The correct steps which are used to make a research are as follows:
Choose a topicFind out what problem needs to be fixed about the topicWrite your research questionsMake use of reputable sourcesWrite out your conclusionsWhat is a Research?This refers to the systematic study of a particular thing or phenomena to find out why it occurs and why it occurs the way it does and the frequency of occurrence.
With this in mind, we can see that making a research requires meticulous steps and some sources for research should not be considered because they are not reputable and this can include; individual blogs, social media, etc.
Read more about research here:
https://brainly.com/question/968894
Answer:
sorry i know this is late, but hopefully it will help someone else!
have a lovely day <3
Which of the following commands CANNOT be found on the Page Design tab? Question 2 options: Insert a text box Delete a page Change page orientation Specify a color scheme.
Answer:
The answer is, Insert A Text Box.Hope this helps.
The command "Delete a page" cannot be found on the Page Design tab. The correct option is B.
What is command?An instruction or collection of instructions issued to a computer or software program is referred to as a command in computing.
The Page Design tab does not contain the "Delete a page" command.
All of the additional instructions mentioned in the query can be discovered on the Page Design tab or other relevant tabs in different word processing or desktop publishing programs.
A frequently used tool for adding more text or graphic elements to a page is "Insert a text box," "Change page orientation" is frequently used to switch between portrait and landscape mode.
Also the "Specify a color scheme" might let users select from predefined color schemes for the text, background, and other elements.
Thus, the correct option is B.
For more details regarding command, visit:
https://brainly.com/question/3632568
#SPJ6
Can someone please help me answer this question.
1. Select the correct answer. What is a digital portfolio?
A. a summary of your portfolio.
B. a presentation of your portfolio
C. a representation of your work
D. a preview of your most important work
2. Hadoop is a popular framework used for storing and processing big data. Which programming language was used while building this framework?
Hadoop is a popular_____ based framework used for storing and processing big data.
Answer:
1. C. or D.
2. Hadoop is a popular Java-based framework used for storing and processing big data.
Explanation:
For number 1 I think it's C because:
A digital portfolio is an online collection of work that represents your abilities and skills as a professional in your field. I could be D aswell!
Hope you do well!
Which call of the function correctly follows the instructions laid out in the api?.
Answer:
MoveElement("button1", "down", 25); This function finds the minimum number in a list.
Explanation:
Hope this helps
10. Version control is a way to store code files with a detailed history of every modification to that code. True or False
This is for computer programming, I’m having a really hard time in this class and I need some help with this question. Any incorrect or spam answers will be reported. Thanks in advance!
Answer:
true
Explanation:
I hope this helps
what is live ware in relation to computer
Answer:
It is a slang term used to denote people using (attached to) computers.
the bookstore sold 8 books for $66 at that rate how much was one book
A monitor is an output device. Which of the following is not a type of monitor? *
Light Emitting Diodes
Cathode Ray Tube
Laser Crystal Diodes
Answer:
cathode ray tube is the correct answer
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system
How do i copy a canvas course from old class to new course.
Answer:
Open Settings. In Course Navigation, click the Settings link.Copy Course Content. Click the Copy this Course link.Create Course Details. ...Select Migration Content. ...Adjust Events and Due Dates. ...Create Course.
Explanation:
Follow The Steps
That's it
who made the game Monopoly???
Answer:Lizzie Magie, Charles Darrow
Explanation:
An IP address specifically belongs to:
Answer: An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.
Explanation:
A coworker is taking a computer overseas and asks you what concerns he should have. What do you tell him
Answer:
The components within the computer can get damage during travel, so he could improve the box protection with foam thingies
Explanation:
How to check if students viewed an assignment canvas.
HELPPP! MARK YOU THE BRAINLIEST!
Write one smart goal It has to be realistic ?
Background information The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound Defining these parameters as they pertain to your goal helps ensure that your objectives are attainable within a certain time frame.
Answer:
My goal is to have good grades because I failing now and I want to try and try to get my grade up
Explanation:
Microsoft cerrar sesion how to change it to english.
Pls help i need all of it today ill make you brainiest
In the text "my friend Walt Whitman" by Mary Oliver
1. Infer oliver does not directly state her purpose for writing. It is up to you to infer it based on details in the text. What is the main purpose for writing?Cite text evidence in your response
2. Evaluate how do the quotations from Whitman create an organization design for the essay? How does this organizational design support Oliver’s ideas?
3. Analyze how does Oliver support in the idea that Whitman was her friend? Cite evidence from the text in your response
The inference shows that the main purpose of writing the essay was to describe the benefits she got from getting to know Whitman.
What is an inference?An inference simply means the conclusion that can be deduced based on the information presented in a literary work.
In this case, the main purpose of writing the essay was to describe the benefits she got from getting to know Whitman through his work.
Furthermore, the organizational design supports the idea of Oliver as she's trying to insinuate her writings and thoughts by Whitman's work.
Oliver supported the idea that Whitman was her friend as she was into Whitman's books that she spent most of her mornings reading them. She succored the idea that he was her friend through his poems.
Learn more about inference on:
https://brainly.com/question/24729498
This is the tendency for items at the beginning of a list to be recalled more easily than other item:
A.) recency effect
B.)primacy effect
C.) butterfly effect
Answer:
B. Primacy effect
Explanation:
:3 have a wonderful day hope this helps
Answer:
B. Primacy effect
Explanation:
True/False: Before a computer can execute a program written in a high level language, such as C , it must be translated into object code. True False
Answer:
True
Explanation:
During a slide show, Luis wants a picture to appear on one of his slides after the slide appears on the screen. Which type of animation should he use
The type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.
What is an Entrance Animation?An entrance animation is an effect that controls how an object appears on a slide, starting at the start point of the object.
For example, using the entrance animation, Luis can make the object move slowly into the slide using a float-in effect.
Thus, the type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.
Learn more about entrance animation on:
https://brainly.com/question/20082198
Why are my texts green when texting another iphone.
Answer:
The green message background indicates the traditional SMS text message. It actually means a message that you have sent to someone else is through SMS message service instead of Apple iMessage
:
How can you quickly locate emails with large attachments.
To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.
Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.
How do I find emails by attachment size?This can also be done for messages that has a size equal to or bigger than 25.
One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.
Learn more about attachments from
https://brainly.com/question/978078
A row-level trigger requires use of the _____ keywords and is executed once for each row affected by the triggering statement.
Answer:
FOR EACH ROW
--
Hope this Helps!
A row-level trigger requires use of the FOR EACH ROW keywords keywords and is executed once for each row affected by the triggering statement.
What is a row-level trigger?Every row in the transaction has a row-level trigger that runs once. Triggers at the normalized only run once per transaction. used solely for data monitoring. used to enforce all extra security on transactions at the tabletop.
The FOR EACH ROW keywords must be used with a row-level trigger. Each row impacted by the trigger statement receives a single execution of this kind of trigger. A named group of SQL procedural instructions is known as a stored procedure.
Regardless of if the rows are changed by the add, updated, or removal event, a line trigger only fires once per trigger event. For each row impacted by the traumatic incident, a row trigger fires once. The trigger doesn't fire if none of the row are affected.
Learn more about row-level trigger, Here:
https://brainly.com/question/6850610
#SPJ12
I need to code a simple racing game in c++. Help, please.
when was the first computer built..
Answer:
1822 but it was a medical computer. not the same as computers today
Explanation:
The first computer was invented in 1822 but was built in 1991. It was invented by Charles Babbage.
Hope this helps!
Which of the following is NOT a responsibility of an IT project manager?
A.
writing code
B.
managing the budget
C.
managing the schedule of the project
D.
assigning work to team members
Answer:
I think that The answer is A.
Explanation:
A project manager needs to be a leader which is assigning work, managing the schedule, and manage the budget.
In the name, it says Manager.
This is how I know that.
The one that is not a responsibility of an IT project manager is writing code. The correct option is A.
What is IT project manager?The unique IT objectives of enterprises must be planned, organized, resourced, budgeted, and successfully carried out by IT project managers. Examples of such initiatives include the creation of apps and software.
One of the most difficult occupations is project management since no day is ever the same and you must use all of your project management abilities to address every issue.
Additionally, when an issue arises, your team will turn to you first. They might assume you have all the solutions to their questions. A project manager must be a leader who manages the budget, schedule, and job assignments.
Therefore, the correct option is A. writing code.
To learn more about IT project managers, refer to the link:
https://brainly.com/question/15404120
#SPJ2
A technology specialist is investigating a computer infected with malware. The investigator discovers that a data leak, which reveals the religious and political beliefs of a high-profile executive, results from the malware. Which data type did the malware compromise
The data type that was compromised by the malware is personally identifiable information (PII).
What is a PII?PII is an acronym for personally identifiable information and it can be defined as a type of information (data type) that can be used by business firms (companies) on its own or with other relevant data, so as to identify a specific individual.
The examples of PII.Some examples of personally identifiable information (PII) include the following:
Social Security numbersEmail addressHome address.Full nameReligious and political beliefs.In conclusion, the data type that was compromised by the malware is personally identifiable information (PII).
Read more on PII here: https://brainly.com/question/24439144
Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing, and classifying data.
Data protection policy is important because it establishes an organization's rules for acquiring, standardizing and disseminating data.
What is Data protection policy?These are policies adopted by organizations that help to ensure data is adequately protected.
When data isn't protected , it could get to the hands of criminals which could use it for different types of cybercrime and also to ensure compliance with data protection laws in the country.
Read more about Data protection policy here https://brainly.com/question/26493645
What are two advantages and disadvantages of using computer software?
Answer:
Advantages:
Multitasking
Multitasking is one among the main advantage of computer. Person can do multiple task, multiple operation at a same time, calculate numerical problems within few seconds. Computer can perform millions or trillions of work in one second.
Speed –
Speed –Now computer isn’t just a calculating device. Now a day’s computer has vital role in human life. One of the most advantages of computer is its incredible speed, which helps human to finish their task in few seconds.
Disadvantages:
Virus and hacking attacks –
Virus and hacking attacks –Virus may be a worm and hacking is just an unauthorized access over computer for a few illicit purpose. Virus can go to other system from email attachment, viewing an infected website advertisement, through removable device like USB etc.
Online Cyber Crimes –
Online Cyber Crimes –Online cyber-crime means computer and network may have utilized in order to commit crime. Cyberstalking and fraud are the points which comes under online cyber-crimes.
Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This environment will probably only be required for 2 months. Which types of instances would you use for this purpose
The type of instances would you use for this purpose is known as On-Demand.
What is an on demand instance?On-Demand Instances is known to be one that allows a person to pay for compute capacity usually by the hour or second with no long-term payment.
This is one that gives one a level of freedom from the costs and complexities of planning, purchasing, and keeping hardware.
Learn more about cloud from
https://brainly.com/question/25130975
Portable devices have a software-controlled switch that disables all wireless functionality. What is the name of this software-controlled switch?.