how to resolve the server you are trying to access is using an authentication protocol not supported by this version of office

Answers

Answer 1

Start an Office application that isn't OneDrive.Click the File tab, then Account, and then Switch account. Click Add Account, then enter the Microsoft 365 account that uses OneDrive.

In a computer system, a file is a container for storing information. The characteristics of files used in computers are similar to those of paper documents used in library and office files. Text files, data files, directory files, binary files, and graphic files are all types of files that store different types of information. Files can be saved on optical drives, hard drives, or other types of storage devices in a computer operating system.

A file must have a distinct name within a given file directory in most operating systems. Certain characters, however, are illegal and thus cannot be used when creating a filename. A filename consists of a name followed by a suffix.

Learn more about File here:

https://brainly.com/question/3911580

#SPJ4


Related Questions

This class represents a piñata. If you aren't familiar with piñatas, according to Wikipedia, a piñata is a shape or animal made out of paper mache and is filled with candy or toys. People take turns trying to break open the piñata while wearing a blindfold! The class only has a constructor without parameters. Your job is to add three more constructors so the user can design their own pinatas: 1. A constructor that allows users to customize all the instance variables. 2. A constructor that allows users to customize the color and the shape. 3. A constructor that allows users to customize the candy. You can see the descriptions in the Pinata class. You can also see how the constructors should be able to be used in Pinatatester.java. Note: The additional constructors will take values as formal parameters. You do not need to prompt the user for these values. After you make the constructors, you should be able to run your program without changing code in PinataTester.java. In the constructors, use the default values given in the default constructors to fill in any values that were not passed as parameters. Pinata Source: https://en.wikipedia org/wiki PC3%Blata Status: Not Submitted 2.3.8: Custom Piñatas Save Submit Continue 1 public class Pinata 2-1 FILES N N 00 OM 3 4 5 6 Pinata java // Instance variables private String candy: // what kind of candy is inside private String color; private String shape; // Constructor without parameters public Pinata() { candy "hard candy": color - "rainbow": shape - "donkey": D Pinotalester java 10- 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 20 27 28 29 1/constructor 1 to customize all of instance variable public Pinata(String candy, String color, String shape) this.candy candy: this color-color this shape shape; constructor 2 to customize color and shape publi Pinata (string color Stringshape) this candy-new candy" the color color Status: Not Submitted 2.3.8: Custom Piñatas Save Submit Continue this.color = colors this. shape - shape; } FILES //constructor 3 to customize candy public Pinata (String candy) Pinata java Pinata Testet java 29 38 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 this.candy - candy: this.color "white": this.shape - "monkey": 47 48 49 5e 51 52 52 11 Add an overloaded constructor that allows the user W to customize all of the instance variables 77 Add an overloaded constructor that allows the user W to customize the color and shape // Add an overloaded constructor that allows the user to customize the candy public String toStringtoString() 55 56 return color + Shape pinata filled with " + candy: 57 Status: Not Submitted 2.3.8: Custom Piñatas Save Submit Continue 2 3-1 FILES 4 1 import java.util.Scanner; 2 public class Pinatatester public static void main(String[] args) 5 //TODO Auto-generated method stub 7 Scanner input; 9 input-new Scanner(System.in); String candy, color, shape; 6 8 Pinata java D PinatoTester java 10 11 12 13 14 15 16 17 18 19 20 21 22 W/ Make Pinatas! Pinata p. new pinata(): ///constructor without parameters call Pinata new Pinata(candy, color, shape); //constructor 1 call Pinata p2 = new Pinata(color, shape); //constructor 2 call Pinata p = new Pinata(candy)://constructor 3 call Print the pinatas System.out.println("Enter the candy type) candy-Input next; System.out.println("Enter the color type"); color input.next(); system.out.println("Enter the shape"); shape-Input.next() 24 25 26 27 28 29 Test Cases ✓ Check Code Expand All Minimize All Test Pass Message Test results will show here. Errors: PinataTester.java: Line 15: variable candy might not have been initialized PinataTester.java: Line 15: variable color might not have been initialized PinataTester.java: Line 15: variable shape might not have been initialized

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that is to add three more constructors so the user can design their own pinatas.

Writting the code:

public class Pinata

{

   // Instance variables

   private String candy; // what kind of candy is inside

   private String color;

   private String shape;

   // Constructor without parameters

   public Pinata()

   {

       candy = "hard candy";

       color = "rainbow";

       shape = "donkey";

   }

   // Add an overloaded constructor that allows the user

   // to customize all the instance variables

   public Pinata(String Candy, String Color, String Shape)

   {

       candy = Candy;

       color = Color;

       shape = Shape;

   }

   // Add an overloaded constructor that allows the user

   // to customize the color and shape

   public Pinata(String Color,String Shape)

   {

       color = Color;

       shape = Shape;

   }

   // Add an overloaded constructor that allows the user

   // to customize the candy

   public Pinata(String Candy)

   {

       candy = Candy;

   }

   public String toString()

   {

       return color + " " + shape + " pinata filled with " + candy;

   }

}

See more about JAVA at brainly.com/question/29897053

#SPJ1

How do I do this in Access? Please list all steps in detail.

Create a new relationship between the EmployeeID field in the Professor table and the Advisor field in the Student table. Ensure that values in the Advisor field have a corresponding value in the EmployeeID field.

Answers

The Access database with the relationships you want to print should be opened. Choose Relationships from the Database Tools tab. Select Relationship Report from the Tools category on the Design tab. In Print Preview mode, a report that shows the Relationships pane opens.

In Access 2010, how do I construct a relationship?

By clicking and dragging the shared field from one table and dropping it on top of the common field in the associated table, Access will construct a relationship between the two common table fields based on the values in the common field.

What is a relationship, and how do you establish one using tables?

Click Relationships in the Relationships group under the Database Tools tab.

To know more about database visit:-

https://brainly.com/question/28391263

#SPJ4

Why do the USB 3.0 ports need a power cable? O USB 3.0 needs power to encrypt data as it travels across the cable.O USB 3.0 transfers increased levels of power. O USB 3.0 is more power efficient than earlier USB versions. O USB 3.0 requires more power to transfer data more quickly than earlier USB versions.

Answers

As a result of USB 3.0's enhanced power transfer rates, the ports require a power cable.

Which name is given to a power cable?

Using a wall outlet or extension cord, a power cord, line cord, or mains cable temporarily connects a device to the mains energy supply.

Do you mean power cable or power cord?

The main cable that supplies power to the computer, printer, monitor, and other components within a computer is referred to variously as a power cord, mains cable, or flex. The power cord seen in the image is an illustration of one that is frequently used with peripherals including printers, monitors, computers, and monitor stands.

To know more about Power cable visit:

https://brainly.com/question/11023419

#SPJ4

A application gateway is also known as a(n) ____________.
A. Application proxy
B. Host proxy
C. Circuit-level gateway
D. Domain gateway

Answers

Additionally referred to as an application proxy, an application gateway.

A is the proper answer.

What else do you call a gateway for applications?

Proxy servers, often referred to as application gateways or proxy servers, operate similarly to packet filters in that they look at the destination of the packets as well as the kind of data they include.

An application gateway is what?

The use of the same logon information and techniques to access traditional web applications stored in corporate data centres as they do for mobile apps and cloud services is known as an app gateway, which is a type of enterprise security solution.

To know more about Application proxy visit:-

https://brainly.com/question/13827808

#SPJ4

in python, the ________ symbol is used as the not-equal-to operator.

Answers

Python's!= Not Equal operator returns false when the values being compared are not identical. The not equal operator is denoted by the symbol!=.

What does the Python not operator mean?

Boolean expressions and objects can have their truth values reversed using Python's not operator. This operator can be used in boolean settings like while loops and if expressions. You can flip your variables' truth values because it also functions in non-Boolean circumstances.

The and in Python: How to Use It?

Expression1 and Expression2 are both subexpressions, and if both of them evaluate to True, then the compound expression is True. The outcome is False if at least one subexpression has a False evaluation.

To know more about Not Equal operator visit :-

https://brainly.com/question/28192577

#SPJ4

Please finish in C++ In base -2, integers are represented by sequences of bits in the following way. Bits are ordered from the least to the most significant. Sequence B of N bits represents the number: sum{ B[i]*(-2)' for i = 0...N-1}. The empty sequence represents 0. For example: 100111 represents -23 001011 represents -12 10011 represents 9 001 represents 4, because: 1 -2 4 -8 16 -32 1 = 1 + 0 + 0 + (-8) + 16 | 1 - 0+ 0 + 4 + 6 + 16 10 0 | 1 1 + (-32) = -23 100 | 10 | 1 + (-32) = -12 | i| 0 | 0 | 1 | 1 = 9 100 | 1 | = 4 - - 1 + 0 + 0 + (-8) + 16 | = 0 + 0 + 4 Note that such a representation is suitable for both positive and negative integers. Write a function: vector &A, vector &B); that, given two arrays of bits: • A of length M, containing a sequence representing some integer X, and • B of length N, containing a sequence representing some integer Ý, returns the shortest sequence of bits representing X + Y. Result array should be returned as a vector of integers. For example, given A = [0,1,1,0,0,1,0,1,1,1,0,1,0,1,1) (X = 5730) and B = [0,0,1,0,0,1,1,1,1,1,0,11 (Y = -2396), the function should return [0,1,0,1,1,0,0,0,1,0,1,1,1) (X + Y = 3334). Write an efficient algorithm for the following assumptions: • Mand N are integers within the range [0..100,000); • each element of array A is an integer that can have one of the following values: 0,1; • each element of array B is an integer that can have one of the following values: 0,1. 1 17 you can use includes, for example: 2 // #include 3 4 // you can write to stdout for debugging purposes, e.g. 5 // cout << "this is a debug message" << endl; 6 7 vector int solution(vector int> // #include

// you can write to stdout for debugging purposes, e.g.
// cout << "this is a debug message" << endl;

vector solution(vector &A, vector &B) {
// write your code in C++14 (g++ 6.2.0)
}

Answers

/* // you can write to stdout for debugging purposes, e.g. */

console.log(solution([0, 1, 1, 0, 0, 1, 0, 1, 1, 1, 0, 1, 0, 1, 1], [0, 0, 1, 0, 0, 1, 1, 1, 1, 1, 0, 1, 1]));

/* // cout << "this is a debug message" << endl; */

console.log('this is a debug message');

/* vector solution(vector &A, vector &B) { */

function solution(A, B) {

 // write your code in C++14 (g++ 6.2.0)

 let result = [];

 let carry = 0;

 let i = A.length - 1;

 let j = B.length - 1;

 while (i >= 0 || j >= 0) {

   let sum = carry;

   if (i >= 0) {

     sum += A[i];

     i--;

   }

   if (j >= 0) {

     sum += B[j];

     j--;

   }

   if (sum === 0) {

     result.unshift(0);

     carry = 0;

   } else if (sum === 1) {

     result.unshift(1);

     carry = 0;

   } else if (sum === 2) {

     result.unshift(0);

     carry = 1;

   } else if (sum === 3) {

     result.unshift(1);

     carry = 1;

   }

 }

 if (carry === 1) {

   result.unshift(1);

 }

 return result;

}

C++ SEQUENCE

Sequence containers are a set of template classes for storing data components in C++. They can store any data piece, even custom classes, because they are template classes. Their implemented data structure permits sequential access.

In computing, sequence containers refer to a group of container class templates in the C++ standard library that implement the storage of data components. They can be used to store arbitrary items, such as integers or custom classes, as they are templates.

Learn more about C++ SEQUENCE here:

https://brainly.com/question/23266317

#SPJ4

A ____ represents a picture or sketch of a screen the user will see when running a program.a.frameworkb.wireframec.sketch-upd.page frame

Answers

A wireframe is a representation of a screen that a user will view while a programme is being performed. A framework, a wireframe, a sketch-up, and a page frame.

What is a wireframe, then? Let's begin with the obvious question.

A wireframe is the two-dimensional skeletal outline of a webpage or app, analogous to an architectural plan. Wireframes give a detailed picture of the page's layout, information architecture, user flow, functionality, and desired behaviours. The styling, colour, and graphics in a wireframe are limited to a minimum because they often depict the basic product concept.

Depending on how much information is needed, wireframes can either be digitally or manually constructed.

Most frequently, UX designers utilise the technique of wireframing. Prior to the developers writing the interface's code, this procedure enables all parties involved to agree on where the information will be stored.

Learn more about Wireframe here:

https://brainly.com/question/28694672

#SPJ4

HTTP is considered to be a(n) ___________ protocol.
A. cookie
B. FTP
C. persistent
D. stateless

Answers

A browser extension enhances a browser's functionality. A company that offers server space for the storage of Web pages is known as a web hosting service. It is believed that HTTP is a stateless protocol. A website other than the one you connected to sets a third-party cookie.

What is a another word for functionality

She replied with confidence, "Yes, the utility of being a stool with the rapidity of being food," making the chair an easy sell, when I asked if she knew the stool would be a big hit right away.

React is a great option when you need responsive page elements for site functionality, or when you need elements that alter when global or user-specific data does!

Know more about server space Visit:

ttps://brainly.com/question/8451152

#SPJ4

a(n) ____ is a predefined procedure that you can call (or invoke) when needed. a. object b. instance c. class d. method.

Answers

A method is a pre-established procedure that you can use as needed.

What a user interacts with and what they view while an application is running?

The point of human-computer contact and communication in a device is the user interface (UI). This can include desktop displays, keyboards, mice, and other pointing devices. It also refers to the manner in which a user engages with a website or application.

What label control property controls whether the control resizes itself to fit its current contents?

Whether or not the label control automatically resizes to fit its current contents depends on the authorize attribute. The parameters that work best depend on the label's objective. The default setting is true for label controls that identify other controls.

To know more about attribute visit:-

https://brainly.com/question/28163865

#SPJ4

if active cell d12 contains the formula =d10+d11, cells d10 and d11 are _______ cells for d12.

Answers

The predecessor cells for active cell d12 are d10 and d11 if active cell d12 contains the formula =d10+d11.

What occurs to the formula's cell references when you transfer it from cell A10 to cell B10?

To reflect the changed position of the formula, Excel modifies the cell references in the copied formula.

Which equation should you use to sum the values in cells A3 and A10?

Although the SUM function is more user-friendly when working with many numbers, you may sum the values in a range (a collection of cells) using a straightforward formula. For instance, =SUM(A2:A6) is less prone to typos than =A2+A3+A4+A5+A6.

To know more about predecessor cells visit :-

https://brainly.com/question/30034909

#SPJ4

Which task should be easier? Keeping an image of a block letter ""F"" in your mind AND:
a) "saying ""yes"" for each corner that is an inside corner and ""no"" for each corner that is an outside corner?"
b) "pointing to the letter ""Y"" for each inside corner and ""N"" for each outside corner?"
c) "saying ""no"" for each corner that is an inside corner and ""yes"" for each corner that is an outside corner?"
d) "pointing to the letter ""N"" for each inside corner and ""Y"" for each outside corner?"

Answers

stating "yes" for every corner that is an inner corner and "no" for every corner that is an outer corner.

What is the purpose of working memory?

Working memory is the ability to store a small amount of information in a convenient fashion. It facilitates planning, comprehension, thought, and problem-solving.

Which memory serves as the system's working memory?

Even though the terms working memory and short-term memory are frequently used interchangeably, some theorists contend that the two memory types are distinct from one another because working memory permits the manipulation of information that has been stored while short-term memory only refers to the temporary storing of information.

To know more about outside corner visit:-

https://brainly.com/question/13243991

#SPJ4

Assume s is " abc ", the method __________ returns a new string "abc".
A. s.trim(s)
B. trim(s)
C. String.trim(s)
D. s.trim()

Answers

D. s.trim(). Assume s is " abc ", the method s.trim() returns a new string "abc".

Which one of the following describes how a wrapper object is directly given a value of a primitive data type?

Autoboxing is the process of transforming a primitive variable into such an object of a relevant wrapper class.Changing an int to the Integer class, for instance.

What distinguishes string from new string?

There is no distinction.We're at it again, oh no.Integer str = "Hello"; establishes a pointer ('str') to an already-existing given string with the text "Hello" that the compiler built in the constant pool.

To know more about string visit:

https://brainly.com/question/30099412

#SPJ4

Digital audio is stored in a variety of file formats, including ___________. A. WMA B. WAV C. MP3 D. all of the aboveTerm

Answers

Digital audio is stored in a variety of file formats, including MP3 files.

What are MP3 files?

Techniques for video data compression were developed by the Moving Picture Experts Group (MPEG).

For example, MPEG compression is used to reduce the amount of video and movie data that is transmitted for HDTV broadcasts, DSS satellite systems, and DVD movies.

Audio is compressed using the MPEG Audio Layer-3 subsystem of the MPEG compression system. It is known to us by the abbreviation MP3.

The MP3 format allows for music to be compressed by a factor of 10 or 12 while still coming near to CD quality. In MP3, a CD's audio file that is 30 megabytes in size takes up only roughly 3 megabytes.

When you download and play the MP3 file, it practically has the same high-quality audio as the original. An MP3 file could be downloaded and expanded if you so desired.

Hence, Digital audio is stored in a variety of file formats, including MP3 files.

learn more about MP3 files click here:

https://brainly.com/question/1623465

#SPJ4

Which of the following are application layer protocols? Select all that apply.

O Resource Reservation Protocol
O Session Control Protocol
O Dynamic Host Configuration Protocol
O Simple Mail Transfer Protocol

Answers

Telnet, FTP, TFTP, SMTP, SNMP, DNS, and DHCP are just a few of the protocols found in the application layer.

Does TCP fall within the application layer?

The transport-layer protocol known as TCP offers a dependable, full-duplex, connection-oriented data transmission service. TCP is typically used by Internet applications. Distributed, collaborative, hypermedia information systems use HTTP, an application-layer protocol.

There are how many different kinds of application layers?

The top three layers in the TCP/IP model—the application layer, the presentation layer, and the session layer—combine to form the application layer. A communications network's hosts use interface methods and shared communications protocols, which are specified by an abstraction layer called the application layer.

To know more about DHCP visits :-

https://brainly.com/question/8458316

#SPJ4

Which tool is inserted into a lock shackle and struck with a maul or flat-head ax until the padlock shackles break

Answers

a lock shackle and struck with a maul or flat-head ax until the padlock shackles break inserting tool is Duck billed lock breaker.

what is lock shackle and padlock shackle break?

The shackle or shank is the U-shaped bar that loops round from, and back into, the padlock body. This is the most exposed part of the padlock and more susceptible to be attacked. Once again, as the overall size of the padlock increases, the larger the shackle can be making it more secure.

4 way to break a lock:

Pull up on the shackle to create tension. The simplest way to do this is to insert two fingers into the shackle loop and use them to force the shackle away from the top of the lock. This will put the locking pins inside the lock into the right position for a quick crack-job.Tap the side of the lock with a hammer or similar tool repeatedly. More specifically, you want to target the side that contains the fixed end of the shackle, as the pins are located just underneath. Pound the lock over and over again using quick, short strikes. Eventually, you’ll disengage enough of the pins to “bump” the lock open.Reuse your lock when you’re finished. The best part about coaxing a padlock open with a hammer is that it should still work like nothing ever happened afterwards, so long as you don’t hit it hard enough to damage any of the pins. As soon as you get done breaking your lock, give it a test run. If it fastens properly, hold onto it for future usage. If not, chuck it in the trash.Fish out both halves of the shackle to remove the lock. Now that you’ve successfully snapped the shackle, all you have to do is pull out the broken pieces. You may need to twist or jiggle them a few times to get them to come free, as the ends will still be secured in the locking mechanisms inside the lock.

To learn more about padlock shackles break refers to;

https://brainly.com/question/10755015

#SPJ4

The text =sum(a1:a4) means the sum of values in cells a2 and a3. the sum of values in cells a1 and a4. the sum of values in the range of cells from a1 through a4. the sum of values in the range of cells from a2 to a3.

Answers

Enter =SUM(A1:A4) for the values in cells A1 through A4 using the sum function. There's also an Auto sum feature. As a consequence, choice C is correct.

What exactly is sum?

The sum is a legal utility in Microsoft Excel office that adds value to cell ranges. It is also classified as a math function and a trigonometric function.

The sum function is used here by entering =SUM(A1:A4) for the values in cells A1 through A4. There is also an Auto sum function. As a result, option C is right.

Learn how to use the SUM function correctly to sum the numbers in cells A1 through A4.

brainly.com/question/8818933

#SPJ4

Through use the sum function, enter =SUM(A1:A4) for the values in cells A1 to A4. There is also an Auto sum function. As a result, option C is right.

What is sum?

The sum is a legal utility in the Microsoft excel office program that adds value to the ranges of cells. It is also categorized under mathematics and trigonometric functions.

The sum function is used by typing =SUM(A1:A4) for the values as given in the cells A1 to A4. The Auto sum function is also available. Hence the option C is correct.

The most properly uses SUM function to sum the values in cells A1 through A4.

To know more about SUM Function kindly visit brainly.com/question/8818933

#SPJ4

Which activity is key to successfully implementing the Scaled Agile frameworkanswer choicesUse the innovation iteration instead of the PI planning processUse a cadence-based PI planning processMigrate to Features teams onlyThe System Architect should review the sizing of all Stories

Answers

The most crucial element of the Scaled Agile Framework (SAFe) is the use of a cadence-based Program Increment (PI) Planning process. It is stated that teams are not using SAFe if they are not performing PI Planning.

All of the ART teams gather for PI Planning, which is essentially a cadence-based event where the purpose and vision are communicated.

A presentation of the business context and vision is followed by team planning breakouts, where the teams establish their Iteration plans and objectives for the following Program Increment. This is the typical schedule for PI Planning (PI). This event, which is led by the Release Train Engineer (RTE) and takes place in the Innovation and Planning (IP) Iteration, involves the entire ART.

By scheduling the event for the IP iteration, subsequent PI iterations' scheduling or capacity is not impacted. Even though this period is frequently extended to account for planning across different time zones, PI Planning typically lasts for two days.

To learn more about  Agile Framework click here:

brainly.com/question/29848651

#SPJ4

The adoption of a cadence-based Program Increment (PI) Planning process is the most important component of the Scaled Agile Framework (SAFe). If teams are not engaging in PI Planning, it is said that they are not utilizing SAFe.

Which task is essential for implementing the Scaled Agile Framework successfully?

The crucial component of SAFe is Program Increment (PI) Planning. According to a citation, teams are not implementing SAFe if they are not engaging in PI Planning.

                      In essence, PI Planning is a cadence-based meeting where the mission and vision are discussed by all the ART teams.

What are the three main components of the flow SAFe implementation?

To implement flow, you'll need these three things: Limit your work-in-progress by picturing it (WIP) Reduce the number of work items each batch. In charge of queue lengths.

                   Visualize and limit work in progress are two of the three main ways to achieve flow (WIP) Reduce the number of work items in each batch. In charge of queue lengths.

Learn more about the Scaled Agile Framework (SAFe)

brainly.com/question/30160165

#SPJ4

________ is a programming language that can be used to create a wide range of Windows applications.
A) Visual Basic
B) PHP
C) BASIC
D) HTM

Answers

Windows programs can be made in a variety of ways using the programming language known as Visual Basic.

How is Java used?

The official language for creating mobile apps for Android is Java. The Android operating system was really created in Java. Despite being a more current alternative to Java for Android development, Kotlin still makes use of the Java Virtual Machine and can communicate with Java code.

Why would someone use Python?

Python is a computer programming language that is frequently used to create software and websites, automate processes, and perform data analysis. Because Python is a general-purpose language, it may be used to develop a wide range of programs and isn't tailored for any particular issues.

To know more about Visual Basic visit:-

https://brainly.com/question/14512779

#SPJ4

A 32-character password is an example of using biometricsTRUE OR FALSE

Answers

Answer:

falseExplanation:

Biometrics is something on your body that you can use to identify yourself (It falls into the something you are category), and password is a secret that you remember, and the characters are just the length of the password

The given statement is False.

A 32-character password is not an example of using biometrics.

Biometrics refers to the measurement and analysis of unique physical or behavioral characteristics of an individual, such as fingerprints, iris patterns, voiceprints, or facial recognition.

Biometric authentication relies on these unique traits to verify a person's identity.

On the other hand, a password is a form of knowledge-based authentication, where the user needs to provide a secret string of characters to gain access. In the case of a 32-character password, it is a long and complex passphrase that aims to enhance security by increasing the length and complexity of the secret information.

While both biometrics and passwords can be used for authentication purposes, they are distinct concepts. Biometrics relies on physical or behavioral attributes of an individual, whereas passwords rely on knowledge of a secret string of characters.

Learn more about Biometrics click;

https://brainly.com/question/30762908

#SPJ6

development of software is not a frequent user support function"" is an example of ____.

Answers

development of software is not a frequent user support function"" is an example of nominalization.

Which of these documentation types frequently includes links to related subjects?

The hypertext system allows for the connecting of similar text documents by a number of different persons. It is possible to "hyperlink" any word or phrase in a hypertext document to information about it that is either existing in the same document or in another document.

What are the sorts of source documents?

Companies may also utilize a source document as evidence in negotiations with business partners, typically in connection with payments. Cancelled checks, credit memos, deposit slips, expense reports, invoices, material requisition forms, purchase orders, time sheets, and sales receipts are a few examples of source documents.

To know more about software visit:-

https://brainly.com/question/29852139

#SPJ4

how to make something dissapear then reappear

Answers

There are many ways that you can make an object appear to disappear and then reappear. Here are a few examples:

One way to make an object disappear and then reappear is to use a magic trick, such as a "disappearing coin" trick. In this trick, the coin is hidden in the magician's hand or behind something else and then made to reappear in a different location.
Another way to make an object disappear and then reappear is to use a special piece of equipment called a "smoke bomb." When the smoke bomb is ignited, it produces a thick smoke that can obscure an object from view. When the smoke clears, the object appears to have disappeared and then reappeared.
You can also make an object disappear and then reappear by using a cover or a screen to obscure it from view and then revealing it again. For example, you could place a cloth over an object and then remove it to make the object reappear.
These are just a few examples of how you can make an object disappear and then reappear. There are many other techniques and methods that can be used to create this effect.

spreading insults and rumors by means of e-mails, text messages, or web postings is called:

Answers

The use of technology to annoy, threaten, humiliate, or target another person is known as cyberbullying. Threats made online and cruel, violent, or nasty texts, tweets, postings, or communications all count.

What term describes the capacity to start with particulars, such as a collection of facts, and then draw broad generalizations?

Inductive reasoning starts with observations that are narrowly focused and specialized before moving on to a generalized conclusion that is plausible but uncertain in the context of the body of supporting data.

Which of the following best characterizes the plan that establishes a company's social media objectives?

The organization's goal and guiding principles are discussed in the strategic plan. Goals and objectives for the social media plan are decided upon by the strategic plan.

To know more about cyberbullying visit :-

https://brainly.com/question/8142675

#SPJ4

raw data must be properly ____________________ for storage, processing and presentation. T/F

Answers

Raw data must be properly  formatted  for storage, processing and presentation. false

What is it called when raw data is processed and made useful?

The term "cooked data" can refer to raw data that has undergone processing. Although raw data has the potential to become "information," it first needs to be organized, selectively extracted from, occasionally analysed, and formatted for presentation.

What sort of raw data would that be?

a list of all purchases made within a month at a particular store, without any further organization or analysis. Every frame captured overnight by a security camera. grades for a quarter for each kid in a school district. an inventory of all the movies that the streaming service offers.

To know more about  formatted visit:-

https://brainly.com/question/14991834

#SPJ4

When would someone most likely use the data in a spreadsheet to create a
chart?
A. When organizing data in rows and columns
OB. When certain data needs to be replaced or removed
C. When preparing a visual display for a presentation
D. When determining which data is the most useful

Answers

The time that someone most likely use the data in a spreadsheet to create achart is option C. When preparing a visual display for a presentation.

What is the spreadsheet about?

Creating a chart from data in a spreadsheet allows for a visual representation of the data, which can make it easier for the audience to understand and identify trends or patterns.

Charts, such as bar charts, line charts, pie charts and scatter plots, are more engaging than raw data and can be more effective in making a point or telling a story.

Therefore, the spreadsheet is a tool for organizing and manipulating data in rows and columns, and the data in a spreadsheet can be easily represented in a chart for visualizing trends and patterns.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ1

Is a string function that returns the number of characters in a string value. CONCAT LENGTH SUBSTRING UCASE

Answers

LENGTH  Is string function that returns the number of characters in a string value.

What does a string's length return?

length() function. A method that can be used with string objects is the Java String length() method. The length() method displays the total number of characters in the string.

length (): What does it mean?

length() The String class has a static function called length(). A string object's length, or the number of characters stored in an object, is returned by the length() function. Because the length of a string can be changed using different operations on an object, the String class employs this technique.

To know more about string function visit:-

https://brainly.com/question/16203207

#SPJ4

prina is a database manager. prina is allowed to add new users to the database, remove current users and create new usage functions for the users. prina is not allowed to read the data in the fields of the database itself. this is an example of: (d3, l3.3.1)

Answers

Prina is not allowed to read the data in the fields of the database itself. this is an example of role-based access controls (RBAC).

What is role-based access control?

Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system. It is a method for implementing either mandatory or optional access controls. The method of limiting network access based on the responsibilities of certain users within a business is known as role-based access control (RBAC).

Employees cannot access information that does not concern them since RBAC ensures that they only have access to the data necessary to do their duties. The permissions required to carry out specific duties within an organization are often reflected by role permissions, which may be passed down through a role hierarchy.

To learn more about access controls, visit:

https://brainly.com/question/14014672

#SPJ4

To use a single image to access multiple target, you must set up ____ within the image.
a) hotspots
b) links
c) icons
d) alt tags

Answers

The correct answer is c) icons To use a single image to access multiple target.

An icon in today's context is a picture on a computer screen that stands in for a programme, a feature, or another idea or distinct entity that has value for the user. A typeface that only includes icon glyphs—not alphanumeric glyphs—is called an icon font. Examples include Material Symbols, a variable typeface that enables fine-tuning via variable axes, and Material Icons, both of which are icon fonts. a visual representation of an application, an item (like a file), or a function (like the save command) on a computer display screen: a symbol or word (for example) whose shape communicates its meaning. archaic: a depiction that is often visual.

To learn more about icons click the link below:

brainly.com/question/14593142

#SPJ4

The ____ suite was not created by a standards-making organization but by a group of computer scientists.
a.OSI model
c.OSI model
b.FTP protocol
d.TCP/IP protocol

Answers

The ​TCP/IP protocol suite suite was not created by a standards-making organization but by a group of computer scientists.

Are the machines that house shared and private user files as well as network software?

Computers known as servers house the network operating system, shared files, and programs.All network users have access to the network's resources through servers.

Which of the subsequent is utilized to link your computer to other computers Mcq?

Notes:Patch cable is another name for straight-through cable.Computers as well as other end customer devices are connected to networking hubs and switches via straight-through wire.

To know more about TCP/IP protocol visit:

https://brainly.com/question/30114641

#SPJ4

one major problem affecting supply chains are ripple effects referred to as the ________ effect.

Answers

one major problem affecting supply chains are ripple effects referred to as the multiplier effect.

Which one of the above is a significant issue that might have an impact on supply chains?

The multiplier effect, often known as ripple effects, is a significant issue that affects supply networks.The collaboration of suppliers, the manufacturing of goods and services, and distribution are all improved by supply chain management.

What is the ripple effect of distorted product demand information?

From one end of the a supply chain from the other, distorted information can cause significant inefficiencies, including unnecessary inventory investment, subpar customer service, lost sales, incorrect capacity planning, inefficient transportation, and missing production schedules.

To know more about multiplier effect visit:

https://brainly.com/question/1412014

#SPJ4

Question 1 a junior data analyst is seeking out new experiences in order to gain knowledge. They watch videos and read articles about data analytics. They ask experts questions. Which analytical skill are they using?.

Answers

The junior data analyst is using the skill of self-directed learning. They are actively seeking out new experiences, such as watching videos and reading articles, to gain knowledge and improve their skills in data analytics.

Asking questions of experts is also a good way to learn, as it allows the analyst to gain insights and perspectives from people who have more experience in the field. This skill is important for a data analyst because the field is constantly evolving and new tools and techniques are being developed all the time. Being able to teach themselves new skills will help the analyst stay current and be able to handle new challenges that may arise in their work.

Learn more about analytical skill here, https://brainly.com/question/1086200

#SPJ4

Other Questions
What do the children think of the story their aunt tells them? Explain why 81 3/4 equals 27 How to write the Princeton University supplement 2021-2022? What are the 3 internal factors? A/An ___ is a blood clot attached to the interior wall of a vein or artery.a. thrombusb. embolismc. embolusd. thrombosis Fill in the missing digits to complete the division problem. What is the best situation that describes the concept of value in relation to the restaurant guest experience? which cannot be probabilities:square root of 2, 0, -53, .08, 5/3, 3/5, 1.31 What is Claudius's reaction to the performance of the play within the play in Act 3 Scene 2? PLEASE HELP ME!! Why is the author's reasoning logical in support of his claim about adults trying to take credit for things they have not yet accomplished in "The Fish I Didn't Catch"?It is supported by the author's observations regarding people's behavior.It is supported by a proverb the author's father used to quote.It is supported by the author's experiences with his own son.It is supported by the author's adult fishing experiences. Garlic K recen LAKERS W3SWhat bird is that and does it lay egg, is it a broundy hen cause i been saerching up for 32 min why does my hen doest lay on her egg. is submerged to a depth of 220 m in the ocean. The surface temperature is 25oC, and the temperature 220 m down is 5.0oC. The density of seawater is 1025 kg/m3. How high does the seawater rise in the bell when it is submerged Es aconsejable que _________ ensaladas. a. preparaste b. preparo c. preparamos d. preparemos What is the definition of atmospheric perspective ? Which transition would be best for bridging the two sentences below?There are many things you can do to improve your reading skills. ________, you can reread a text multiple times to build fluency and comprehension. For instance However On the other hand Similarly What type of government was used in the Persian Empire?A. Religious Oligarchy B. Republic C. Imperial BureaucracyD. Democracy I chose A but I'm not really sure. Can you explain it too if you can? :)) HELP ASAP!!! This is a geometry problem I need help with!! If the simple interest on $250 for 5 years in $43.75, find the rate in per annum. Despus de unir todos los ingredientes, ______________ (poner) la masa sobre una superficie lisa con harina y ________________ (seguir) trabajando la masa. El objetivo es conseguir una masa elstica. Muy importante: no se nos tiene que quedar pegada entre las manos, ni a la superficie. Si es necesario, ____________ (aadir) harina poco a poco, pero con cuidado, porque no ________________ (poder) permitir dejar la masa demasiado seca, sino ms bien espumosa. invented in 1974 as a model to teach 3-d problems, it became one of the bestselling toys of all time