long paragraph for "importance of tree"
Answer: Trees are really important b/c if we did not have trees we would have bad air, and hey come on nobody wants bad air to have trees we need to plant them trees also help the informant for animals b/c some animals live in trees and without that they cant hide form predators and the food chain would get messed then there would be messed life and to much of predators which is bad in a way. We also need trees for if your get you get stuck in the wild by maple trees your lucky and you can sharpen a weapon (don't ask how to make a weapon)then you can get maple out.
Explanation:
Trees are very very very important for the air and the ecosystem
B. In cell G2, enter a formula using the AND function that includes structured references to display TRUE if a project has a [Project Type] of "Mixed Use" and a [Funding Type] of "Loan". Fill the range G3:G13 with the formula in cell G2 if Excel does not do so automatically
Excel formulas are expressions used to perform computation.
The Excel formula to enter in cell G2 is = IF(AND(D2 = "Mixed Use", E2 = "Loan"), "True", "False")
How to determine the Excel formulaFrom the question, we have:
Cell D2 represents [Project Type] Cell E2 represents [Funding Type]The Excel AND function is represented as:
= IF(AND([condition 1],[condition 2]), [Value if true], [Value if false])
So, we have:
= IF(AND(D2 = "Mixed Use", E2 = "Loan"), "True", "False")
Hence, the Excel formula to enter in cell G2 is = IF(AND(D2 = "Mixed Use", E2 = "Loan"), "True", "False")
Read more about Excel formulas at:
https://brainly.com/question/14820723
If a data label, title, or legend in a chart is difficult to read, you can format them as bold, but you cannot change the font size. True False
If a data label, title, or legend in a chart is difficult to read, you can format them as bold, but you cannot change the font size: False.
What is a chart?A chart can be defined as an effective medium that is used to graphically display data in a pictorial form. Thus, a chart comprises the following elements:
Data labelTitleLegendIf the aforementioned elements in a chart is difficult to read for the end users, they can easily format them as bold and equally change the font size.
In conclusion, the elements in a chart can be formatted as bold and their font size can also be changed.
Read more on chart here: https://brainly.com/question/24741444
Kate saves her work on a secondary storage device that is fairly new, and uses flash technology instead of disks.
Kate is using a(n) __________ drive.
CD/DVD-ROM
SSD
hard disk
optical disk
Kate saves her work on a secondary storage device that is fairly new and uses flash technology instead of disks. Kate is using an SSD drive. Thus the correct answer is B.
What is a secondary storage device?The devices that store the information of the user in a protected way outside of the computer with the help of external devices are called secondary storage devices. This includes Hard disk, optical disk, CD disk, and so on.
SSD is an acronym for Solid State Storage Devices. They are silicon-based devices that use non-moving flash memory to store information digitally. These include USB flash drives, SIM cards, SD cards, and pen drives.
SSD will be used to enhance the performance of the computer as they help to provide quick access to information as compared to regular hard drives used due to the latest technology.
Therefore, option B SSD is appropriate.
Learn more about secondary storage devices, here:
https://brainly.com/question/11599772
#SPJ5
When a computerized data control detects a problem, it notifies someone to make needed changes.
When a computerized data control sensor detects a problem, it notifies someone to make needed changes.
What is a sensor?A sensor can be defined as an electronic device that is designed and developed to detect a particular problem that are peculiar to its configured database, so as to notify or alert an engineer to make necessary changes.
In many manufacturing plants, a computerized data control sensor are installed on various machines to detect a problem and it subsequently notifies someone to make needed changes.
Read more on data control here: brainly.com/question/13179611
Chipotle does plant based chorizo taste like chorizo.
Answer:
facts
Explanation:
There are more than _____ active users across the world, making it the most popular online email service.
A.
150,000
B.
1.5 million
C.
1.5 billion
D.
1.5 trillion
Answer:can you help me on this pls i have no points
Explanation:
The perimeter of a square painting is 8 meters. How long is each side?
Answer: There are more than 1.5 billion
Explanation:
What is the purpose of a return statement?
a
to pass a value from inside a function to the main program
b
to print a value to the user
c
to go back to the beginning of a loop
d
to begin printing on a new line
What is the purpose of a return statement?
a - to pass a value from inside a function to the main program
if the bookstore sold 8 books for $66 at that rate how much was one book
$8.25
Explanation:
To find the amount of money one book costs, we have to divide 66 by 8.
66÷8= 8.25
1 book costs $8.25
Answer:
8.25$ per book
Explanation:
So, $66 for 8 books and we can get the rate by dividing 66/8 which gives us 8.25$
Checking for and correcting errors may need to be done numerous during which of the following phases of the software development life cycle (SDLC)?
A.
planning
B.
designing
C.
developing
D.
testing
Answer: planning
Explanation:
If you select one slice of pie in a pie chart, you have selected a ____
data series
data set
data point
data line
Answer:
a date point I think I don't really know
Which of the following is a Reach Key on your keyboard?
O H key
OF key
O J key
O S key
Answer:J key
Explanation:I want my brainlyiest pls
Answer: 3
Explanation:
The J key.
Similarities between master file and reference file
Explanation:
What is a master file?
A collection of records pertaining to one of the main subjects of an information system, such as customers, employees, products and vendors.
What is a reference file?
A reference file is a type of overlay
One method to delete a worksheet is to right-click on a sheet _______ and select Delete from the shortcut menu.
One method to delete a worksheet is to right-click on a sheet tab (name) and select Delete from the shortcut menu.
Ways to Delete a worksheet?The ways to delete a worksheet is that:
First you have to Right-click the Sheet tab and then click select. Delete.You can also select the sheet, and then later select Home ,Delete and lastly select Delete Sheet.A worksheet is known to be a sheet that is often used in creating preliminary plans, auxiliary inputs, notes, etc.
Learn more about worksheet from
https://brainly.com/question/25130975
Discussion Topic 2 Using complete sentences post a detailed response to the following. How do you manage your online presence? What kind of sites are you most active on, and what steps can you take to manage your image on these sites better?
NEED HELP ASAP WILL GIVE BRAINIST TO BEST AWNSER
Answer:
bro
Explanation:
This is an opinion thing; you answer what you do! But if your search history takes a turn...
EDUCATIONAL SITES THAT HELP YOU UNDERSTAND TOPICS MORE
!!! PLEASE HELP ASAP REALLY NEED IT !!!
which of the following is NOT a reason to make a payment online?
A- Time saving
B- Do not have a computer
C- Paper free
D- Less hassle
Answer: B
This is honestly confusing, this is the only one that makes sense...
Answer:
B but i would say all answers are correct and B seems the most logical
____________________ uses an algorithm to encrypt a ciphertext document from a plaintext document, and when the information is needed again, the algorithm is used to decrypt the ciphertext back into plaintext.
The Advanced Encryption Standard (AES), is a symmetric encryption algorithm and one of the most secure.
With _____ transmission, both parties in a global network are connected at the same time, as in a phone call
Answer:
synchronous
Explanation:
During synchronous transmission parties are exchanging messages in real time.
Quick!
who can solve this?
:}
:}
:}
:}
:}
Answer:
1.server
2.container
3.empty
4.lead
5.body
6.conttribute
i just know this much
sry
Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of the information?.
The Traffic Light Protocol (TLP) was created in order to facilitate greater sharing of information. TLP is a set of designations used to ensure that sensitive information is shared with the appropriate audience. It employs four colors to indicate expected sharing boundaries to be applied by the recipient(s).
cisagov
To send the content of one file to another file, you can use the _______ redirector.
Hope this helps!
why might enforcement policies be used to prevent usb tethering when a smartphone is brought to the workplace
Enforcement policies can be applied to prevent sensitive company information from being extracted by an employee using a USB-connected mobile device.
What is the enforcement policy?The enforcement policy is a set of rules and regulations that limit the actions of an employee during their work in the company. These compliance policies establish codes of behavior, clothing, data processing and other matters relevant to the company.
In accordance with the above, the enforcement policy can establish a rule for employees to avoid extracting confidential or proprietary information from the company using mobile devices.
Learn more about enforcement policies in: https://brainly.com/question/10220062
After creating a webpage with html code, what do you need to do so that others can access it on the internet?.
After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.
What is internet?The meaning of the internet is the climate of the information based on World wide web network.
There is large network of computers connected together in offices or organizations to explore the internet.
The webpage formed using HTML code has to be uploaded on AFS. AFS is the platform everyone can view the content whichever is uploaded.
Thus, After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.
Learn more about internet.
https://brainly.com/question/13308791
#SPJ2
Which sentence describe internet safety precautions?
Which sentences describe Internet safety precautions? It is advisable to install anti-virus software on your computer. You should use strong passwords for your Internet accounts. In addition, you should avoid sharing personal information over the Internet.
#hope it helps ^_^
mark me as brainliest please
The sentence describe internet safety precautions are it is advisable to install anti-virus software on your computer. You should use strong passwords for your Internet accounts. In addition, you should avoid sharing personal information over the Internet. Therefore, option C, D and E are correct.
What are internet safety precautions ?Over the internet, your computer can be attacked in a variety of ways. Viruses and spyware can delete files and allow criminals to search your computer for sensitive information. Your computer could even be compromised.
It is recommended that you install anti-virus software on your computer. For your Internet accounts, you should use strong passwords. You should also avoid sharing personal information over the Internet.
Thus, option C, D and E are correct.
To learn more about the internet safety precautions, follow the link;
https://brainly.com/question/12276583
#SPJ2
what operating system good for 3d modeler
Answer:
If you're looking for a distribution to use for 3D work, we would recommend trying either CentOS or Ubuntu, in second place. It can be installed on any PC computer that is able to run windows, and can even dual boot. It can not, however run windows or mac applications.
Explanation:
I hope this helps!Study the graph and answer the questions. The numbers on the left side of the graph are in thousands.
The Past: In 1971, integrated circuits had about
transistors.
Answer:
2012 4,500,000,000
Explanation:
:) :P
Answer:
100 thousand
Explanation:
Does anyone know to code for 2. 12. 5 four corners in Codehs will mark brainliest
Answer:
speed(0)
square_length = int(input("What is the length of the square?"))
def draw_square():
pendown()
for i in range(4):
forward(square_length)
left(90)
penup()
penup()
setposition(-200, -200)
draw_square()
penup()
setposition(-200, 200 - square_length)
draw_square()
penup()
setposition(200 - square_length, 200 - square_length)
draw_square()
penup()
setposition(200 - square_length, -200)
draw_square()
Explanation:
As a web designer, what are 3 different careers that you can have? Explain each and choose one that you would like to personally have
Applications developer: An application developer's typical responsibilities include coding, designing, application management, troubleshooting, monitoring updates and possible security threats, and providing end user support. They may also handle some project management tasks on the journey to building a new application.
Game developer:A video game developer is a software developer specializing in video game development – the process and related disciplines of creating video games
Multimedia programmer: Multimedia programmers are specialist software engineers and have the knowledge to choose the right programming language, such as HTML, Flash, PHP, etc.. Multimedia is often also described as new media, interactive media, digital media
online/internet services:An online service refers to any information and services provided over the Internet. These services not only allow subscribers to communicate with each other, but they also provide unlimited access to information.
________is the most popular public key algorithm available and can be used for digital signatures, key exchange, encryption, and decryption.
Answer:
RSA
Explanation:
Pretty sure it's RSA, hope this helps!
The diagram shows the parts of a computer. In which part is data processing done?
Answer: Control unit
Explanation: Took test