Any of these approaches can be used to open a Word document that already exists. Although a doc file will open when double-clicked in Windows Explorer.
What exactly is word processing software?The process of creating, editing, saving, and printing documents on a computer is referred to as word processing. Specialized software, also referred to as a word processor, is required in order to execute word processing. Microsoft Word is one example of a word processor, while many people also use other word processing programs.
Does Excel have a word-processing component?MS Excel is a spreadsheet application used to create tables, and charts, and perform intricate computations. Microsoft Word is a word processing tool used for producing papers, reports, and other written work.
to know more about Word Processing here:
brainly.com/question/29762855
#SPJ1
Which of the following is NOT a characteristic of secondary storage?
a. It is cheaper than primary storage.
b. It is volatile.
c. It can use a variety of media.
d. It takes more time to retrieve data from it than from RAM.
Option b is correct. It is volatile is not a characteristics of secondary storage. Data and programs are stored on non-volatile secondary storage, also known as auxiliary storage, for later retrieval.
Demand paging and file systems are the two principal uses of secondary storage. When possible, a program should run in main memory to minimize performance difficulties with the file system. However, demand paging's performance characteristics have an impact on all programs.
Data and programs are stored on non-volatile secondary storage, also known as auxiliary storage, for later retrieval. Secondary storage comes in a variety of forms, each having benefits and drawbacks. Magnetic or optical storage media are used by the majority of storage devices.
One element of a virtual memory system is demand paging. The address space of a program is divided into pages. A virtual memory picture with logical addresses serves as the program's operating system.
Program page status is maintained by a combination of hardware and software; pages may not always be present in physical memory. A page fault occurs when a software attempts to access a page that is not physically present in memory. In this case, the page is fetched from secondary storage.
To know more about secondary storage click on the link:
https://brainly.com/question/86807
#SPJ4
a computer excels at applications which do not require a large amount of precise user input and is designed to be held in one or two hands
The underlined word (excel) is similar in meaning to: A. Surpass.
What is a synonym?A synonym can be defined as a type of word that has the same meaning as a listed word. This ultimately implies that, two or more words that are similar in meaning are referred to as synonyms.
In English literature, some examples of synonyms include the following:
Innovative: new.Shut: close.Old: elderly.Loyal: faithful.Vociferous: stridentDangerous: hazardous.Destitute: poor.Stymie: deduceExcel: surpassIn conclusion, excel and surpass are synonyms because they describe the higher abilities of a tablet in comparison with other mobile computing devices, based on the amount of precise user input.
Read more on synonyms here: https://brainly.com/question/24870405
#SPJ1
Complete Question:
Tablet. A tablet, tablet computer or tablet PC is a mobile computing device designed to be held in one or two hands. It is typically the size of a book (7 inches or bigger) and resemble a large smartphone.
Tablet let the users do many of the same things as a traditional computer. They can browse the internet, connect to social network apps, and display HD videos. They excel at application which do not require a large amount of precise user input.
Early tablet devices used light pens or a stylus as their input devices. However, today all tablets use a touchscreen as their primary input devices with the option to connect external devices such as a keyboard. Most tablet only have a few physical buttons, the back power, and volume buttons and everything else can be done using your fingers. Today there are top two operating systems used with tablets. A tablet can have apps installed onto them to perform a function.
The concept of a tablet was first sketched by Alan Kay while at Xerox in 1971 and since then there have been many iterations of tablet devices including PDA’s predecessors to the tablet.
“They excel at applications which do not require a large amount of precise user input”
The underlined word is similar in meaning to?
answer choices
Surpass
Solve
Beat
Get over
Be talented
failure to specify cascading delete when enforcing referential integrity can cause what problem?
A database's lack of referential integrity can cause relational databases to return incomplete data, often with no indication of an error.
When a foreign key has more than one primary key value, referential integrity is violated. If referential integrity is not enforced, data inconsistency and data loss may occur. When you enforce referential integrity and check the Cascade Delete Related Records check box, Access deletes all records that reference the primary key when you delete the primary key record. The Database Engine generates an error, and the delete or update action on the row in the parent table is undone. CASCADE. When a row in the parent table is updated or deleted, the corresponding rows in the referencing table are updated or deleted.
Learn more about database here-
https://brainly.com/question/25198459
#SPJ4
What information is a security risk when posted publicly on your social networking?
Your birthday is a security risk when posted publicly on your social networking.
Your birthdate may be one of the crucial pieces of information that scammers and identity thieves require in order to steal your identity and open accounts in your name, even though you may like seeing tons of birthday wishes from your friends posted on your social media .
One of the best ways to engage your customers is now social media. Millions of dollars are now spent annually on a marketing strategy that wasn't even thought of twenty or even fifteen years ago. However, social media does not exist in a vacuum, and there are bad guys out there who use social networks to attack companies and steal their data through finding security flaws.
Key security controls in applications are found, evaluated, and put into place by a security risk assessment. Additionally, it emphasizes avoiding application security flaws and vulnerabilities. An enterprise can see the application portfolio holistically—from the viewpoint of an attacker—by conducting a risk assessment. It aids managers in deliberating wisely about the use of resources, tools, and security risk control implementation. Therefore, completing an assessment is a crucial step in the risk management process of a firm.
To know more about security risk click on the link:
https://brainly.com/question/8873408
#SPJ4
Write an expression that executes the loop body as long as the user enters a non-negative number.
In order to solve the provided issue, the user is asked to enter a number, and a while loop is then utilized to determine whether or not the number is positive. The body of the statement is written after the while loop, and the user value is then updated with the input. Then print "Done" after the statement.
Further Explanation:
The following Python code runs the body of the loop whenever a non-negative value is entered by the user.
#Prompt and read the input from the user
user_num = int(input('Enter a number:'))
#Loop is used to repeat the values of number
while (user_num>=0):
# If user enters a positive number then display the body statement.
print('Body')
user_num = int(input())
# Display the output.
print('Done.')
To learn more about 'loop' refer to
https://brainly.com/question/3647633
#SPJ4
which one of the following is a correct declaration for a function named passvect with the vector parameter mynum of size 10, so that the function modifies the contents of the actual parameter mynum?
The contents of the actual parameter mynum
1) c) void passvect(vector& mynum);
2) d) can be passed either way, but it is best to pass by reference.
3) d) 10
4) a) 0
What is parameter?
A parameter, also known as a formal argument in computer programming, is a particular type of variable that is used in a routine to refer to a specific bits of data that are supplied as input to the procedure. These bits of information represent the values of the arguments (also known as real arguments or actual parameters) that will be used to call or invoke the function. A subroutine is typically defined with an ordered list with parameters so that each time the routine is called, its arguments are evaluated for that call and the results can be assigned to the associated parameters. In contrast to how the term "argument" is typically used in mathematics, "argument" in computer science refers to the actual input expression that is passed or supplied to a function, procedure, or routine in the call statement, whereas "parameter" refers to the variable inside the subroutine's implementation.
To learn more about parameter
https://brainly.com/question/15170808
#SPJ4
The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.
The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called service-oriented architecture. Thus, option C is correct.
What is middleware?Middleware can be defined as the process or a system through which the person can easily connect through different programs or systems. This helps in connectivity.
In the service-oriented architecture, it provides the basic need is a process for developing software that produces enterprise applications by using software elements known as services. Every service offers a particular management function, and applications can converse with one another across technologies of languages.
Therefore, option C is the correct option.
Learn more about Middleware, here:
https://brainly.com/question/13440971
#SPJ1
The question is incomplete, the complete question is:
a. cloud computing
b. rapid application development
c. service-oriented architecture
d. Software as a Service
During which step of the etl process can data that fails to meet expected patterns or values be rejected to help clean up dirty data?.
The extract is the step of the ETL process that can data that fails to meet expected patterns or values be rejected to help clean up dirty data.
What are the steps of the ETL process?The five steps of the ETL process are as follows:
Extract.Clean.Transform.Load.Analyze.Among the five above-given steps of the ETL process, extract, transform, and load are the most important process step of the ETL. The transformation step of an ETL process involves the execution of a series of rules or functions to the extracted data to convert it to a standard format. It is the third step of the ETL process.
While extraction is the first step of the ETL process that significantly imports and consolidates the structured and unstructured data into a single repository.
Therefore, the extract is the step of the ETL process that can data that fails to meet expected patterns or values be rejected to help clean up dirty data.
To learn more about the ETL process, refer to the link:
https://brainly.com/question/26801686
#SPJ1
What term is used to describe the method that allows coplink to access many different databases of law enforcement agencies with varying data fields?.
The term is used to describe the method that allows copylink to access many different databases of law enforcement agencies with varying data fields is option c: multi dimensional approach .
Why is a multidimensional approach important?
The multidimensional method enables us to assess a company's complex social behavior (for example, a company may only be socially responsible in the environmental dimension) as well as the perspectives of various stakeholders (i.e. shareholders that are made for the economic dimension as well as employees for the social dimension).
Illeris (2002, 2002) took into consideration the cognitive, emotional, and social elements of learning; this method is multidimensional. The Three Dimensions of Learning: Cognitive, Emotional, and Social.
Therefore, Development is multidimensional, which means that aspects like physical, emotional, and psychosocial development interact dynamically. Gains and losses occur as a result of development in many different directions throughout life. Characteristics can be changed since development is changeable.
Learn more about multi dimensional approach from
https://brainly.com/question/13791083
#SPJ1
See full question below
What term is used to describe the method that allows COPLINK to access many different databases of law enforcement agencies with varying data fields? Multi-dimensional Approach Clustering Approach Data Cube Approach Federated Approach
hakim is a network engineer. he is configuring a virtual private network (vpn) technology that is available only for computers running the windows operating system. which technology is it?
The technology is secure socket tunneling protocol (sstp). A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel.
A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel. By combining key negotiation, encryption, and traffic integrity checking, SSL/TLS offers transport-level security. Except for authorized web proxies, almost all firewalls and proxy servers can be bypassed by using SSL/TLS across TCP port 443 (by default; port can be altered).
Authentication for SSTP servers is required during the SSL/TLS stage. Authentication for SSTP clients is required during the PPP phase but is optional during the SSL/TLS phase. Common authentication techniques like EAP-TLS and MS-CHAP are supported by PPP. For Linux, BSD, and Windows, there is SSTP.
To know more about SSTP click here:
https://brainly.com/question/4674025
#SPJ4
After pitching her game to a room full of investors, Zoie has confirmed that two of the investors are very interested in learning more. They both called and asked Zoie for a game proposal. What is a game proposal used for?
A.) It is used as the graphical overlay on a game which displays feedback for the player.
B.) It is used to secure funding for the project from venture capitalists or publishers, or with internal teams within the company, taking the concept and ideas about the game and starting to turn them into specifics.
C.) It is the teaser for the game, which is used to sell the game to the team, investors, target audience, or anyone else who might be interested in the game.
D.) It is used to list the different subtasks of a game development project, along with their estimated time and progression.
Answer: B
Explanation:
it is used to secure funding for the project from venture capitalists or publishers, or with internal teams within the company, to take the concept and ideas about the game and start to turn them into specifics
one way to copy a folder to a new location is to right-click the folder and select copy, then move to the new location, right-click and select.
a. True
b. False
The statement "one way to copy a folder to a new location is to right-click the folder and select copy, then move to the new location, right-click and select" is definitely true.
How do you copy a folder?You can copy a folder by right-clicking on it. There you will see an option like a move or copy. Select what to want to do. And then go to the destination where you want to get copied. Right-click on the place and click copy here.
According to the context of this question, if you want to copy any folder or file, follow the step one by one in a sequential manner. To copy a folder or file to a new location, right-click the folder and select copy, then move to the new location, right-click and select. Your process of copying a folder is completed.
Therefore, the statement "one way to copy a folder to a new location is to right-click the folder and select copy, then move to the new location, right-click and select" is definitely true.
To learn more about File and folders, refer to the link:
https://brainly.com/question/20262915
#SPJ12
Malware can be delivered using which of the following methods? [Choose all that apply]
a-Website
b- Through user
c-USB
d-E-mail attachments
Malware can be delivered using Website, E- mail attachments and USB. By these three methods malware can be delivered.
Any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software. Malware is able to infect network and devices and is designed with the intention of negatively affecting such devices, network, and/or their users.
This harm may manifest itself to the user or endpoint in many ways depending on the type of malware and its objective. Malware can have terrible effects in some situations while having very minor and innocuous ones in others.
Regardless of the technique, all malware is created to exploit devices at the expense of the user and in favor of the hacker—the person who created and/or used the software.
To know more about Malware click on the link:
https://brainly.com/question/399317
#SPJ4
the range of temperatures on mars is select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a much hotter than anywhere on earth. b similar to temperatures rochester new york. c similar to temperatures antarctica. d much colder than anywhere on earth.
Answer:
Explanation:
d) Much colder than anywhere on earth.
vincent is performing a wireless environment analysis and wishes to identify factors that affect signal propagation. which factor is least likely to impact wireless signals?
Since Vincent is performing a wireless environment analysis and wishes to identify factors that affect signal propagation. the factor that is least likely to impact wireless signals is Time of day
How do wireless signals work?Electromagnetic waves that are traveling through the atmosphere are wireless signals. These are created when electric energy passes through a metal object, such a wire or an antenna, and waves are created all around that object.
In summary, the manipulation of radio waves enables the wireless transport of data. These waves are produced by creating electrical pulses in a natural way. Then, in order to transmit sound or data, these radio waves might have their amplitude or frequency altered.
Learn more about wireless signals from
https://brainly.com/question/23091703
#SPJ1
Which option is not a factor when determining which kind of images to include in your project for a target audience?
Answer:Your personal style and stylistic preferences .
Explanation:
Primitive data types are predefined within the java language and named with a reserved word
a. True
b. False
Primitive data types are predefined within the java language and named with a reserved word is True
Sun Microsystems first introduced the programming language and computing environment known as java language in 1995. Through the provision of the dependable foundation upon which several services and applications are built, it has grown from modest beginnings to power a significant portion of the digital world of today. Java is still a crucial component of cutting-edge technologies and future-oriented digital services.
Even though the majority of current Java programs integrate the Java runtime with the program itself, there are still a lot of programs and even certain websites that require desktop Java to work. This website, Java.com, is designed for users who may still need Java for desktop programs, more specifically those that target Java 8. Anyone interested in learning Java programming, both developers and users
Learn more about java language here:
https://brainly.com/question/13153130
#SPJ4
a 64-bit processor is required for a computer on which you wish to install the hyper-v server role, along with what other technology?
A 64-bit processor is required for a computer on which you wish to install the hyper-v server role, along with the Data Execution Prevention (DEP) feature.
What do you mean by 64-bit?
64-bit integers, memory addresses, or other data units[a] in computer architecture are those that are 64 bits wide. Furthermore, 64-bit CPUs and ALUs are those that utilise processor registers, address buses, or data buses of that size. A 64-bit computer is one that employs such a processor. 64-bit computing refers to the usage of machine code with 64-bit virtual memory addresses in software. However, not all 64-bit instruction sets support full 64-bit virtual memory addresses; for example, x86-64 and ARMv8 support only 48 bits of virtual address, with the remaining 16 bits of virtual address requiring all 0's or all 1's, and several 64-bit instruction sets support fewer than 64 bits of physical memory address.
To learn more about 64-bit
https://brainly.com/question/11633895
#SPJ4
the primary advantage of storing programs in noncontiguous locations is that ____.
The primary advantage of storing programs in noncontiguous locations is that main memory is used more efficiently.
In a paged memory allocation system, the fundamental benefit of placing programs in noncontiguous page frames is that main memory is utilized more effectively.
Contrary to contiguous allocation, noncontiguous memory allocation basically assigns memory space from various locations to the process in accordance with its needs. The freely available memory space is dispersed throughout the system in the same way that the total amount of memory is distributed. This memory allocation method aids in reducing memory waste, which eventually results in internal and external fragmentation.
The method is allocated to various memory locations in different memory sections thanks to non-contiguous memory allocation.
The kind of memory allocation technique. Depending on the needs of the process making the memory request, a single contiguous piece of memory blocks is assigned.
It is finished by creating fixed-sized memory compartments and designating a single process to each partition. The amount of multiprogramming will be constrained, nevertheless, to the number of memory-based fixed partitions.
To know more about noncontiguous click on the link:
https://brainly.com/question/14297688
#SPJ4
I/O systems (networking, video, etc.) suffer the biggest performance hit in virtualized systems.
a. True
b. False
Option a is correct. It is true that I/O system (networking, video, etc.) suffer the biggest performance hit in virtualized systems.
An information processing system called I/O (Input/Output) is made to send and receive data from a network, device, or piece of computer hardware.
Over a network, data can be sent between devices. Computers couldn't communicate with other systems or devices without I/O.
In the domain of I/O, input devices and output devices are the two main categories of hardware.
Only data input into another device is possible with input devices. A mouse is an example of an input device because it can only transmit data to a computer; it cannot receive or replicate data from the computer. Only the output of data from one device is received by output devices.
To know more about I/O click on the link:
https://brainly.com/question/17226929
#SPJ4
which java data type would be the best suited to represent whether or not a student has completed their homework?
Data types in Java are divided into two kinds. boolean, char, int, short, byte, long, float, and double are examples of primitive data types. Object data types or non-primitive data types include things like strings, arrays, etc.
Explain about the Java ?The goal of OOps in Java is to increase code readability and reuse by effectively defining Java program. Abstraction, encapsulation, inheritance, and polymorphism are the four basic foundational concepts of object-oriented programming. These ideas seek to incorporate actual entities into programming.
Primitive types and reference types are the two subcategories of types in the Java programming language. The boolean type and the numeric types are the primitive kinds (4.2) The floating-point types float and double as well as the integral types byte, short, int, long, and char make up the numeric types.
A Java expression called a boolean returns a true or false Boolean value. When we want to compare values to get answers, this is helpful.
To learn more about Java refer to:
https://brainly.com/question/25458754
#SPJ4
Which of the following are the functions of e-mail? Check all of the boxes that apply.
Whichstoring contacts
showing all recipients all of the time
sorting e-mail by date or sender
setting the priority of an e-mail
Answer:
showing all recipients all of the time
Answer:
1 3 4
Explanation:
what page number does word give to a cover page?
Answer:
0
Explanation:
Technically, the cover page has a page number of 0 since the following page number is 1, but it is not displayed.
0-page number does word give to a cover page.
What is cover page?On the cover page, you should include the name of your institution, the title of your paper, your name, the name of your course, the name of your teacher or professor, and the due date for the paper.
On the Insert tab, select Cover Page. Pick a cover page design from the gallery's options. You can update a cover page after you've inserted it by clicking on a particular area, such the title, and inputting your own text to replace the example text.
In APA Style, the cover page is referred to as the title page. Students should follow the guidelines given by their instructor when choosing the appropriate format for their title page.
This page should include other significant information in addition to the document's title, but the specifics of the cover page layout will vary depending on the document.
Thus, it is 0-page.
For more information about cover page, click here:
https://brainly.com/question/4755940
#SPJ12
What is a best practice when using remote desktop protocol (rdp) to access another computer?
The Remote Desktop Protocol (RDP) is a protocol or technical standard for remotely accessing a desktop computer.
RDP, Independent Computing Architecture (ICA), and virtual network computing (VNC) are all protocols that remote desktop software can use, but RDP is the most commonly used. A VPN establishes a secure, encrypted connection over an insecure network, such as the internet. VPN technology was created in order to allow remote users and branch offices to securely access corporate applications and other resources. VPNs enable remote employees to route their online activity through a secure server capable of directly connecting them to their company's network. These systems encrypt data sent over the network so that it is unreadable even by those with access to it.
Learn more about protocol here-
https://brainly.com/question/27581708
#SPJ4
what is the name for the device that allows read-only access to all accessible data on a drive and keeps anything from being written to an original drive?
The name for the device that allows read-only access to all accessible data on a drive and keeps anything from being written to an original drive is write blocker
What is a Write blocker?A writer blocker is any tool that provides read-only access to a data storage device without compromising data integrity. A writer blocker is any tool that provides read-only access to a data storage device without compromising data integrity. Proper use of write blockers ensures protection of the Data Chain of Custody. There are two main types of writer's blockers. The first type is hardware write blockers. These devices are typically placed between the evidence drive and the forensic workstation. The second type is software write blockers, sometimes built into computer forensics suites such as EnCase and FTK.Protecting the evidence drive from write operations during an investigation is also important to counter potential claims that the contents of the drive were modified during the investigation.
To learn more about data safety, refer
https://brainly.com/question/27034337
#SPJ4
What protocols is the one that is most likely to require irb review?
Research involving a human subject protocols is the one that is most likely to require irb review.
Introduces the ethical and governing concerns surrounding the use of human subjects in research. It gives an explanation of the informed consent procedure and the Common Rule, a set of rules that several U.S. federal agencies have embraced.
Certain categories of researchers must complete RCR training in order to work with the National Institutes of Health (NIH), National Science Foundation (NSF), and U.S. Department of Agriculture (USDA). Regardless of a researcher's funding source, RCR is increasingly seen as a crucial part of training.
The key RCR issues, such as authorship, collaborative research, conflicts of interest, human subjects, and research misconduct, are thoroughly reviewed in this course. The use of case studies and audiovisual examples to illustrate crucial ideas.
To know more about research click on the link:
https://brainly.com/question/18723483
#SPJ4
A study to test a newly created wheelchair by having senior citizens use it.
To know more about irb review :
https://brainly.com/question/28902906
#1234
What is the standard shell for most linux computers?
The Bourne-Again Shell, also known as Bash, is by far the most popular option and is preinstalled as the default shell in the majority of Linux variants.
Linux is an open-source, free operating system for computers. One of the most popular operating systems in use today, Linux can be found on everything from smartphones to supercomputers. Here are some excellent computers running Linux.
A Unix-like operating system (OS) for desktops, servers, mainframes, mobile devices, and embedded devices, Linux is open source and user-developed. One of the most broadly supported operating systems, it is supported on almost all popular computing platforms, including x86, ARM, and SPARC.
An open-source, free operating system is Linux. Running on anything from smartphones to supercomputers, Linux is one of the most popular operating systems in the world. Here are some excellent Linux-compatible computers.
To know more about Linux click on the link:
https://brainly.com/question/15122141
#SPJ4
Which of the following are examples of security threats?
Select all of the boxes that apply.
antivirus software
bugs
power surges
theft of hardware
Answer:
b,c.d
Explanation:
bc i got it wrong
Answer:
B, C, D
Explanation:
all 3 and got correct
the following code computes the product of a and b. what is its runtime?
int product (int a, int b) { int sum =0; for (int i=0; i< b; i ) { sum = a; } return sum; }
Since neither loop depends on the other, the two loops are independent. Therefore, we may define the difficulty of the two stacked loops as the sum of the difficulties of the separate loops.
The inner loop in j is O(lgn) and the outer loop in I is O(n) in this scenario (log base 2 of n). The total time is therefore O. (nlgn). The term is derived from the separation between compile time and runtime in compiled languages, which also distinguishes between the computer operations involved in creating a program (compilation) and running it on the target machine (the run time). Consider the following for a n of 16 to understand why the inner loop is O(lgn): j | step# 1 | 1 2 | 2 4 | 3 8 | 4 16 | 5.
Learn more about loop here-
https://brainly.com/question/14390367
#SPJ4
I could use some research on the Palo Alto school though it has to be original
Answer:
in your own words .say what you think this sonnet is about