in MS Word we can merga cells true or false​

Answers

Answer 1
In this video I showed you all of the locations for all items in Wacky Wizards!! I hope you enjoyed and please like and subscribe. Piece out!!!
Answer 2

Answer:

In this video I showed you all of the locations for all items in Wacky Wizards!


Related Questions

Which statement about sample size is true?
A. As the sample size within a study increases, statistical power decrea
B. As the sample size within a study decreases, statistical power decrea
C. As the sample size within a study decreases, statistical power increa
D. As the sample size within a study decreases, statistical power remain
Please select the best answer from the choices provided
A
0 0 0 0

Answers

I’d say b I’m not sure tho

The text between < html > and < /html > defines the _____.

a) active Web-page area
b) active code on a page
c) active text on a page
d) active image on a page

Answers

Answer:

active text on a page

Explanation:

What is MVC architecture in relation to developing in web applications? How
can we make use of this concept in web application development? Explain with
an example

Answers

Answer:

11÷3=5÷5=-316+6×53×4+996=357534

How has colored television impacted society in a positive way?

Answers

please click on star

Explanation:

Color television was sold to viewers as a way to experience everything from sports and nature to musical theater in a more legible, realistic, captivating, and sensational way.

I’m a grade 12 computer student with no knowledge of Java. All I know is hello world. I have final exam in 2 months is there any chance I can learn Java in 2 months, Atleast that I’ll pass my exams and if yes can anyone guide me, where to start from and the next steps.

Answers

Answer:

But iam 9th class student.

Memory Uninstalling a program

A) Removes the program from memory

B) Removes the program from a disk

C) Removes the program from the monitor

D) Permanently removes a program that is no longer
wanted

Answers

Answer:

D

Explanation:

but you can re install it

System documentation is never up to date.

True or false?

Answers

Explanation:

System documentation is never up to date is false

Write a program that computes an integer's checksum. To compute the checksum, break the integer into its constituent digits and, working from right to left, doubling every second digit. If the product results in a number with two digits, treat those two digits independently. Then, sum all the digits for the final checksum.

Answers

Following are the C++ program to the given question:

#include <iostream>//header file

using namespace std;

int findCheckSum(int n)//defining a method findCheckSum that takes integer parameter

{

bool c = false;//defining bool variable

int S= 0,d;//defining integer variable

while(n)//defining while loop that seprates digits

{

d = n%10; // get the digit.

n=n/10; // remove the last digit.

if(c)//use if to check the even position value

{  

d=d*2;//multiplying d with 2  

while(d)//use if to check digit value

{

S=S+(d%10);//adding value

d=d/10;// remove the last digit.

}

}  

else//defining else block  

{  

S=S+d;// checking the odd position

}

c= c^true;//holding bool value

}

return S;//return S

}

int main() //defining main method

{

cout << findCheckSum(1984);//calling method  

}

Output:

22

Program Explanation:

Including header file.Defining a method, "findCheckSum" that takes an integer parameter "n".Inside the method, a bool variable "c" and two integer variable "S, d" is declared that defines a while loop.Inside the loop, a conditional statement is defined that separates digits and adds them into the "S" variable, and returns its values.Outside the method, the main method is declared that calls the "findCheckSum" method, and print its value.

Learn more:

brainly.com/question/14788459

The while loop and the do loop are equivalent in their expressive power; in other words, you can rewrite a while loop using a do loop, and vice versa.
a. True
b. False

Answers

I think False...

I hope this helps

Statistics are often calculated with varying amounts of data stored in a file. Write a program that takes any number of non-negative integers as input, and outputs the average, min and max. Prompt user for the input file name, open the file, read and process the numbers in the file.

Answers

Following are the program explanation, program, and output to the given question:

Program Explanation:

Import package.Defining a class Main.Defining the main method.Defining a string variable "str" and define a Scanner class object to input the"str" value.After input, the string value of a Scanner class object is created that takes the "str"  value in the parameter.In the next step, the "ArrayList" class object is declared that uses a while loop to add value to the list.In the condition statement an if block is defined that check ArrayList value equal to 0, and print the message.In the else block, a float variable "sum" and three integer variable "ctr, min, and max " is declared that check its value and prints its value with the message.

Program:

import java.io.*;//import package

import java.util.*;//import package    

public class Statistics //defining a class Statistics

{

  public static void main (String[] asx)//defining main method  

  {

       String str;//defining a string variable str

       Scanner sob= new Scanner(System.in);//defining Scanner class object to input value

       System.out.println("Enter value: ");//print message

       str= sob.nextLine();//input value

       Scanner s = new Scanner(str);//using Scanner class to take value str in parameter

       List<Integer> val = new ArrayList<Integer>();//defining an ArrayList class

       while(s.hasNextInt())//defining a while loop in add value

       {

           val.add(s.nextInt());//using add method to add value

       }

       if(val.size() == 0)//defining if block that check ArrayList value equal to 0

           System.out.println("The File is empty");//print message

       else//else block

       {

           float sum = 0;//defining float variable

           int ctr = 0, max = Integer.MIN_VALUE, min = Integer.MAX_VALUE;//defining integer variable that hold value

           for(Integer a:val)//defining a for loop that check ArrayList

           {

               ctr = ctr + 1;//adding value in ctr variable

               sum = sum + a;//adding value sum variable

           if(min > a)//use if to check min value greater than a

               min = a;//holding value in min

           if(max < a)//use if to check max value less than a

               max = a;//holding value in max

           }

               System.out.print("Average = ");//print message

               System.out.println(sum/ctr);//print average value

               System.out.print("Minimum value = ");//print message

               System.out.println(min);//print min value

               System.out.print("Maximum value = ");//print message

               System.out.println(max);//print max value

       }

  }

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/15410214

Suppose that someone suggests the following way to confirm that the two of you are both in possession of the same secret key. You create a random bit string the length of the key, XOR it with the key, and send the result over the channel. Your partner XORs the incoming block with the key (which should be the same as your key) and sends it back. You check and if what you receive is your original random string, you have verified that your partner has the same secret key, yet neither of you has ever transmitted the key. Is there a flaw in this scheme?

Answers

Answer:

yes, there is a small flaw. You can reconstruct your partner's key even if it is different from yours.

Explanation:

Suppose you have key a and your partner has key b, you want to check if a == b, but if it is not, your partner doesn't want to reveal his key otherwise he could have just sent it.

So you create a random bit string r. and send a⊕r to him. He sends you back a⊕r⊕b. If a==b the a⊕b would cancel each other out, and you would be left with r.

However, if you calculate a⊕r⊕b⊕r⊕a, you would always get b! In other words, you XOR the received value with r and XOR it with your a. Then you get b, whatever it is.

What are the different types database of end users? Discuss the main activi-ties of each

Answers

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

Answer:

1. Casual End Users

These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.

2. Naive or parametric end users

These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:

The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.

Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.

Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.

3. Sophisticated end users

These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.

4. Standalone users

These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.

The major computer operations include what?

Answers

Answer:

They include input, processing, output, storage and controlling.

A computer is a computing system that takes inputs, processes, storage and gives an output. These are some of the basic computer or major computer operations.  

These processes include various types of processes and dedicated systems. Other main operations include sequencing and looing, programming business statistics, etc.

Thus the option B is correct.

Learn more about the major computer operations include.

brainly.com/question/18045931.

What is the meaning of DHCP

Answers

Answer:

A Dynamic Host Configuration Protocol

Explanation:

Discuss the term internal control​

Answers

Answer:

Internal controls are procedural measures an organization adopts to protect its assets and property. Broadly defined, these measures include physical security barriers, access restriction, locks and surveillance equipment. They are more often regarded as procedures and policies that protect accounting data.

PLEASE MARK ME BRAINLIEST

If the formula in cell D49 is copied to cells E49:F49, what sequence of values would be generated in Cells D49:F49?
Conference Room Location Staff ID
D East 19106
C North 19122
A South 19107
E South 19104
B South 19147
=$D$44

Answers

Excel moves or copies a cell with formulas and their results, cell formats, and comments. When moving or copying a cell.

If there are certain cells, rows, or columns that do not appear on a worksheet, you can copy all cells.Otherwise, the visible cells. In adding to viewable cells, Excel copies cached or filtering cells per default.

            [tex]\bold{C \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ C \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ C}[/tex]

The formulation in cell D49 is a stable formula that does not vary by cell type. Alt + F4 is the shortcut to fasten a form. Therefore, the formula given in D49 would achieve the same output when copied to another cell.

Learn more:

brainly.com/question/17021828

IPO cycle eexample three examples

Answers

ATM machine.
micro oven.
washing machine.
making tea.
calculator.

hich of the following lists contains the five essential elements of a computer?
1. inputs, returns, programs, processes, and storage
-
2. language, software, hardware, code, and development
-
3. inputs, outputs, programs, processes, and storage
-
4. binary, code, inputs, processes, and storage

Answers

Answer:

I think 3(input, outputs, program, processes and storage)!!!!!

Basic function call get_pattern() returns 5 characters. Call get_pattern() twice in a print() statement to return and print 10 characters. Example output: ***** *****
def get_pattern():
return '*****'
print('*****')
print('*****')
get_pattern()
get_attern()
Testing pattern returned was printed twice.
Your output
*****
*****
Testing with different character. Output differs. See highlights below.
Your output
*****
*****
Expected output
#####
#####

Answers

Answer:

get_pattern()

get_pattern()

print(get_pattern())

print(get_pattern())

Explanation:

The program is given in Python; this means that it must be completed in Python.

The code segment that completes the program is:

print(get_pattern())

print(get_pattern())

From the complete question, the given code segment is:

def get_pattern():

    return '*****'

The above function will only return 5 characters i.e. 5 *'s, but it will never print the characters.

For the characters to be printed, a print statement must be introduced when calling the function get_pattern()

So, the print statement will be:

print(get_pattern())

The question requires 10 characters; so, the print statement must be called twice.

Hence, the code segment that completes the program is:

print(get_pattern())

print(get_pattern())

Read more about Python programs at:

https://brainly.com/question/22841107

In a typical day, what types of Computer-Mediated Communication do you use?

Answers

Answer:

Well, the types of Computer-Mediated communication I use are email, network communication and distance learning.

Explanation:

On a typical day, the types of Computer-Mediated Communication that will use our Instant messages, computer, audio, and video conferencing.

What are Computer-Mediated Communications?

The time and geographic limitations of in-person contact are removed through computer-mediated communication (CMC), in which people use computers and networks to communicate with one another across enormous distances and multiple time zones.

Computer-mediated communication (CMC) emphasizes how important it is for parties to communicate with one another through mediated channels of communication. Instead of focusing on the quantity, content, frequency, or timing of the message exchange, CMC places more emphasis on how new messages relate to older ones.

Therefore, the methods of computer-mediated communication that are used on a daily basis include audio, video, and instant messaging.

To learn more about Computer-Mediated Communications, refer to the link:

https://brainly.com/question/1918317

#SPJ2

What is computer hacking?

Answers

Answer:

Computer hacking:-

Computer hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.

Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.

why entity relationship model is used for data manipulation??

Answers

Answer:

An entity relationship diagram gives a snapshot of how these entities relate to each other. You could call it the blueprint that underpins your business architecture, offering a visual representation of the relationships between different sets of data (entities)

Hope u got it

If you have any question just ask me

If you think this is the best answer please mark me as brainliest

19. Fatigue can help improve your reaction time.
False
O True

Answers

Fatigue can help improve your reaction time is false.

Fatigue generally impairs reaction time rather than improving it.

When a person is fatigued, their cognitive and physical abilities can be negatively affected, including their reaction time.

Fatigue can lead to slower reflexes, decreased attention, and impaired decision-making, which can all contribute to longer reaction times.

It is important to get sufficient rest and manage fatigue to ensure optimal performance and safety, especially in activities that require quick reflexes and rapid responses.

To learn more on Fatigue click:

https://brainly.com/question/32503112

#SPJ6

What does it mean to demonstrate big picture thinking

Answers

Answer:

To know how to demonstrate something, you have to know what it means first.  Big Picture Thinking is the ability to come up with ideas, solutions and opportunities. Big thinkers see possibilities and jump on opportunities.

Explanation:

So, in order to demonstrate something like this, you'd fins or create an idea and get right into it. For example, if you see an opportunity to help an elderly woman across the street, a big thinker would go and do that.

the computer _______ and_________ the data you input

please help ​

Answers

Answer: Data and stores

How is a WAN different from a LAN?
O LANs and WANs together make up 2. network.
O LANs require WANs or servers.
O A WAN is made up of LANS
O A LAN is made up of WANS

Answers

A WAn ( Wide Area Network ) is made up of LANS ( Local Area Network)

what separates the components of a domain name

Answers

Explanation:

period

In a domain name, the 'thing' that separates its components is a period.

The primary purpose of the SNORT application is to function as an ACL, i.e. it controls authorization (or access) to a resource.
O True
O False

Answers

SNORT is the powerful IDS and IDS (IPS) program that enables real-time traffic data and analytical packet logging. It delivers a sophisticated IDS system to detect potential malicious activities. It employs a common language that integrates animality, protocol, and signatures analysis methodologies.It is used to monitor traffic in and out of a network utilized. It monitors travel in real-time and sends users alerts to detects potentially malicious packets or dangers on the IP networks.It analyses and searches for the content and matches protocols.

That's why the answer is "False".

Learn more:

brainly.com/question/14288353

in theory a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation what is the more likely range involved?

Answers

A directional antenna or beam that used as an antenna that radiates or receives additional power from the unwanted source into certain directions that enhances performance and reduces interference.

Receiver satellite TVs commonly employ parabolic antennas.It better pulls signals in one way in which it detects a weaker or more distant signal than an omnidirectional antenna counterpart.The difference is that they do it by reducing their ability to draw signals from other directions.The coverage area is smaller yet extends farther out. This could reach up to 8 miles under optimum conditions.

Learn more:

brainly.com/question/23886562

Whenever the amount of work of an algorithm is expressed as a polynomial, we focus on one term as dominant.
a) true
b) false

Answers

Answer:

True

Explanation:

hop it's helpful for you ☺️

Other Questions
State the purpose of the report,the topic you have chosen and reasons for your choice Is it an advantage or disadvantage to produce large quantities of raw materials?Give a reason to your answer If tan (t) = -1.4 what is the tan(-t) ??? QUESTION 1Read the paragraph carefully. Then respond to the question about the topic sentence, main point, or supporting details.For some specialized nonprofit agencies, the mission is to reach a particular group of people in need. The organization Give Running serves one such goal by providing shoes to children around the world. By collecting, cleaning, and distributing thousands of pairs of gently used athletic shoes, Give Running makes a difference for children in need, including some who have never owned athletic shoes of any kind. Originally the project of a college student in California, the nonprofit grows via more local chapters and shoe collection sites. Donations have gone to the kids of inner-city Los Angeles, to Haitians after the 2010 earthquake, and to African villages. The shoes represent opportunity for kids to run and grow. In some countries in the developing world, children are only allowed to attend schools if they have shoes to wear. Not only do shoes protect feet from injuries and allow children to walk safely to school, the donated shoes themselves help make schooling possible. An additional benefit of these donations is that most shoes are being recycled, keeping material out of landfills. Finally, this growing organization accepts and distributes all types of athletic shoes and is eager to expand.Which of the following sentences would be an effective alternative topic sentence for the paragraph? a. One way a nonprofit agency can serve a focused goal is by expanding through adding local chapters and programs. b. When children in developing nations are without shoes, they are sometimes denied access to education. c. With the help of focused nonprofit agencies, donated athletic shoes can go from local chapters and shoe collection sites to the kids of inner-city Los Angeles, to Haitians after the 2010 earthquake, and to African villages. d. The nonprofit Give Running provides a significant service by collecting and distributing thousands of pairs of athletic shoes to needy children, many of whom have never owned sneakers. hello !! can someone be kind enough and help me real quick ? thank u what are some characteristics of people who are a mixture of cultures What type of literary device is Ballou using in the underlined portion of this paragraph?A pure love of my country and of the principles have often advocated before the people and the name of honor that I love more than I fear death have called upon meGroup of answer choicesMetaphorSimileHyperbolePersonification 2 Several scientists have adapted our model of the atom. These scientists include Democritus, Dalton, Thompson, Rutherford, Bohr, and several others. Describe why the model of the atom changed and what additional evidence would require the model to change again. what are the values of the 2 party system ? Larry has 2.8 yards of cable and needs 0.35 yard for each house. How many house does he have enough for? Please someohe help me!! The company's bank reconciliation at June 30 included interest earned in the amount of $150. Complete then by selecting the account names and dollar amounts from the drop-down menus. View transaction list Journal entry worksheet > < 1 The company's bank reconciliation at June 30 included interest earned in the amount of $150. Complete the necessary journal entry by selecting the account names and dollar amounts from the drop-down menus. Note: Enter debits before credits General Journal Debit Credit Dato June 01 Record entry Clear entry View general Journal Please help me Im trying to study but I dont know the answer The founders realized that the Articles of Confederation was a flawed plan, what improvements did they make? Any computer expert to help me answer this question plz am giving brainliest How does the narrator describe himself? this is about the book outsiders plz help 3. Why does he like to go to the movies alone? 4. What happened to the narrators parents? 5. What happens to him on the way home from the movies? What do we learn is the name of the narrator? 9. Why is Ponyboy so reluctant to tell Darry how he really feels after the incident with the Socs? 10. Why would Ponyboy want to be in a Greaser gang? What is he attempting to find in the gang that is missing from his life? Please help and only answer if you are fluent in spanish!!! HELP PLEASE What is the answer to this question What is the informal language is used is used mostly in ordinary or familiar communication settings, as in conversation between friends or relatives? Convert 10010011001 into a number with commas.