Answer:
If you want to send a friend request, click on their picture. Then scroll down slightly. There should be 3 buttons. The first one says Thank you. The next one is human with a +. Click the 2nd button. That is how to send a friend request.
Explanation:
Have a great day!
#EquestriansLion
Which of the following best describes your sequence of actions when developing a web page?
Selected:a. Save the HTML file, Edit the HTML file, review the results, load the HTML file into the web browserThis answer is incorrect.
b. Edit the HTML file, save the HTML file, load the HTML file into the web browser, review the results
c. Review the results, save the HTML file, load the HTML file into the web browser, edit the HTML file
d. Load the HTML file into the web browser, edit the HTML file, review the results, save the HTML file
Answer:
I think D
Explanation:
Answer:
B
Explanation:
Saving it, then editing it wouldn't load the new changes
but editing it than saving it, would load the new Changes
write the algorithms for the problem How to post a letter ? you can put pictures for the steps
❖ Step 1: Start
❖ Step 2: Write a letter
❖ Step 3: Put in envelope
❖ Step 4: Paste stamp
❖ Step 5: Put it in the letter box
❖ Step 6: Stop
[tex]\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}[/tex] ~←(>▽<)ノ
Choose the response that best completes the following statement. (5 points) Simulation is the creation of a model that can be manipulated ________ to decide how the physical world works. creatively logically strategically virtually
Simulation is the creation of a model that can be manipulated logically to decide how the physical world works.
What is the simulation of a model?Simulation modeling is known to be the act of making and analyzing a kind of digital prototype of a physical model to know its performance.
Note that this modeling is often used to help designers and engineers to know if and what conditions ways or a part may fail and what loads it can hold.
Learn more about Simulation from
https://brainly.com/question/24912812
Match up each definition and term. Please help asap
Answer:
Query - Definition - Search by specific information Example - Find T-shirt in a specific size
Flat File Database - Definition - Simple database where each row is a record Example - Excel file of names and addresses
Fields - Definition - Different types of data for each record (columns) Example - Type of clothing, colour, size, price
Sort - Definition - Show records in different order based on its fields Example - Arrange all records alphabetically by colour
Record - Definition - Main item in a list (row) Example - Jeans
Text Field - Definition - Any number, letter, and all symbols Example - Levi's 518
Date Field - Definition - Date in a specific format Example - 2020-06-30
TIME Field - Definition - Any format of a timestamp Example - 10:42 PM
Graphic Field - Definition - Any kind of image Example - Logo
Calculated Field - Definition - Contains a formula to work something out Example - Length of time item has been in inventory
Number Field - Definition - Contains numbers that may be used in future calculations Example - $237.42
Brainlist Pls!
A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. wide personal local gateway
A personal area network is a type of wireless network that works within your immediate surroundings.
What is a personal area network?A personal area network (PAN) is known to be a kind of computer network that has been made to function as an interconnecting electronic devices that is also found within an person's own workspace.
Note that a PAN is one that gives or helps in data transmission among devices such as computers, smartphones, etc.
Learn more about personal area network from
https://brainly.com/question/1167985
Blake is on the fast track and hopes to get a promotion soon. he wants to make sure that he is always able to
work at peak proficiency on the job. he has done a great deal of work and has numerous essential files that are
crucial to his job. he uses this utility to make sure these files are saved on the office's external hard drive.
a.remote control
b.firewall
c.file compression
d.backup
Answer:
D
Explanation:
What is one major reason various industries have adopted the use of automated robotic assembly?.
The major reason various industries have adopted the use of automated robotic assembly is to increase manufacturing productivity.
What is automated robotic assembly?Automated robotic assembly is the use of automotive technology to operate different areas in the manufacturing industries.
Automated robotics are used to perform the following tasks:welding, assembly,shipping, handling raw materials, andproduct packing.The reason why various industries have adopted the use of automated robotic assembly is that it saves time and there is increase in the amount of products manufactured that when manually handled.
Learn more about automation here:
https://brainly.com/question/11211656
A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information
PLS HELP MEE it's due in 2 minutes
The answer is False, Double entry is a type of verification when you enter something 2 times to ensure it matches the original source.
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. what is this type of attack known as:_____.
Answer:
DDOS OR DOS
Explanation:
im sure its either DOS or DDOS(distributed denial of service)
30 POINTS!!!! HELPPPPP!!! in computer science, what does the term inference mean?
a. the wiring connection between the computer and all of its hardware devices
b. an internal switch inside the monitor that dims the screen's brightness at sunset
c. a device or program that allows a user to communicate with a computer
d. a sensor that turns the computer fan on when the computer gets too hot
Answer:
A. The act or process of reaching a conclusion about something from known facts
Hope this helps you!
Please Mark me Brainlest!!
Answer: c. a device or program that allows a user to communicate with a computer
Explanation:
One new and creative method companies are using to advertise is:
A. stealing people's identities and pretending to be their friend.
B. promoting their products in television advertisements.
c. advertising products on the websites people visit the most.
O D. awarding prizes to users who follow them on social media.
SUBMIT
Answer:
c. advertising products on the websites people visit the most.
Explanation:
What standard tcp port is reserved by iana for the openvpn service to operate on?
Answer:
1194 is the OpenVPN port reserved by the IANA
Explanation:
Social media tools allow you to connect with people anywhere in the world who share your interests evaluate your interactions with people living outside the United States using various Social media tools how his influences how do you break cultural stereotypes and discover the local activities career aspirations in sports preferences of people from other cultures what is a social media tools that you used to form these connections explain how these connections have been influenced you, providing specific examples
The social media tools that you used to form these connections are:
Buzz Sumo. Go ogle Trends. Buffer Publish.Can va. Un splashWhat are social media tools?Social media tools are known to be key tools that are used for the running of business so as to handle important ways in their Digital Marketing routine.
The social media tools are important because it helps one to plan ahead and also ensure that a person post the type of content needed to reach your goals and grow one's business.
Learn more about social media from
https://brainly.com/question/3653791
What can a company learn by studying website analytics for its website?.
Answer:
they can learn how people interact with it
Explanation:
What are 4 componenetas llk computers have in common
Answer:
Input, storage, processing, and output.
Explanation:
hope this helps you
qbasic program to convert Nepali rupees into paisa
Answer:
INPUT "What is the amount of rupees you want converted into paisa"; rupees
paisa = rupees*100
PRINT paisa
Explanation:
done in QBASIC
the semicolon in the 1st line makes the question have a ? at the end. the rupees key word in the 1st line saves the input as a variable
then the second line multiplies by 100 since there are 100 paisa in 1 rupee
90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has organized the expenses category from the smallest expense to the largest expense. Which of the following database features has Hazel employed to organize the data?
A.
sorting
B.
filing
C.
nesting
D.
filtering
Answer:
a
Explanation:
Answer:
it's A sorting sorry if it's wrong
Explanation:
____ is a very fast network media. It contains multiple (sometimes several hundred) clear glass or plastic fibers, each about the thickness of a human hair. Each fiber has the capacity to carry data for several television stations or thousands of voice conversations, but each fiber can only send data in one direction. Data sent over a fiber-optic cable is represented by light pulses and is sent at speeds of up to trillions of bits per second
Fiber optic cable (FOC) is a very fast network media and it comprises multiple clear glass or plastic fibers.
What is a fiber optic cable?A fiber optic cable can be defined as a type of wired connector which are either made of glass or plastic and they are typically used for connecting one network device to another, so as to form a computer network and enable the continuous transmission of data between them.
In Computer technology, fiber optic cables (FOCs) are commonly produced through the use of several concentric layers of transparent material such as glass or plastic, with each having a slightly different index of refraction for light waves and about the thickness of a human hair.
Read more on fiberoptic cables here: https://brainly.com/question/116766
how does computer science help in dance
Do not troll, I will be writing you up.
Pauline has a well-established app with a large user base. Now she needs new users who complete valuable actions within the app. What phase does this fall under?
Answer:
Maturity because if you want new users who will complete [valuable] actions they need to be [Mature].
Explanation:
Which of these is most likely to contribute to the long term of a local ecosystem?
A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to the network 10.1.0.0/16. What will the router do with the packet.
Answer:
Forward the packet to the next hop router specified by the route network 0.0.0.0
Explanation:
Look at the color key below the map that shows the overall performance range. What is the range for 1 Year Performance? How does it compare to the 1 Day Performance range?
A performance range simply means the threshold and maximum percentage of shares that may become earned.
What is a performance range?Your information is incomplete. Therefore, an overview will be given. A performance range is the maximum percentage if shares that may become earned shares due to the attainment of the requirements of the performance.
It should be noted that in this case, the opportunity to incentivize performance will be associated with the relative performance.
Learn more about performance on:
https://brainly.com/question/26256535
Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. Please select the best answer from the choices provided T F.
A web resume is far better than a traditional resume because it can carry so much data about the person, and it includes images also. This statement is true.
What is a web resume?A web resume is termed as a resume that is read by a computer program that summarizes the information of each employee.
Web resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.
Thus, the photo of the document about the project or internship that has been done in the past can be given on the web resume by uploading the certificate on the computer system along with the resume.
For example, in companies like Linkedin, apna, and so on there are many companies that ask about the person before creating an account.
More about the web resume link is given below.
brainly.com/question/862477
Answer:
true
Explanation:
75 POINTS!!
PLS HURRY
Choose the term that best completes each sentence.
___are intentional attacks on a system with the intent to do harm.
a. cyberthreats
b. malware
___ may be intentional like a virus or unintentional like a fire or human error.
a. cyberthreats
b. malware
Malwares are intentional attacks on a system with the intent to do harm.
Cyberthreats may be intentional like a virus or unintentional like a fire or human error
Hope that helps!
What is a critical consideration on using cloud-based file sharing and storage applications.
Answer:
a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Determine if the software or service is authorized. A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet.
Pls mark me as brainlist
This is a critical consideration on using cloud-based file sharing and storage applications to determine that Determine the software program or provider is authorized.
What are the Indicators ?It is of a capability insider chance may be damaged into 4 categories--signs of: recruitment, facts collection, facts transmittal and preferred suspicious behavior.
Determine if the software program or provider is authorized. A coworker desires to ship you a touchy record to study even as you're at lunch and also you most effectively have your private tablet.
Read more about the cloud-based file:
https://brainly.com/question/24228581
#SPJ2
4. is the disappearance of the individual a bad thing?
Answer:
The program completed in a third of the time with six computers versus one computer.
Explanation:
Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is believed that smartphones prevent us from communicating face to face
Answer:
yes
Explanation:
because the people will be lazy to go and talk to that person instead They will call each other and discuss
10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above
There are different kinds of applications. Control objects control the flow of the application.
What works the flow of control in a program?In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.
They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.
Learn more about application from
https://brainly.com/question/23275071