Answer:
they can distract from the content of the slides in the presentation
Explanation:
if you make it look really cool, you'll focus more on the graphics than the content
Does -8 = -21?
[this is NOT a trick question]
Yes....?
No!
Answer:
No.
Explanation:
From my knowledge, negative 8 is 8 units to the left of zero, while 21 is 21 units to the left.
This means that they are two different negative numbers! If you see an equation like this, it would be labeled as false.
I'm quite sure I am correct, tell me so if otherwise! :)
#SpreadTheLove
Answer:
No
Explanation:
four major parts of the keyboard
Answer:
alphabetical keys, function keys, cursor keys, and the numeric keypad
Explanation:
Answer:
Pretty much all of the keys on the keyboard are important. Also the touch pad.
Which technique will game developers use to provide more immersive simulations in future games?
A.
computer-hand interfaces
B.
brain-hand interfaces
C.
computer-technology interfaces
D.
brain-computer interfaces
Answer:
brain-computer interfaces
Explanation:
Which option is most likely used to create many-to-many relationships in Access?
inner join
outer join
junction table
parameterized query
Answer:
Junction table.
Explanation:
Junction table is most likely used to create many-to-many relationships in Access.
A many-to-many relationship comes into existence when one (1) or more items in a table has a relationship with one (1) or more items in another table. An example is the products in a customer order.
Many-to-many relationships provides users with critical and crucial information, they're the most commonly used table relationships in Access.
In order to represent a many-to-many relationship in Access, a third table should be created by the user, this is often referred to as the junction or linking table, which further disintegrate the many-to-many relationship into a two (2) one-to-many relationships.
Answer:
c
Explanation:
Which of the following describes an executive information system (EIS)?
A. Uses the Internet only for data analysis
B. Analyzes internal and external data sources
C. Reveals results broken down into time periods
D. Provides business performance reports
The executive information system (EIS) is used to Analyzes internal and external data sources.
What is an EIS in information management?An executive information system (EIS) is known to be a toll that helps to give important information, that is obtained from internal and external sources.
Therefore, one can say that The executive information system (EIS) is used to Analyzes internal and external data sources to executives.
Learn more about data sources from
https://brainly.com/question/26711803
#SPJ2
Which of the following geometric objects occupy two dimensions?
Check all that apply.
A. Pyramid
B. Ray
O C. Line
D. Cube
E. Triangle
F. Plane
Answer:
E. Triangle
Explanation:
It's E, and F
A Pyramid is 3D
A Ray is 1D
A Line is 1D
A Cube is 3D
A Triangle is 2D
A Plane Is 2D
The two-dimensional objects are (e) triangle and (f) plane
How to determine the geometric objects?Two-dimensional objects are object that have a flat surface, and they extend in two directions i.e. the x and y axes.
As a general rule, two-dimensional objects are represented by flat surface.
From the list of given options, the two-dimensional objects are (e) triangle and (f) plane
Others are either one-dimensional objects or three-dimensional objects
Read more about geometric objects at:
https://brainly.com/question/12280037
#SPJ2
What is the easiest way of ensuring that others can access a presentation that a user has created and make changes to it, while also ensuring that those changes are tracked and coauthoring can occur?
Save to removable media.
Email the file.
Store on OneDrive and share.
Make a second copy of the file.
Answer:
Store on OneDrive and share.
Explanation:
Store on OneDrive and share is when coauthoring can occur.
What is One drive?OneDrive is a Microsoft online cloud storage platform. When saving documents.
OneDrive is integrated with Windows 11 and provides users with Microsoft accounts with five gigabytes of free storage space before offering upgrade alternatives.
Users of OneDrive can store files, pictures, and other documents on a variety of devices. The ability to save files in OneDrive and have them automatically sync to other devices is now available. This implies that a person can use several places to access and edit the same document.
Therefore, Store on OneDrive and share is when coauthoring can occur.
To learn more about One drive, refer to the link:
https://brainly.com/question/3733676
#SPJ3
Which one of the following options is incorrect in Presenter View?
Move to the previous or next slide
View all the slides
Hide or unhide the current slide
Writing option not available
Answer:
Writing option not available
Explanation:
What symbols are used with HTML tags?
A) ()
B) []
C) {}
D) <>
Answer:
C?
Explanation:
Answer:
D.
Explanation:
HTML uses <> as tags, example: <p> designates a paragraph.
An algorithm is a step-by-step series of instructions that, when followed, produces a definite and desired result. At this stage, programmers write the instructions in an informal, English-like language instead of programming .
Answer:
This method of informal English-like language is called Pseudo-Code.
Explanation:
Where words and English grammatical structure is used inplace of functions and variables.
Example being:
function Add
variable 1 + variable 2.
if variable 1 + variable 2 = desired variable
Do something good
end if
else
find out why
end else
end function
Would Translate to, in C#
public void Add(int var1, int var2, int var3)
{
var3= var1 + var2;
if(var3 = 1234)
{
return var3;
}
else
{
Console.WriteLine(var3);
return var3;
}
}
What means of preventing security breaches would you expect to find in a network which has attempted to provide protection from hackers and other external security threats?
Answer:
a firewall
Explanation:
a firewall is a way programmers can attempt to stop breaches, however every code has a zero day. (a bug that had zero days spent fixing it) even Microsoft had a couple zero days
By using your own data, search engines and other sites try to make your web
experience more personalized. However, by doing this, certain information is being
hidden from you. Which of the following terms is used to describe the virtual
environment a person ends up in when sites choose to show them only certain,
customized information?
A)A relational table
B)A clustered circle
C)A filter bubble
D)An indexed environment
Answer: Answer D, An indexed environment.
The largest size heading tag-often used to create the main heading of a webpage is
Answer:
<h1> tag is the correct answer to the given question .
Explanation:
The heading tag is used in the HTML for giving the heading in the webpage there are 6 heading tag is used in the HTML which are used in the different different purpose .
The <h1> tag is used for the Largest size heading in the main heading of the webpage whereas the <h6> is used for least size heading in the web page.Following are the example of <h1> tag
<html>
<head> </head>
<body>
<h1 align="center"> Brainly </h1>
<h6> subject </h6>
</body>
</html>
Output:
Following are the attachment of output.
What is the difference between primary memory and the secondary memory?
Answer:
Computer memory is categorized into primary and secondary memory. While primary memory is the main memory of the computer which is used to store data or information temporarily, whereas secondary memory refers to external storage devices that are used to store data or information permanently.
Explanation:
Answer:
Explanation:
Difference between Primary Memory and Secondary Memory Primary is when a computer which can be directly accessed by the central processing unit, where as secondary memory refers to the external storage
How will you reduce the risk of an collision?
A. By always driving with an adult.
B. By becoming more familiar with how your vehicle operates.
C. By playing more video games to keep you sharp.
Answer:
B
Explanation:
you want to be familiar with the vehicle you are operating such as braking, accelerating, blinkers etc.
how do i end my current plan that i never signed up for, the basic one it charged me $24
Answer:
...
Explanation:
I think you need to call the brainly HQ other then that i don't know.
What is the purpose of lookup tables in spreadsheet software?
A. They allow the user to retrieve information from another location
in a table.
B. They allow the user to lock cells that contain information that
remains consistent.
C. They allow the user to create a graphic representation of a
selected table.
D. They allow the user to convert foreign currencies.
Answer:
A. They allow the user to retrieve information from another location
in a table.
Explanation:
The purpose of lookup tables in a spreadsheet software is that: A. they allow the user to retrieve information from another location in a table.
What is a spreadsheet software?A spreadsheet software refers to a type of software program which is typically designed and develop with cells that are arranged in a tabulated format in rows and columns, so as to do the following on a data:
SortCalculateFormatArrangeIn conclusion, the purpose of lookup tables in a spreadsheet software such as Microsoft Excel is that they allow end users to retrieve information from another location in a table.
Read more on spreadsheets here: https://brainly.com/question/4965119
#SPJ2
What's a good drawing tablet?
Answer:
Wacom Intuos S
Explanation:
If you're looking for a good tablet that isn't too expensive the Wacom Intuos S is a great starter, I personally use it and really enjoy it. It doesn't have a graphic screen. If you're looking for one with a graphic screen get the Wacom Cintiq 22, It's expensive but great quality. Most tablets with a graphic screen are this expensive though. But if you REALLY want one with a graphic screen that isn't TOO expensive I recommend the HUION Kamvas pro 12.
Hope I could help!
Answer:
My recommended one is
Xp-Pen Artist 12 Drawing tablet
Explanation:
A good drawing tablet is a tablet where you can draw high quality drawings If you are an artist.
Bookmarks can be added to a browser to quickly find favorite websites
Answer:
Yes.
Explanation:
Bookmarks can be added to a browser to quickly find favorite websites.
Tommy has hired a marketing company to create a billboard advertisement
for his company. So far, the message billboard contains exciting graphics, a
short description of the company and its services, and the contact
information. Which element of effective advertisement is Tommy missing?
Answer:
the billboard is missing a call to action!
Explanation:
It has exciting graphics and appropriate information.
The element that Tommy missing in the effective advertisement is the call to action.
What is the call to action?Any design intended to elicit an immediate response or promote an immediate sale is referred as in marketing as a “call to action.” A call to action (CTA) is most frequently used to describe the usage of words or phrases that may be inserted into sales scripts, advertising messages, or web sites and that urge an audience to behave in a certain way.
The message's call to action is the section that instructs your audience on what to do. If stated properly, it also motivates people to take action.
Therefore, it is call to action.
Learn more about the advertisement, refer to:
https://brainly.com/question/3163475
#SPJ2
Select the pieces of information that are added on to data to get it where it is going.
Ethernet
bit
frame
sender and receiver port
IP address
segment
MAC address
Answer:
IP address and MAC address
Explanation: The IP address tells the server what network to send the information to, the MAC address tells the local network what device to send it to.
Answer:
IP Ethernet s&r port MAC
Explanation:
Hope this helped
5
Type the correct answer in the box. Spell the word correctly.
What aspect should you consider before adding pictures to a document?
You should structure the
first before you search for a relevant picture.
Reset
Next
Answer:
Document
Explanation:
Document because after you structure your document together the way you like you can add pictures.
Answer:
I think is tvibl irqfijqbiwnkefw (Document)
Explanation:
is the answer of plato
Design and modeling 1.2 Mystery object
Answer:
That's not a question
Explanation:
Four friends bought three same-sized pizzas for dinner.
Kesha ate 3/4 of a pizza.
Samuel ate 1/2 of a pizza.
Jaxson ate 5/8 of a pizza.
Luann ate the rest of the pizza.
How much pizza did Luann eat?
Answer:
9/8 of a pizza
Explanation:
3/4 -> 6/8
1/2 -> 4/8
5/8 -> 5/8
We can now add all of these:
6/8 + 4/8 + 5/8 = 15/8
The total amount of pizza is 24/8 because there are 3 pizzas.
24/8 - 15/8 = 9/8
Which type of operating system is usually used in personal computers?
A [blank] operating system is usually used in personal computers
Answer:
A GUI based operating system is usually used in personal computers
Explanation:
The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).
The type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.
What is the Operating system?An operating system may be defined as s type of system software that significantly regulates all sorts of hardware and software resources of the computer and provides common services for computer programs.
According to the context of this question, the three most fundamental operating systems for personal computers may include Microsoft Windows, macOS, and Linux.
All of these operating systems generally are graphical user interface (GUI) based. These are powerful and extensively used a program that controls and manages the hardware and other software on a computer.
Therefore, the type of operating system that is usually used in personal computers is known as Microsoft Windows. It is a GUI-based operating system that is usually used in personal computers.
To learn more about Operating systems, refer to the link:
https://brainly.com/question/22811693
#SPJ2
Your question seems incomplete. The most probable complete question is as follows:
Which type of operating system is usually used in personal computers?
Microsoft Windows.UNIX.LINUX.Identify the equation that translates Y = In(x) five units down.
Type the correct answer in the box. Spell all words correctly.
What will happen if there is an imbalance in the presentation of the content on a website?
An imbalance in the presentation of the content can decrease the _____
of a website.
Answer:
Traffic
Explanation:
Answer:
visual appeal
Explanation:
I had just taken this test on Edmentum and gotten it correct. if you review the lesson youd see the answer.
(please give me brainlist)
*URGENT!!* *100 POINTS!**9 questions for 100 points*
You are the operator of a small golf and ski shop (Sam’s Golf & Ski) that generates a profit of $70,000 on sales of $255,000 per year. You have been very successful with your 3-year-old business and have met all of your obligations on a timely basis. Your ultimate goal has been to rename your business Sam’s Sports Emporium (SSE) and carry most of the popular recreational sports items at multiple outlets within your state. You have been working on a business plan to present to the bank in order to secure funding and make your dream a reality. As part of your business plan, you need to address the information needs of your proposed business.
2.) identify the IS components needed for SSE. When you explain them, use terms SSE would use.
Hint: What types of communication technology, software, hardware, data
procedures, and people?
3.) how would perform an Industry Analysis on the sporting goods industry as a whole?
Hint: Use Porter’s Five Forces to guide you.
4.) what competitive strategy you would use for SSE based on the Industry Analysis you write wrote about in #2.
5.)discuss systems needed for SSE.
Hint: EES for accounting, etc.
6.) identify the databases needed for SSE and explain why they are needed.
Hint: What type of DBMS? What kind of information would you keep in your
database?
7.)identifying the methodology to use for developing the system(s) for SSE and justify your selection.
Hint: Prototyping
8.) what type of system (functional or cross-functional) is needed and explain.
Hint: Supply chain management, sales transactions updates, etc.
9.)that states what your company ethics policy is.
Hint: What would you include in your company’s ethics policy?
Answer:last day of school
Explanation:
sorry, im looking for it as well
Which language is an example of a fifth-generation language?
Digital signatures are as legally acceptable as written signatures.
Digital signatures contain information such as birth date and Social Security number.
Digital signatures can be retrieved easily if they are lost.
Digital signatures show the handwriting of the signer as physical verification.
What is an advantage of using digital signatures?
Answer:
First point and the last point are the correct answer to the given question .
Explanation:
The main objective of the digital signature is to ensure the quality of the document or the message was not changed during the transfer of message in the network.
Following are the advantages of the digital signature
As compare to the electronic signature the digital signature is more secure then that of.The signer's signature is seen on the digital signatures as the physical proof.Global recognition, and the compliance with the law.All the other options are incorrect they are not advantage of the digital signature .