write the steps how to insert an online images​

Answers

Answer 1

Answer:

There are many ways but this way is to upload a pick from desktop to ur doccument ( TAE IS MY BIAS, STREAM BUTTER BBG)

Explanation:

0) Well obv u have to download a pick

1) Click in your where you want to insert your picture.

2) Click the Insert tab.

3) pick the picture you want to insert and select it.

4)Click Insert button


Related Questions

Which statement best describes a database?

Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.

Answers

I think it's a. A collection of related tables

¿Para que sirve Microsoft word?​

Answers

question not loading..

Refreshing..

i think to type documents on

EASY POINTS who is your favorite in family
1. mom
2. dad
3. sister
4. brother

Answers

Answer:

Thank you! And it would be my dad.

Explanation:

Mom and dad and sistrt………………………

Pascal system . write the program that will calculate the perimeter of a rectangle if its area is A (m²) and one of its sides has a length of B (m). A and B are entered from the keyboard.​

Answers

Answer:

The program in Pascal is as follows:

Program Perimeter;

Uses Crt;

Var

 Length : Real;

 Width : Real;

 Area    : Real;

 Perim : Real;

Begin

 Clrscr;

 Write('Area: ');

 Readln(Area);

 Write('Length : ');

 Readln(Length);

 Width := Area/Length;

 Perim := 2 * (Length + Width);

 Write('Perimeter: ' ,Perim:5:2,'.');

End.

Explanation:

This declares all variables as real

Var

 Length : Real;

 Width : Real;

 Area    : Real;

 Perim : Real;

The program execution begins here

Begin

This clears the screen

 Clrscr;

This prompts the user for Area

 Write('Area: ');

This gets input for Area

 Readln(Area);

This prompts the user for Length

 Write('Length : ');

This gets input for Length

 Readln(Length);

This calculates the width

 Width := Area/Length;

This calculates the perimeter

 Perim := 2 * (Length + Width);

This prints the calculated perimeter

 Write('Perimeter: ' ,Perim:5:2,'.');

This ends the program

End.

The quick access toolbar is ____.

Question 1 options:

is not customizable

is located at the bottom of the screen


is the fastest way to access the most used features

Question 2 (1 point)
The ribbon is where you will find all of the options to make a spreadsheet.

Question 2 options:
True
False
Question 3 (1 point)
The Display Options allow you to... (select all that apply)

Question 3 options:

close Excel altogether


change how much of the ribbon is displayed


minimize, maximize or restore the screen

Question 4 (1 point)
The "Tell Me" box allows _____

Question 4 options:

allows someone to find a command by typing it out. This way you can skip searching through the ribbon tabs for a command.


shows which cell is currently selected.


Displays the name of the current file.

Question 5 (1 point)
Each column is labeled with a letter, and each row is labeled with a number; giving each cell a unique name.

Question 5 options:
True
False
Question 6 (1 point)
All the cells make up a _________

Question 6 options:

notebook


workbook


worksheet

Question 7 (1 point)
Multiple worksheets make up the________, or the file.

Question 7 options:

cells


workbook

Question 8 (3 points)
Microsoft Excel can be downloaded for free, just like Word and PowerPoint, as a student at Digital Academy of Florida. Click here for instructions to download.

Question 8 options:
True
False

Answers

Answer:

question 1 is a fast way of accessing used features

Answer:

Explanation:

Question 2 (1 point)

The ribbon is where you will find all of the options to make a spreadsheet.

True

Question 3 (1 point)

The Display Options allow you to... (select all that apply)

minimize, maximize or restore the screen

Question 4 (1 point)

The "Tell Me" box allows _____

allows someone to find a command by typing it out. This way you can skip searching through the ribbon tabs for a command.

Question 5 (1 point)

Each column is labeled with a letter, and each row is labeled with a number; giving each cell a unique name.

True

Question 6 (1 point)

All the cells make up a _________

worksheet

Question 7 (1 point)

Multiple worksheets make up the________, or the file.

workbook

Look at the following partial class definition, and then respond to the questions that follow it:


public class Book


{


private String title;


private String author;


private String publisher;


private int copiesSold;


}


a. Write a constructor for this class. The constructor should accept an argument for each of the fields.


b. Write accessor and mutator methods for each field.


c. Draw a UML diagram for the class, including the methods you have written.

Answers

Solution :

a.

public Book([tex]$\text{String title}$[/tex], String author, [tex]$\text{String publisher}$[/tex], int [tex]$\text{copiesSold}$[/tex]) {

 this.[tex]$\text{title}$[/tex] = [tex]$\text{title}$[/tex];

 this.[tex]$\text{author}$[/tex] = [tex]$\text{author}$[/tex];

 this.[tex]$\text{publisher}$[/tex] = [tex]$\text{publisher}$[/tex];

 this.[tex]$\text{copiesSold}$[/tex] = [tex]$\text{copiesSold}$[/tex];

b). [tex]$\text{public String}$[/tex] getTitle() {

 return [tex]$\text{title}$[/tex];

}

[tex]$\text{public void}$[/tex] setTitle([tex]$\text{String title}$[/tex]) {

 this.[tex]$\text{title}$[/tex] = [tex]$\text{title}$[/tex];

}

[tex]$\text{public String}$[/tex] getAuthor() {

 return author;

}

[tex]$\text{public void}$[/tex] setAuthor(String author) {

 this.[tex]$\text{author}$[/tex] = [tex]$\text{author}$[/tex];

}

[tex]$\text{public String}$[/tex] getPublisher() {

 return [tex]$\text{publisher}$[/tex];

}

[tex]$\text{public void}$[/tex] setPublisher(String [tex]$\text{publisher}$[/tex]) {

 this.[tex]$\text{publisher}$[/tex] =[tex]$\text{publisher}$[/tex];

}

public int get[tex]$\text{copiesSold}$[/tex]() {

 return [tex]$\text{copiesSold}$[/tex];

}

[tex]$\text{public void}$[/tex] set[tex]$\text{copiesSold}$[/tex](int [tex]$\text{copiesSold}$[/tex]) {

 this.[tex]$\text{copiesSold}$[/tex] = [tex]$\text{copiesSold}$[/tex];

}

Help! ASAP! 1 Question.........°○°​

Answers

Answer: I think D)?

Explanation: Or B)

Need answer ASAP!!!!

Answers

Hi,

I tried answering this. Lol. Look at the image.

(25 POINTS)Which statement best reflects the importance of following safety guidelines?

Workplace injuries can result in losses to an organization’s profits.

OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.

Every year, thousands of people die as a result of workplace injuries.

Using equipment safely is faster and makes work more efficient.

Answers

Answer:

I think, Every year, thousands of people die as a result of workplace injuries.

Answer:

B

Explanation:

What are the 8 tips for
healthy living?​

Answers

Answer:

Base your meals on starchy foods.

Eat lots of fruit and vegetables.

Eat more fish.

Cut down on saturated fat and sugar.

Try to eat less salt- no more than 6g a day.

Get active and try to be a healthy weight.

Drink plenty of water

Explanation:

Francesca wants to create a program that will produce the phrase “Hello, world” on the screen. Which of these functions should Francesca use?

Answers

Answer:

It would be print.

Explanation:

If you want to execute a function it should be print so it will show up in the output box.

(25 POINTS) Some applications work on all devices while others work on some devices. True or False?

Answers

Answer:

True.

Explanation:

It is true that some applications work on some devices but not on others. This is so because it depends on the operating system of each device, that is, if the device has an operating system compatible with the application in question, said application will work, but if, on the contrary, the operating system is not compatible, the application will not be useful in this.

explain what the hexadecimal code in a MAC address represents

Answers

Answer:

An Ethernet MAC address consists of a 48-bit binary value. Hexadecimal is used to identify an Ethernet address because a single hexadecimal digit represents 4 binary bits. Therefore, a 48-bit Ethernet MAC address can be expressed using only 12 hexadecimal values.

In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the remaining 70 students are 12 or older. How many students are 10?

Answers

Answer: 10 students

Explanation:

Students younger than 10 = 50%

Students that are 10years old = 1/20 = 1/20 × 100 = 5%

Students that are older than 10 but younger than 12 = 1/10= 1/10 × 100 = 10%

Students that are 12 years or older

= 100% - (50% + 5% + 10%)

= 100% - 65%

= 35%

This means that 35% of the students are 12 years or older and we've been given the number as 70.

Let's say the total number of students is x. Therefore,

35% of x = 70

0.35 × x = 70

0.35x = 70

x = 70/0.35

x = 200

The total number of students is 200.

Therefore, the number of students that are 10years will be:

= 1/20 × 200

= 10 students

Therefore, 10 students are 10 years.

In what way do graphs and charts help in decision-making? Select the most important point.

A.
They identify errors in the data.
B.
They can be included in slideshow presentations.
C.
They reveal patterns in data.
D.
They automate calculations.
E.
They can be inserted into documents.

Answers

I think c. They reveal patterns in data.

Which step in Gabriel’s process is incorrect?
Gabriel picked the wrong tab. He needs to select the Insert tab, not the Formulas tab, to insert a watch window.
Gabriel picked the wrong tab. He needs to select the Data tab, not the Formulas tab, in the outline group, select Subtotal, and then select “watch window.”
Gabriel picked the wrong group in the Formulas tab. He needs to select Insert Function from the Function Library group and type, “watch window.”
Gabriel picked the wrong group in the Formulas tab. He needs to select the Watch Window in the Formula Auditing group.

Answers

Answer:

the answer is ;gabriel picked the wrong tab.he needs to select the insert tab ,not the formulas tab to select watch window

How do we calculate the BMI in python?
the formula is kg/m²

Answers

Answer:

height = float(input("Enter your height in m: "))

weight = float(input("Enter your weight in kg: "))

BMI = weight / (height/100)**2

print(f"You BMI is {BMI}")

Explanation:

The python code for calculating BMI is as follows -

height = float(input("Enter your height in m: "))

weight = float(input("Enter your weight in kg: "))

BMI = weight / (height/100)**2

print(f"You BMI is {BMI}")

Some conditions can also be added such as

if BMI <= 15:

   print("You are underweight.")

elif BMI <= 30:

   print("You are healthy.")

elif BMI <= 40:

   print("You are over weight.")

Drag the tiles to the correct boxes to complete the pairs.
George has a set of software programs installed on his computer to create a digital portfolio. He is not sure what each program does. Help
George by matching the software to their purposes.
Adobe InDesign
Microsoft Word
Adobe Photoshop
Quark QuarkXPress
creating and editing images
creating and editing page layouts
creating and editing text documents

Answers

Answer:

I just answered this today (5/11/2022) and these are the correct answers.

creating and editing images                  Adobe Photoshop

creating and editing page layouts        Quark QuarkXPress

creating and editing text docs               Microsoft Word

desktop publishing                                 Adobe InDesign

Explanation:

Select all the correct answers.

John travels all over the country visiting various clients. He needs to access his documents and services on the go. Which of these technologies
allows him to access documents and software while on the move?

A:cloud computing
B: grid computing
C:mobile computing
D:green computing
E:virtualization

Answers

Answer:

acd

Explanation:

i cant explain

Answer:

A

C

D

Explanation:

Plato

An example of documentary evidence that might be presented at trial for a cyber crime is:


A. None of these choices.

B. data retrieved from slack space on a hard drive.

C. a cellular telephone.

D. a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses.

Answers

It’s d cause it has valuable info that the person was using to commit the crime

An example of documentary evidence that might be presented at trial for cybercrime is a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses. Thus, option D is correct.

 

What is the evidence?

Evidence is really the data used to attempt to support anything in a court of justice. Evidence is gathered from people, artifacts, and records. The only means through which the court may draw conclusions and reach a ruling is via the use of evidence.

According to the definition of information, it is the demonstration of any claim to be true. A hard copy of a hacker's worksheet with contact information and e-mail accounts is an illustration of documented evidence that might be used in court to prove a cybercrime. Therefore, option D is the correct option.

Learn more about evidence, here:

https://brainly.com/question/14370298

#SPJ2

Hey guys.....Help pls 1 small question! I need it ASAP!!!!!!!!​

Answers

Answer:

I'm pretty Sure that is a yes.

Explanation:

It would make sense because even though it is a hyperlink the location is still different than the Original.

Hope this Helps!

Sanjay has 38 blue beads. And 26 red beads. He needs 8 beads to make 1 wrist band. How many wristbands can Sanjay make if he uses all of his beads?

Answers

Answer:

8

Explanation:

In total, Sanjay has 64 beads. if you divide the 64 beads by the amount of beads it takes to make one band (8) the answer would be 8.

Answer:

make the top answer brainly

Explanation:

highlight the possible risks and problems that should be address during the implementation of information system process

Answers

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment

fill in the blanks with correct pronounce
i like watches.The nice watch is for ________​

Answers

Answer:

I like watches. This nice watch is for me.

As you create the slides, miniature views of the individual slides are displayed in the Notes pane.

Answers

Answer:

False.

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Basically, the views that are available on the Microsoft PowerPoint application includes;

1. Slide Sorter.

2. Notes Page.

3. Reading Pane.

4. Presenter view.

Slide transition is an inbuilt feature of a presentation software that automatically changes the slides at regular intervals.

As a user create slides, miniature views of the individual slides, referred to as thumbnails are displayed in the Slide Tab or Thumbnail pane.

On the other hand, the Notes pane is typically designed for typing remarks or notes that the presenter could share with the audience during a presentation.

Can someone plz help me answer my questions!!!!!!!!!!!

Answers

Answer:

what is your question

where is it at?

Andy is working on a project to build an accounting software program for his firm. He uses old programming modules that contained code to perform various processes and links them to create a complete system. Which approach does he apply to the program design?
A.
structured programming
B.
non-structured programming
C.
top-down approach
D.
bottom-up approach
E.
modular programming

Answers

Answer:

E.  modular programming

Explanation:

Andy is applying a design known as modular programming. This is basically a design in which the entire project is broken down into various parts known as modules. Each one of these modules performs a very different and unique task. As the modules are created they are linked together like pieces of a puzzle in order to form the entire project. This makes tackling a large project much easier and makes debugging problems much easier as well.

You are designing an ecommerce web application that will scale to hundreds of thousands of concurrent users. Which database technology is best suited to hold the session state in this example

Answers

Answer: Amazon DynamoDB

Explanation:

The database technology that is best suited to hold the session state in this example is the Amazon DynamoDB.

Amazon DynamoDB is a document database which helps in delivering high quality and fast cperformance at any scale. It can be used to scale to hundreds of thousands of concurrent users as it's multi-active, and has a durable database that has built-in security.

product of -6/13 and reciprocal of -7/16 is ____________​

Answers

Answer:

-250/91

Explanation:

Use a calculator

Pleaseeee hellppp!!!!!

Answers

Answer:

credit card info and delivery address

Explanation:

Other Questions
HELP ME ASPA!!!!!Round your answer to the nearest hundredth.AC= Which of the following shots sends the ball high above an opponent and lands near the baseline?lobsky rocketvolleyserve What is the missing Angel during reading strategies,learners are involved in what? A total of 378 vacationers are planning to take an extendedtrip down the Oregon trail (to learn about life as an earlysettler). IA 21 people can comfortably fit inside a coveredwagon and the trip organizers have borrowed 13 wagons, howmany more will they need. Tell me a riddle and i will try to work it out! The best one will get brainliest! :D ead the passage from "How Should One Read a Book?" Yet few people ask from books what books can give us. Most commonly we come to books with blurred and divided minds, asking of fiction that it shall be true, of poetry that it shall be false, of biography that it shall be flattering, of history that it shall enforce our own prejudices. If we could banish all such preconceptions when we read, that would be an admirable beginning. The reader can conclude that the passage comes from a(n) 50 persons 2 glass. Each glass 150 milliliter. How many liters PLS HELP!!!Find the area of the triangle below.Be sure to include the correct unit in your answer.6 yd13 yd17 yd Leon is buying a bicycle. The regular price of the bicycle is x dollars. The bicycle is on sale for 20% off. He has to pay 5% sales tax on the sale price of the bicycle. To represent his total cost, Leon writes the expression shown 1.05(x-0.2x) . Which expression also represents Leons total cost? A.) 0.79x B.) 0.84xC.) 0.85xD.) 0.21x ______ support mango trees out of the water.a. tap rootsb. prop rootsc. sand dunesd. tide supports What are the PRODUCTS in photosynthesis?[A] Carbon dioxide (CO2) water (H20), and ATP[B] Carbon dioxide (CO2), water (H20), and sunlight[C] Glucose (C6H12O6) and oxygen (O2) If one leg of a right triangle is 4/7 and the hypotenuse is 10/6, then the other leg is Alan and Margot each drive from City A to City B, a distance of 147 miles. They take the same route and drive at constant speeds. Alan begins driving at 1:40 p.m. and arrives at City B at 4:15 p.m. Margots trip from City A to City B can be described with the equation y = 64x, where y is the distance traveled in miles and x is the time in minutes spent traveling. Who gets from City A to City B faster? Watch "How Wolves Changed Rivers" on YouTebe ***And answer the following question please ASAP ASAP please 1. Why did the "deer" (they are really elk) leave the valleys when the wolves were re-introduced to Yellowstone?2. When the elk left the valleys, what happened to the vegetation? Give specific examples.3. Once the vegetation changed, what wildlife came back?4. How did the wolves change the rivers?5. How did the elk change the rivers when the wolves were removed from Yellowstone National Park? PLEASE HELP When she sat down to dinner at her round table with its three-day-old cloth, and watched her husband opposite her lift the lid of the soup tureen and exclaim, delighted: "Ah, a good homemade beef stew! There's nothing better..." she would visualize elegant dinners with gleaming silver amid tapestried walls peopled by knights and ladies and exotic birds in a fairy forest; she would think of exquisite dishes served on gorgeous china, and of gallantries whispered and received with sphinx-like smiles while eating the pink flesh of trout or wings of grouse.2 She had no proper wardrobe, no jewels, nothing. And those were the only things that she loved--she felt she was made for them. She would have so loved to charm, to be envied, to be admired and sought after.She had a rich friend, an old school friend whom she refused to visit, because she suffered so keenly when she returned home. She would weep whole days, with grief, regret, despair, and misery.***One evening her husband came home with an exultant air, holding a large envelope in his hand."Here's something for you," he said.Swiftly she tore the paper and drew out a printed card on which were these words:"The Minister of Education and Madame Ramponneau request the pleasure of the company of Monsieur and Madame Loisel at the Ministry on the evening of Monday, January the 18th."Instead of being delighted, as her-husband hoped, she flung the invitation petulantly across the table, murmuring:"What do you want me to do with this?""Why, darling, I thought you'd be pleased. You never go out, and this is a great occasion. I had tremendous trouble to get it. Every one wants one; it's very select, and very few go to the clerks. You'll see all the really big people there."She looked at him out of furious eyes, and said impatiently: "And what do you suppose I am to wear at such an affair?"He had not thought about it; he stammered:"Why, the dress you go to the theatre in. It looks very nice, to me...."He stopped, stupefied and utterly at a loss when he saw that his wife was beginning to cry. Two large tears ran slowly down from the corners of her eyes towards the corners of her mouth."What's the matter with you? What's the matter with you?" he faltered.But with a violent effort she overcame her grief and replied in a calm voice, wiping her wet cheeks:"Nothing. Only I haven't a dress and so I can't go to this party. Give your invitation to some friend of yours whose wife will be turned out better than I shall."He was heart-broken."Look here, Mathilde," he persisted, "What would be the cost of a suitable dress, which you could use on other occasions as well, something very simple?"She thought for several seconds, reckoning up prices and also wondering for how large a sum she could ask without bringing upon herself an immediate refusal and an exclamation of horror from the careful-minded clerk.At last she replied with some hesitation:"I don't know exactly, but I think I could do it on four hundred francs."He grew slightly pale, for this was exactly the amount he had been saving for a gun, intending to get a little shooting next summer on the plain of Nanterre with some friends who went lark-shooting there on Sundays.Nevertheless he said: "Very well. I'll give you four hundred francs. But try and get a really nice dress with the money."The author seems to view the husband asA)afraid.B)angry.C)gentle.D)loving. ANSWER FASTWhich of the following places did Justinian I reconquer? (4 points)AlexandriaBabylonMassiliaTripolia The main campus at Penn State University has a population of approximately 42,000 students. In the past, it has been shown that half of the students smoke. A research question is "What proportion of students smoke regularly?" A survey was administered to a sample of 987 Penn State students. Forty-three percent (43%) of the sampled students reported that they smoked r Which of the following is not one of the goals of technical recovery team members during the recovery phase of a BCP? Normalize operations. Restore temporary operations to critical systems. Repair damage done to original systems. Recover damage to original systems. can someone pls help