enable checkbox to allow dynamic updates to compression tables to achieve a better compression ratio.
In a print statement, you can set the ________ argument to a space or empty string to stop the output from advancing to a new line. true false
In a print statement, a user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line.
What is a print statement?A print statement can be defined as a line of code that is used to send data to the print or println method of a programming system such as compiler.
In Computer programming, an end user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line by using a print statement.
Read more on print statement here: https://brainly.com/question/21631657
Check My Work An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output
An information system includes applications, which are programs that handle the input, manage the processing logic, and provide the required output.
What are applications used in a computer system?Applications are software program that helps a computer user to work effectively with the computer system.
It helps the computer user by handling the input, managing the processing logic, and providing the required output.
Examples of application include:
Web browsersPresentation softwareSpreadsheetWord processorsTherefore, an information system includes applications, which are programs that handle the input, manage the processing logic, and provide the required output.
Learn more about application software here:
https://brainly.com/question/18661385
________ is a location service that allows applications to know when a user has crossed a specific location and then triggers an automated action.
The location service that allows applications to know when a user has crossed a specific location to trigger an automated action is; Geofencing
What is geofencing?Geofencing is a location-based service whereby an app or software uses GPS, RFID, Wi-Fi or even cellular data to trigger an already programmed action when a mobile device enters or exits a virtual boundary that is set up around a geographical location called a geofence.
Thus, the answer to the question would be geofencing as it tallies with the definition given above,
Read more about programs at; https://brainly.com/question/16397886
how academic skills for teachers help students at the university
Academic skills for teachers has help students at the university because with its use, students are able to have test-taking strategies and understands their courses more better.
Why are academic skills vital for university?The use of Academic skills is one that act to encourage students so they can be able to be more efficient and better learners.
Conclusively, It is one that give students the power or confidence to be involved fully in any courses that are useful for them outside of the classroom.
Learn more about skills from
https://brainly.com/question/1233807
The area that we can see just after windows is started is subject
Answer:
The area that we can see just after windows is started is desktop or working area.
Which three steps might be included in an algorithm for a digital thermostat?
✓ A. The thermostat uses the resistance detected to calculate the
temperature.
B. The thermostat sends an electrical signal to either the air
conditioner or the heater.
C. The thermostat measures electrical resistance with its thermistor.
O D. The thermostat automatically installs itself by wiring itself to the
house's electrical system.
Answer:
Explanation:
It certainly isn't D. It would cost a fortune to make that happen. It's not impossibe. Just impractical.
It's not A. Resistance is a floating physical thing present in the air.
B could be correct, but there is a better answer.
The answer is C. A thermistor is a resistance that is temperature sensitive.
What feature preserves your open apps and data, but allows another user to log in to his or her own session of the same computer
A feature that preserves open apps and data while allowing another user to log in to his or her own session of the same computer is: switch user.
What is a computer?A computer is an electronic device that is designed and developed to receive data from an end user in its raw form (input) and processes these data into an output that could be used for other purposes.
Generally, all computers are designed and developed with a feature called switch user, so as to preserve open software applications and data while allowing another user to log in to his or her own session of the same computer simultaneously.
Read more on computer here: brainly.com/question/959479
Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select
The type of animation that Alejandro should select show a series of images displayed in sequence is: Animated GIF.
What is graphic design?Graphic design can be defined as an artistic process that is used for the creation of various art works and animations.
In the creation of various graphic files such as in 2-D or 3-D, graphic designers can use a variety of software applications or programs to create still images and animations.
In this scenario, Alejandro should select an animated graphics interchange format (GIF) to show a series of images displayed in sequence.
Read more on graphic design here: brainly.com/question/25299426
difference between local technology and model technology with example
answer it correctly
Answer:
fertilizers: 950 bags
insecticides: P 2160.00
plowing: 5
harrowing: P 3150.00
Explanation:
29. The startup configuration file is stored in ________________ a. ROM b. NVRAM c. Flash Memory d. RAM
Answer:
The start configuration is stored on the nonvolatile random-access memory aka NVRAM for the vast majority of systems.
Ok. Explain this. Here are the two screenshots. Im offering 100 points.
Answer:
B
Explanation:
0.25>-0.25 because 0.25 is positive and further right on the number line.
Answer:
For the first one it's B cuz, 0.25>-0.25
0.25 is gr8r than negative 0.25
Explanation:
and for the second, I really don't know why it keeps saying that. I tried to answer a question and it said the same. Its kinda annoying
write a program to calculate sum of first ten natural numbers
Answer:
Explanation:
total = 0
i = 0
while i<=10:
total = i +total
print(total)
What happens when the button is clicked? Open the functions drawer and look at each of the StateLibrary functions. Mouseover them for documentation. How do these functions work? Click "Manage Libraries" in the gear menu, then click "view code" for the State Library. Read the code. How do the library functions work? Were your predictions correct?
Library functions work by assesment through its function name.
What are Library functions?Library functions are computer language that are made up of inbuilt functions which are grouped together in a place called library.
A library is the collection of resources or data used by computer programs for software development.
These resources may include:
configuration data, documentation,help data, message templates andpre-written code.Therefore, Library functions work by assesment through its function name.
Learn more about library here:
https://brainly.com/question/5961530
which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website