is a way og saving a file so it can be used by a different program​

Answers

Answer 1

Answer:

what are you even asking


Related Questions

list any four e-commerce website​

Answers

Answer:

Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.

eBay. ...

Walmart. ...

Etsy. ...

Home Depot. ...

Target. ...

Best Buy. ...

Wayfair.

Answer:

I'm sorry is this a question?

how can i help?

Explanation:

Document accurately describes the differences between servers and computers and between local and wide area networks. Document provides at least four suggestions including password managers and safe browsers.

Thinks someone could help me out with this? ​

Answers

Answer:

Cell towers and internet uses allow local and wide area networks, but they also allow you to steal IP and things like that.

Explanation:

This is quite difficult. I appologize if I get this wrong.

(Also if you upload a file for someone to answer, and they give you a link, don't click on it!! They track your IP address and things like that!)

Examples and meaning of external hardware.​

Answers

Answer:

External hardware devices include monitors, keyboards, mice, printers, and scanners. external hardware devices are usually called peripherals.

5 examples of hardware?

Mouse, Keyboard, Monitor, Printer, USB, CD Drive, RAM, Hard Drive, Joystick, Scanner, DVD, CPU, Motherboard, Etc.

Explanation:

Hope this help have a good rest of your  day

what are the different types of document required for mail merge?

Answers

Answer:

More Information. A mail merge is used to create form letters, mailing labels, envelopes, directories, and mass e-mail message and fax distributions. There are three documents that are involved in the mail merge process: the main document, the data source, and the merged document.

Explanation:

what if the result of conectivity testing is 100%Loss?Explain.​

Answers

Answer:

If you have a 100% packet loss, it means that all packets get lost between certain hops on your connection. Which, in turn, renders you unable to reach the destination server

Complete the sentence.
One way to increase the reliability of a hard disk drive is by making it part of ____
an optical array
a capacitator
a RAID
an analog ray

Answers

I think it is the capacitor

Answer: It is raid

Explanation:

Took the test for edge

How do I calculate this square footage?

Answers

Answer:

To calculate it, you have to break it apart. Sorry for the bad writing but after you break it apart, you multiply the smaller squares. Then with all of the smaller areas, add them together for the final answer which in this case is 456.

Select the best answer to the following question.
Remote data storage and the ability to access data from any device using the Internet is called

Answers

Answer:

I think its called "cloud computing"

Answer:

cloud computering

Explanation:

What is the most important function of a network operating system (NOS)?

Answers

Answer:

One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.

Explanation:

One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.

What is network operating system?

An operating system for computers known as a "network operating system" (NOS) is primarily made to handle workstations, personal computers, and occasionally older terminals that are linked together over a local area network (LAN).

A NOS's supporting software enables resource sharing and communication amongst various networked devices. A NOS's usual hardware configuration consists of several personal computers, a printer, a server, and file servers that are linked by a local network.

Because earlier iterations of the fundamental operating system weren't created with network use in mind, network operating systems

Therefore, One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.

To learn more about network operating system, refer to the link:

https://brainly.com/question/28356173

#SPJ2

Plzzzzz helppppp hurry plzzzzzzzz

Answers

The second one is A.

ANSWER ASAP!!!!!

Which statement is true regarding achievers?
A.
Achievers bring about a reduction in socializers.
B.
Achievers interact with the environment.
C.
Achievers cause grief to other players.
D.
Achievers like to interact with other players.
E.
Achievers like to collect points and earn rewards.

Answers

Answer:

The correct answer will be:

E. Achievers like to collect points and earn rewards.

Explanation:

Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:

Answers

Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.

The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.

What do you mean by term E-mail?

An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..

E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.

Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.

In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.

Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.

Therefore, correct options are A and C.

Learn more about E-mail, refer to the link:

https://brainly.com/question/13313275

#SPJ2

Q6.
A doctor's surgery provides medical care for people in the local area. The surgery uses Information
Technology to collect, store and process patient data.
Usernames and passwords are used to restrict user access to patient data.
Explain two other ways the surgery can restrict user access.

Answers

Fingerprint scanners, and padlocks

A computer game picks a random number between 1 and 100, and asks the player to guess what the number is. If the player makes a correct guess, the game congratulates them, and stops. If the player does not make a correct guess, the game tells the player that their guess is either too high, or too low. If the player guesses with an answer that is not a number between 1 and 100, an error message is displayed. The game continues to give the player chances to guess, until the player guesses correctly. You are going to plan an interactive program to implement this game. do this using scratch

Answers

Answer:

In Python:

import random

computerguess = random.randint(1,101)

userguess = int(input("Take a guess: "))

while not (userguess == computerguess):

   if userguess<1 or userguess>100:

       print("Error")

   elif not (userguess == computerguess):

       if userguess < computerguess:

           print("Too small")

       else:

           print("Too large")

   userguess = int(input("Take a guess: "))

print("Congratulations")

Explanation:

This imports the random module

import random

Here, a random number is generated

computerguess = random.randint(1,101)

This prompts the user for a guess

userguess = int(input("Take a guess: "))

The following loop is repeated until the user guess correctly

while not (userguess == computerguess):

If user guess is not between 1 and 100 (inclusive)

   if userguess<1 or userguess>100:

This prints error

       print("Error")

If the user guessed is not correct

   elif not (userguess == computerguess):

If the user guess is less

       if userguess < computerguess:

It prints too small

           print("Too small")

If otherwise

       else:

It prints too large

           print("Too large")

This prompts the user for a guess

   userguess = int(input("Take a guess: "))

The loop ends here

This prints congratulations when the user guess correctly

print("Congratulations")

Certain programs, such as Adobe Acrobat
Reader, may install additional tabs to the
Ribbon. These tabs are called add-ins.
True or False

Answers

Answer:

true

Explanation:

mark brainliest ☺☺☺☺☺☺

A
is the smallest of the network types and provides connectivity for one person’s devices.

Answers

Answer:

Personal Area Network (PAN)

Explanation:

A  Personal Area Network (PAN) is the smallest of the network types and provides connectivity for one person’s devices.

A personal area network refers to a computer network that is used for interconnecting various electronic devices that are centered on the workspace of an individual. A PAN enables data transmission among the following devices: 1. Computers

2. Smartphones

3. Tablets

4. Personal digital assistants.

Click the above image
Ask the user to enter two numbers. The first number is for the multiplication table. The second number is the number of rows to display.

Use a for loop to print the table.

Answers

Answer:

Follows are the cdo0de to this question:

import java.util.*;//package  

public class Table //defining class Table

{

   public static void main(String[] asx)//main method  

   {

       int x,y,i;//defining integer variables

       Scanner bg=new Scanner(System.in);//creating Scanner class object

       System.out.print("Enter first number: ");//print message  

       x=bg.nextInt();//input value

       System.out.print("Enter Second number: ");//print message

       y=bg.nextInt();//input value

       for(i = 1; i <= y; i++)//defining for loop for print Table

       {

           System.out.printf("%d * %d = %d \n", x, i, x * i);//calculate and print table

       }

   }

}

Output:

Enter first number: 5

Enter Second number: 3

5 * 1 = 5  

5 * 2 = 10  

5 * 3 = 15

Explanation:

In the above code, three integer variable "x,y, and i" is declared, in which "x,y" variable is used to input value from the user end, and after input, the value the for loop is used, in which the second variable "y" count the rows, and "i, x" variable is used for calculates the multiplication of the table.  

libre office is what program​

Answers

I’m not 100% sure what this question is asking, but I believe the answer would be “an open-source office productivity software”.

I need somebody to help me with this question I’ll give points!
Please help no funny business

Answers

Answer:

create a new folder (you need that in order to choose it as a destination)

click the rules button

new rule; blank rule

select forms and conditions

apply the rule to messages received

Decrypt this message: P ht uva h zwf
It has been encrypted with a shift of 7 (remember each letter needs to go backwards.
uhhh pls help with this ill mark brainliest

Answers

translation: I am a spy

Mention the usage of crop concept in ms-word​

Answers

Answer:

Every image editing software has a crop tool that allows you to trim or eliminate the edges of an image. Cropping tools in Ms.word allow you to hide portions of picture that you do not want to be displayed in the final result.

[tex]\huge\underline\mathbb\pink{ANSWER:}\\\\[/tex]

Every image editing software has a crop tool that allows you to trim or eliminate the edges of an image. Cropping tools in Word allow you to hide portions of pictures that you do not want to be displayed in the final result.

[tex]\\\\\\\\[/tex]

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️

Discussion Topic
How does social media affect the process of globalization? Give examples. In what
ways does social media help in creating global communities? Discuss other positive
influences of social media. What might be the adverse effects of excessive use of social
media?

Answers

Answer:

Social media positively affects and impacts the process of globalization. ... Global communities is a social infrastructure tool and as social media helps in strengthening social relationships and bringing people and communities together it leads to creating a string global community.

round 74,361 to the nearest 10​

Answers

Answer:

74,400 i think

Explanation:

Hello Everyone,
Please I have been have problems answering this question. I do not know if anyone could be of help to me.
Describe the difference between objects and values using the terms “equivalent” and “identical”. Illustrate the difference using your own examples with Python lists and the “is” operator.

Describe the relationship between objects, references, and aliasing. Again, create your own examples with Python lists.

Finally, create your own example of a function that modifies a list passed in as an argument. Describe what your function does in terms of arguments, parameters, objects, and references.

Create your own unique examples for this assignment. Do not copy them from the textbook or any other source

Answers

I can answer the first question a bit:
Objects are nothing but instance of a class. To know two objects are identical are not, use the is operator.
Is operator: The is operator is used to compare the two objects that are identical or not. The is operator returns true, if the variables on either side of the operator point to same object. If the variables on either side of the operator point to different object then it can also return true.
Value: Value is also an object that assign to a variable. Comparing to objects through === operator.
The term equivalent means.... is used to when the two operators are equal or not , if equal condition returns true.

a___ is a placeholder where you can enter text to manipulate and give new graphical effects.​

Answers

Answer:

A "text box" is a placeholder where you can enter text to manipulate and give new graphical effects

Can someone urgently help me with my java code (I WILL GIVE BRAINLIEST)?! Ive been working on it for hours and its not working! (please give an actual answer...)

*examples of required output at the bottom*

code: public class CircularList
{
private ListNode head;
private ListNode tail;
private int size;







public CircularList()

{

head = tail = null;

size = 0;

}





public int size()

{

return size;

}





public boolean isEmpty()

{

return (size == 0);

}





public int first()

{

if (head != null) {

return head.getValue();

}

return -1;

}




public Integer last()

{

if (tail != null) {

return tail.getValue();

}

return -1;

}



public void addFirst(Integer value)

{

head = new ListNode(value, head);

if (tail == null) {

tail = head;

}

size++;

}





public void addLast(Integer value)

{

ListNode newTail = new ListNode(value, null);

if (tail != null) {

tail.setNext(newTail);

tail = newTail;

} else {

head = tail = newTail;

}



size++;

}





public void addAtPos(int pos, Integer value)

{

if (pos == 0) {

addFirst(value);

return;

}

if (pos <= 0 || pos > size) {

return;

}

if (pos == size) {

addLast(value);

return;

}



ListNode ptr = head;

for(int i=0; i = size) {

return retVal;

}

if (pos == 0) {

return removeFirst();

}

ListNode ptr = head;

for(int i=0; i
ptr = ptr.getNext();

}

retVal = ptr.getNext().getValue();

if (pos == size-1) {

tail = ptr;

tail.setNext(null);

} else {

ptr.setNext(ptr.getNext().getNext());

}



size--;

return retVal;

}





public int findNode(Integer find)

{

ListNode ptr = head;

for(int pos=0; pos
if (ptr.getValue() == find) {

return pos;

}

ptr = ptr.getNext();

}

return -1;

}




public void rotate()

{

addLast(removeFirst());

}




public String toString()

{

String output = "";

ListNode iter = head;

while(iter != null) {

output += String.format("%d ", iter.getValue());

iter = iter.getNext();

}

return output;

}



}

size = 6 first = 50 last = 60
50 20 10 40 30 60

removeFirst = 50
size = 5 first = 20 last = 60
20 10 40 30 60

removed = 30
size = 4 first = 20 last = 60
20 10 40 60

size = 4 first = 20 last = 60
20 10 40 60

found at -1
removed = -1
size = 4 first = 20 last = 60
20 10 40 60

size = 4 first = 10 last = 20
10 40 60 20

Answers

Answer:

code 345code 4537

Explanation:

The most effective leaders treat everyone alike. True True False

Answers

Answer:

you have to have evidence they do that and on the question theirs no evidence so the answer would be false (as long as theirs no evidence)

Explanation:

Answer:

True

Explanation:

Helppppp plzzzz it's computer science helpp plzzz

Answers

1. String

2. "is assigned to"

After inserting a video into your slide how can you test it

Answers

Explanation:

How to insert video into PowerPoint

Click on the slide you want, then go to Menu > Insert.In the top right corner, click Video > Video on My PC.Find the video you want to add and click “Insert”.Adjust the settings in the Video Format toolbar to make sure it plays the way you want.

Which software documentation guideline did the IEEE establish?
A.
Avoid spelling errors.
B.
A glossary should be present to define technical terms and acronyms.
C.
The font has to be in black.
D.
Documents should not have page numbers.

Answers

Answer:

B

Explanation:

I am big brain

Other Questions
y is directly proportional to x2. If y=12 when x=2 find y when x=6 Jamie's truck has a 40-gallon gas tank. The tank is one-fifth full of gas. Jamie is filling the rest of the tank with gas that costs $1.89 per gallon.What is the approximate cost for Jamie to completely fill her tank? What are the 2 MEDIANS?10 & 10 A 30 & 35 B 40 & 50 C70 & 65 D hello help please ill mark brainliest!!! Which are true about changes in carbon dioxide in the Earth's atmosphere since 1860? Select the two correct answers.A. The increases in carbon dioxide are caused by human activity.B. The increases in carbon dioxide can be explained by the Milankovitch cycle.C. The rate of change in carbon dioxide is exponential.D. The changes are triggered by a new interglacial period. Science activity 1.4.2 18. Write an expression to represent the perimeter of the figure below. Katheryn fills container X with water. Shewants to pour the water into container Y untilit is full. Help this is due in a few minutes The following exchange rate is given: 1=1.35 Dollars. Convert 9 into dollars In addition to having a call button to alert nurses or nursing assistants, patients will usually have a system near thehead of the bed with a speaker and a miniature microphone. This system is used to speak with nurses and nursingassistants who are not in the room. This is called a(n)system. herei need help with this A currently popular diet is the Keto Diet in which followers attempt to eat a diet high in protein and fats (lipids), and low in carbohydrates. 1. Identify 3 foods on the list that do not contain any carbohydrates. 2. Explain how you know these foods do not contain any carbohydrates. what test would u use? HELPP MEE How does democracy protect minority rights? Question in the picture 10. How does the placement of veins help to carry out their function of transporting materials toand from the leaf? In KLM, the measure of M=90, the measure of K=78, and KL = 35 feet. Find the length of MK to the nearest tenth of a foot. Brianna went into a bakery and bought 2 cookies and 3 brownies, costing a total of $9.50. Nevaeh went into the same bakery and bought 10 cookies and 6 brownies, costing a total of $20.50. Write a system of equations that could be used to determine the price of each cookie and the price of each brownie. Define the variables that you use to write the system. Gravitational potential energy depends on the How to do 264 in Expanded form