Which option determines the number of pages, words, and characters in a
document?
View Print Layout
File > Properties
Tools > AutoCorrect
Tools Word Count

Answers

Answer 1

View>print layout because it just makes sense


Related Questions

A high school has 1000 students and 1000 lockers, one locker for each student. On the first day of school, the principal plays the following game: She asks the first student to go and open all the lockers. She then asks the second student to go and close all the even-numbered lockers. The third student is asked to check every third locker. If it is open, the student closes it; if it is closed, the student opens it. The fourth student is asked to check every fourth locker. If it is open, the student closes it; if it is closed, the student opens it. The remaining students continue this game. In general, the nth student checks every nth locker. If the locker is open, the student closes it; if it is closed, the student opens it. After all the students have taken their turn, some of the lockers are open and some are closed. Write a C++ program that prompts the user to enter the number of lockers in a school. After the game is over, the program outputs the number of lockers that are opened.

Answers

#include <bits/stdc++.h>

static int counter=0;

int check_locker(int num) {

 //Pass the first student. All lockers are open.

 std::vector<int> lockers(num,1);

 //Second student. Close the even locker(s).

 for(int i=1;i<=lockers.size();i++) {

   if(i%2==0) {

     lockers.at(i-1)=0;

   } else {

     ;;

   }

 }

 //Each n. student will check.

 for(int j=3; j<=lockers.size();j++) {

   for(int m=j; m<=lockers.size();m+=j) {

     if(lockers.at(m-1)==1) lockers.at(m-1)=0;

     else lockers.at(m-1) = 1;

   }

 }

 //Count 1's

 for(auto& c:lockers) {

   if(c==1) counter++;

   else ;;

 }

 /*For debug purposes, if you want to print the locker's status, activate!

   for(auto& p:lockers) {

   std::cout << p << " ";

 }

 

 */

 return counter;

}

int main(int argc, char* argv[]) {

 //Get the amount of lockers from user.

 std::cout << "How many lockers does the school have?: ";

 int idx; std::cin>>idx;

 //Waiting..

 std::cout << "Evaluating..\n";

 std::this_thread::sleep_for(std::chrono::milliseconds(1000));

 //Send data into check_locker()

 std::cout << "There is/are " << check_locker(idx) << " open locker(s)." << std::endl;

 return 0;

}

word feature that allows you to copy all the format settings applied to selected text to the other text that you want to format in a similar way is called

Answers

Select the full paragraph, such as the paragraph mark, if you wish to duplicate the text and paragraph formatting. Within the Clipboard group is Format Painter. In the Clipboard group of the Message tab, select Format Painter. Format Painter stands alone.

What is Format Painter?
Use Format Painter to swiftly apply the same formatting to numerous pieces of text or pictures, such as colour, font style and size, and border style. Think of it as pasting and copying for formatting. With format painter, you may copy all of the formatting from one object then apply it to another. Character and paragraph formats can be copied and pasted into text using the Format Painter tool. The Format Painter tool is located on the Home tab of a Microsoft Word Ribbon and can be used in conjunction with styles to organise and reformat documents more quickly and easily. Format Painter can be found in earlier versions of Microsoft Word on the toolbar above the menu bar at the top of the programme window.

To learn more about format painter
https://brainly.com/question/10869688
#SPJ4

Summary
In this lab, you add a loop and the statements that make up the loop body to a C++ program that is provided. When completed, the program should calculate two totals: the number of left-handed people and the number of right-handed people in your class. Your loop should execute until the user enters the character X instead of L for left-handed or R for right-handed.

The inputs for this program are as follows: R, R, R, L, L, L, R, L, R, R, L, X

Variables have been declared for you, and the input and output statements have been written.

Instructions
Ensure the source code file named LeftOrRight.cpp is open in the code editor.

Write a loop and a loop body that allows you to calculate a total of left-handed and right-handed people in your class.

Execute the program by clicking the Run button and using the data listed above and verify that the output is correct.

Answers

The loop on the statement regarding the program is illustrated below.

How to illustrate the loop?

A loop is used to repeatedly execute a specific block of code. For loops and while loops are the two major forms of loops.

A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.

This will be:

// LeftOrRight.cpp - This program calculates the total number of

//left-handed and right-handed

// students in a class.

// Input: L for left-handed; R for right handed; X to quit.

// Output: Prints the number of left-handed students

//and the number of right-handed students.

#include <iostream>

#include <string>

using namespace std;

int main()

{

// L or R for one student.

string leftOrRight = "";

// Number of right-handed students.

int rightTotal = 0;

// Number of left-handed students.

int leftTotal = 0;

// This is the work done in the housekeeping() function

cout << "Enter an L if you are left-handed, a R if you are right-handed or X to quit: ";

cin >> leftOrRight;

//Use while loop repeat the loop until X is found

while (leftOrRight != "X")

{

//if the above input is R increment

//rightTotal by 1

if (leftOrRight == "R")

rightTotal++;

//if the above input is L increment

//leftTotal by 1

else if (leftOrRight == "L")

leftTotal++;

//read the move again

cin >> leftOrRight;

}

// This is the work done in the detailLoop() function

// Write your loop here.

// This is the work done in the endOfJob() function

// Output number of left or right-handed students.

cout << "Number of left-handed students: " << leftTotal << endl;

cout << "Number of right-handed students: " << rightTotal << endl;

return 0;

}

Learn more about loop on:

https://brainly.com/question/16922594

#SPJ1

if you're connected to a switch and your nic is in promiscuous mode, what traffic would you be able to capture? check all that apply.

Answers

If one is connected to a switch and the NIC is in promiscuous mode, the traffic that one would be able to capture are:
"packets transmitted to your switch port, which means traffic to or from your computer or broadcast packets. This is because one is connected to a switch.

What is a promiscuous mode in Networking?

"Promiscuous mode" is a mode of operation as well as a security, monitoring, and management strategy in computer networking. In promiscuous mode, a network device, such as an adapter on a host system, can intercept and read each network packet that comes in its entirety.

Promiscuous mode on a network permits a network device to intercept and read each network packet that comes in its entirety. Promiscuous mode is a mode of operation in an Ethernet local area network (LAN) in which every data packet delivered can be received and read by a network device.

You can use any of the following commands to put an interface into idle mode, the latest way is to use the "ip" command. Use the ifconfig command to determine if the NIC is set to promiscuous mode.

Learn more about Switches:
https://brainly.com/question/1147908
#SPJ1

Read an integer value representing a year. Determines if the year is a leap year. Prompts the user to enter another year or quit.

A year is a leap year if −

1. It is evenly divisible by 100
2. If it is divisible by 100, then it should also be divisible by 400
3. Except this, all other years evenly divisible by 4 are leap years.

sample run:
Enter a year (0 to quit): 2024
2024 is a leap year

Enter a year (0 to quit): 1997
1997 is not a leap year

Enter a year (0 to quit):

Answers

The code to verify if an year is a leap year is developed throughout this answer.

Code to verify if the year is a leap year

We are going to develop a C code, hence first we declare the main function, as follows:

int main(){

return 0;

}

Then, we declare the integer variable to store the year, as follows:

int main(){

int year;

return 0;

}

Then the year is read in a loop, until the year read is different of 0.

int main(){

int year;

do{

printf("Enter a year (0 to quit):\n");

scanf("%d", & year);

}while(year != 0);

return 0;

}

Then conditional clauses are inserted to verify if the year number is an acceptable input (non-negative number), and if it is a leap year.

do{

printf("Enter a year (0 to quit):\n");

scanf("%d", & year);

if(year > 0){

//Calculates the remainder of the division by 4.

if(year % 4 == 0){

//If divisible by 4 but not by 100, it is a leap year.

if(year % 100 != 0){

printf("%d is a leap year\n", year);

}

//If divisible by 100, it is only a leap year if divisible by 400 also

else{

if(year%400 == 0){

printf("%d is a leap year\n", year);

}

else{

printf("%d is not a leap year\n", year);

}

}

}

//If not divisible by 4, then it is a not leap year

else{

printf("%d is not a leap year\n", year);

}

}

}while(year != 0);

return 0;

}

Learn more about leap years at https://brainly.com/question/24224214

#SPJ1

Test if a number grade is an F (less than or equal to 65). If so, print "That’s not good.". (Python)


Hint: Grades may be decimals.


Sample Run

Enter a Number: 60


Sample Output

That's not good.

Answers

Answer:

grade = float(input(Enter a number grade: "))

if grade <= 65:

     print("That's not good")

Explanation:

Answer:

grade=float(input("Enter a number grade:"))

if grade<=65:

    print("That's not good.")

Explanation:

I got a 100% on the question. The first answer had a few mistakes in it.

Sincerely,

         Dangerous Gem

Discuss in brief the major of components of computer network?

Answers

The major components required to install software are computer network components. NIC, switch, cable, hub, router, and modem are all important network components. Some network components can be removed depending on the type of network that needs to be installed. A wireless network, for example, does not require a cable.

The following are the major components needed to set up a network:

1)NIC: NIC is an abbreviation for network interface card. A network interface card (NIC) is a piece of hardware that connects one computer to another on a network. It has a transfer rate range of 10,100 to 1000 Mb/s.

2)Hub: A hub is a piece of hardware that divides a network connection among multiple devices. When a computer requests information from a network, it first sends the request via cable to the Hub. This request will be broadcast to the entire network by Hub.

3)Switch:A switch is a piece of hardware that connects multiple devices on a computer network. A Switch has more sophisticated features than a Hub.

4)Router: A router is a piece of hardware that connects a local area network (LAN) to the internet. It receives, analyses, and forwards incoming packets to another network. A router operates on the OSI Reference Model's Layer 3. A router routes a packet based on the information in the routing table.

5)Modem: A modem is a piece of hardware that allows a computer to connect to the internet via an existing telephone line. A modem is not built into the motherboard; rather, it is installed in a PCI slot on the motherboard.

6)Cables: A cable is a type of signal transmission medium.

What is computer network?

A computer network is a group of computers that share resources on or provided by network nodes.

To learn more about computer network

https://brainly.com/question/1167985

#SPJ9

> sata 6 gb/s transfer rate > 1 tb capacity > minimizes noise to levels near the threshold of human hearing > 3.5-inch 7,200 rpm > 32 mb buffer size 1. which sata version is being used?

Answers

SATA III (6 Gbs/600 MBs) version of sata is being used.

What is SATA?

Serial ATA (SATA) is a computer bus interface that connects host bus adapters to mass storage devices such as hard disc drives, optical drives, and solid-state drives. Serial ATA surpassed the older Parallel ATA (PATA) standard to become the main storage interface.

SATA III, or SATA 6Gb/s, is the most recent generation of SATA. The SATA III interface operates at 6Gb/s, with a bandwidth throughput of 600MB/s. Each SATA version is backwards compatible with previous versions. However, when relying on backwards compatibility, the data transfer rate may be slower than planned due to power constraints and port speed limitations.

To learn more about SATA

https://brainly.com/question/4555139

#SPJ4

Jordan is a 3D modeler using three circle made from edges—one large, one medium, and one small circle—and lines them up in front of one another from largest to smallest. Then Jordan fills the space between the edges of the circles with faces, making a telescope-looking cylinder. What type of modeling is Jordan using?

Question 7 options:

Digital Sculpting


Polygonal Edge Modeling


NURBS Modeling


Procedural Modeling

Answers

Since Jordan is a 3D modeler using three circle made from edges—one large, one medium, and one small circle—and lines them up in front of one another from largest to smallest.  The type of modeling is Jordan using is option B: Polygonal Edge Modeling.

What is a polygon 3D modeling?

Polygonal modeling is a technique used in 3D computer graphics to represent or approximate an object's surface using polygon meshes. For real-time computer graphics, polygonal modeling is the preferred technique since it is ideally suited to scanline rendering.

A 3D model's fundamental geometric elements are polygons. The polygon's vertices and edges are all straight. The created plane is known as a face and is typically a "triangular polygon," a geometric object with three sides. There are additionally "quads" and "n-gones" with four sides and several vertices.

Note that We build a polygon around each hole to identify an area of influence for that hole using the polygon method, an established and time-tested technique based on a straightforward geometric algorithm.

Learn more about Edge Modeling from

https://brainly.com/question/2141160

#SPJ1

1_>circle 2_>retangle 3->triangle 4_>square 5_>trapezoid 6_>parallelogram enter the figure code 2 enter the breadth and length​

Answers

# define a function for calculating

# the area of a shapes

def calculate_area(name):

 

 # converting all characters

 # into lower cases

 name = name.lower()

 

 # check for the conditions

 if name == "rectangle":

   l = int(input("Enter rectangle's length: "))

   b = int(input("Enter rectangle's breadth: "))

   

   # calculate area of rectangle

   rec area = l * b

   print(f"The area of rectangle is: rec area")

 

 elif name == "square":

   s = int(input("Enter square's side length: "))

     

   #calculate area of square

   sqt_area = s * s

   print(f"The area of square is

         {sqt_area}.")

 elif name == "triangle":

   h = int(input("Enter triangle's height length: "))

   b = int(input("Enter triangle's breadth length: "))

     

   # calculate area of triangle

   tri_area = 0.5 * b * h

   print(f"The area of triangle is

         {tri_area}.")

 elif name == "circle":

   r = int(input("Enter circle's radius length: "))

   pi = 3.14

       

   # calculate area of circle

   circ_area = pi * r * r

   print(f"The area of circle is

         {circ_area}.")

       

 elif name == 'parallelogram':

   b = int(input("Enter parallelogram's base length: "))

   h = int(input("Enter parallelogram's height length: "))

   

   # calculate area of parallelogram

   para_area = b * h

   print(f"The area of parallelogram is

         {para_area}.")

   

 else:

   print("Sorry! This shape is not available")

# driver code

if __name__ == "__main__" :

 

 print("Calculate Shape Area")

 shape_name = input("Enter the name of shape whose area you want to find: ")

 

 # function calling

 calculate_area(shape_name)

Output:

Calculate Shape Area

Enter the name of shape whose area you want to find: rectangle

Enter rectangle's length: 20

Enter rectangle's breadth: 15

The area of rectangle is 300.

What is code?

In computing, source code, is any collection of code, with or without comments, written in a human-readable programming language. The source code of a programme is specially designed to aid the work of computer programmers, who write source code to specify the actions to be performed by a computer.

To learn more about code

https://brainly.com/question/26134656

#SPJ9

1.Create a new password
1-Develop an algorithm using pseudocode and a flowchart that asks the user to
create a new password.
The algorithm should:
• get the user to enter a password
● get the user to re-enter the password
• repeat the two bullet points above until both entered passwords are
identical
output "password created" when they are identical

Answers

The algorithm of the question will be:

1. Start

2. get the user to enter a password

3. get the user to re-enter the password

4. if the passwords are not identical, repeat steps 1 and 2

5. output "password created" when the passwords are identical.

6. End

Algorithm:

An algorithm in computer science is a finite sequence of strict instructions that is often used to solve a class of specialised problems or to execute a computation. Algorithms serve as specifications for calculating and processing data. Advanced algorithms can execute automated deductions and apply mathematical and logical tests to direct code execution through several paths.

To learn more about algorithm

https://brainly.com/question/24953880

#SPJ13

Which menu option allows you to change the display to close-up, single, or multiple pages?

Question 3 options:

Insert


Edit


View


File

Answers

The menu option that allows you to change the display to close-up, single, or multiple pages is view. The correct option is C.

What is menu option?

A menu is a set of options presented to a computer application user to assist them in finding information or performing a function.

Menus are common in graphical user interfaces (GUIs) provided by operating systems such as Windows and MacOS. They're also used in speech recognition and on websites and web pages on the internet.

The View menu, located at the top of the screen, contains the following commands: Sheets: Upon selection, a cascade menu appears, displaying a list of all sheets used in the document, sorted from left to right.

View is the menu option that allows you to switch between close-up, single, and multiple page displays.

Thus, the correct option is C.

For more details regarding menu option, visit:

https://brainly.com/question/3507017

#SPJ1

Write an HLA Assembly language program that prompts for two specific int8 values named start and stop and then displays a repeated digit pattern starting with that number. The repeated digit pattern should show all the numbers beginning with the start value and then adding 1, 2, 3, 4, ... to this value until you hit a number greater than the stop value. Shown below is a sample program dialogue.

Answers

Using the knowledge of computational language in python it is possible to write a code that prompts for two specific int8 values named start and stop and then displays a repeated digit pattern starting with that number.

Writting the code:

  start:

mov   al, start

add   al, '0'

mov   ah, 0eh

int   10h

 

stop:

mov   al, stop

add   al, '0'

mov   ah, 0eh

int   10h

 

prompt:

mov   dx, offset start

mov   ah, 09h

int   21h

 

mov   dx, offset stop

mov   ah, 09h

int   21h

 

mov   dx, offset pattern

mov   ah, 09h

int   21h

 

;display start

mov   al, start

add   al, '0'

mov   ah, 0eh

int   10h

 

;display stop

mov   al, stop

add   al, '0'

mov   ah, 0eh

int   10h

 

;display pattern

mov   dx, offset pattern

mov   ah, 09h

int   21h

 

;get input

mov   ah, 01h

int   21h

 

cmp   al, start

je    start

cmp   al, stop

je    stop

cmp   al, 0ffh

je    done

jmp   prompt

 

done:

mov   ah, 4ch

int   21h

 

start   db   'start: ', 0

stop    db   'stop: ', 0

prompt  db   'prompt: ', 0

pattern db   'Here's your answer: ', 0

end start

See more about HLA Assembly language at brainly.com/question/13034479

#SPJ1

Which of the following statements are true about routers and routing on the Internet.

a. Protocols ensure that a single path between two computers is established before sending packets over it.
b. Routers are hierarchical and the ""root"" router is responsible for communicating to sub-routers the best paths for them to route internet traffic.
c. A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or ""dropped"".
d. Routers act independently and route packets as they see fit.

Answers

A packer traveling between two computers will always have two router’s. The original one that the information is sent from and the one that received it to be able to communicate with. Answer C.

A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or ""dropped"" is the statements are true about routers and routing on the Internet. Hence, option C is correct.

What is routers?

A router can connect one or more packet-switched networks or subnetworks. It controls traffic between several networks and enables multiple devices to share an Internet connection by transmitting data packets to their intended IP addresses.

In addition to VPN routers, wired, wireless, core, and edge routers are also included.

In order to transfer data between two or more packet-switched computer networks, a router—either real or virtual—is used. A router looks at the destination's Internet Protocol address and chooses the best route for the data packet to take in order to get there.

Thus, option C is correct.

For more information about routers, click here:

https://brainly.com/question/15851772

#SPJ12

Given the array, var a = [20, 40, 60, 80, 100], which line of code accesses the value 40?

Answers

Answer:

1

0 = 20

1=40

2=60

3=80

4=100

etc..

Ali receives an email from a person posing as a bank agent, who asks Ali to share his bank account credentials. Which type of network attack does this scenario indicate?
The network attack in this scenario is . This attack can occur .

Answers

Phishing is the type of network attack which this scenario indicates. This type of attack can take place via electronic messages.

What is network attack?

Network attacks are illegal activities on digital assets within an organization's network. Malicious parties typically use network assaults to change, destroy, or steal private data. Network attackers typically target network perimeters in order to obtain access to interior systems. In a network attack, attackers aim to breach the business network perimeter and obtain access to internal systems. Once inside, attackers frequently combine different forms of assaults, such as compromising an endpoint, propagating malware, or exploiting a weakness in a system within the network.

To learn more about network attack

https://brainly.com/question/14980437

#SPJ13

In cell A17, use the SUMIF function and structured references to display the total
membership in 2023 for groups with at least 40 members.

Answers

Since, in cell A17, use the SUMIF function and structured references to display the total membership in 2023 for groups with at least 40 members, to do so one need to use"

On cell G16, type the formula "=SUMIF(G2:G11, ">=40")".

What is the  function "SUMIF" about?

The SUMIF function is used to add numbers in a range that satisfy certain requirements. Assume, for instance, that you wish to sum only the integers larger than 5 in a column of numbers. The following formula can be used: =SUMIF(B2:B25,">5")

Therefore, In Microsoft Excel, formulas are used to produce results or assign values to cells. The equal sign must be the first symbol in the formula. The function "SUMIF" in the formula above is utilized to provide a sum of numerical values dependent on a condition.

Learn more about SUMIF function  from

https://brainly.com/question/19595606
#SPJ1

See full question below

Switch to the Academic Groups worksheet. In cell A14, use the INDEX function to display the value in the first row and first column of the AcademicGroups table.

In cell A17, use the SUMIF function to display the total membership in 2023 for groups with at least 40 members.

Functions of a DVD in computer

Answers

DVD is a digital optical disc storage format that are commonly used to store large amounts of data, such as high-quality videos and movies. A DVD-ROM drive and DVD player software are required to read and play DVDs on a computer.

What exactly is a DVD?

DVD (digital video disc) is an optical data storage technology similar to compact disc (CD). Optical data storage is a technique that stores digital information (1's and 0's) by reading the information with light.

A DVD movie is depicted in the image of the Matrix DVD movie disc. It is also where the operating system is kept. In 1995, four companies named Philips, Sony, Toshiba, and Panasonic invented and developed it. The first DVD-ROM drives that used these discs were sold in 1997.

To learn more about DVD

https://brainly.com/question/26223221

#SPJ9

Imagine that you are planning to create a website or game. Explain in 3-5 sentences what you would want to build and name five procedures and eight objects that you would want to implement into your website or game in order to make the coding more simplified. (please help, this was due yesterday)

Answers

The five procedures that you would want to implement into your website or game in order to make the coding more simplified are as follows:

Set the URL and domain name as simple as possible.Always set the email address that matches your domain name.Always update and customize your website as per the user.Design your website in such a way that it seems attractive and effective.For security and privacy purposes, always enable the password for the user.

What are the eight objects that you want for the same action?

The eight objects that you want for the same action are high-quality content, a responsive designer, sensible navigation objects, website security, customer testimonials, a good and clear descriptive profile, website visuals and notifications, etc.

If you are going to build a website, make it unique in all possible senses like user-centered, attractive, no description of nonsense information, be precise, and accurate.

To learn more about Website development, refer to the link:

https://brainly.com/question/28349078

#SPJ1

Consider the following code: x = 17 y = 3 print(x % y)

Answers

It is to be noted tha the output of the phyton code described above is "2".  See the explanation below.

What is a python Code?

Python is a general-purpose, high-level programming language. Its design concept prioritizes code readability by employing heavy indentation. Python is garbage-collected and dynamically typed. It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming.

The Python program is described as follows:

In the preceding code, two variables are defined: x and y, which have values of 17 and 5, respectively.

Variable x in this code modules variable y, which is (x%y). Modules (%) in Python or any other programming language will provide a remainder of "2."

We utilize a print function to output the computed value's value.

Python is a computer programming language commonly used to create websites and software, automate tasks, and perform data analysis. Python is an all-purpose language, which means that it can be used to create a variety of programs and is not specific to any particular problem.

Learn more about Phyton:
https://brainly.com/question/26497128
#SPJ1

Full Question:

Consider the following code: x = 17 y = 5 print (x % y)

What is the output?

6.How can an Infocion raise a complaint of sexual harassment?
a.By writing to GRB
b.Inform/consult your manager and report to the company.
c.By sending an email to your HR Business PArtner
d.Any of the above

Answers

Answer:

d. any of the above

Explanation:

remember to give me a Brainest

like ,star,comment.

why do companies use online collaborative productivity software?

Answers

Answer:

to allow easy access to colleagues for assistance

To allow easy access to colleagues for assistance is the way companies use online collaborative productivity software.

What is online collaborative?

Working together online while utilizing online tools is known as online collaboration. Employees can communicate digitally from many locations and devices by using shared online workspaces and virtual work environments, as opposed to physically gathering in an office.

Teams can communicate online thanks to software called online collaboration tools. Some examples are Trello, Asana, and Slack. These tools are created to make it simpler for remote teams to coordinate their efforts and communicate.

The following are some advantages of working together online: saving the business money and valuable resources. Increasing productivity so you can focus on the most important activities. improving communication within and between teams as well as with external parties.

Thus, To allow easy access to colleagues for assistance.

For more information about online collaborative, click here:

https://brainly.com/question/28289861

#SPJ12

if you have two folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.

Answers

if you have two folders open on your desktop and you want to move a file from one folder to the other, simply Drag and Drop the file.

What are the different ways to move or copy a file or folder?

By dragging and dropping with the mouse, using the copy and paste commands, or by utilizing keyboard shortcuts, a file or folder can be transferred or relocated to a new location.

Note that in Drag & drop, Just like you would with a file on your desktop, you can move a file or folder from one folder to another by dragging it from its present location and dropping it into the destination folder.

Learn more about copying files from

https://brainly.com/question/17019048
#SPJ1

you have used firewalls to create a demilitarized zone. you have a web server that needs to be accessible to internet users. the web server must communicate with a database server for retrieving product, customer, and order information. how should you place devices on the network to best protect the servers? (select two.)

Answers

Answer:

1. Put the database server on the private network.

2. Put the web server inside the DMZ.

kind regards

7.At a project party outside the office premises, your colleague Mr.A has had a lot to drink and is making sexual gestures and comments, at one of your other female colleagues, Mr.B who is sitting next to you.
She looks visibly upset.What should you do?
a.Ignore and let Ms.B handle the situation at hand.
b.Become a supportive bystander and intervene to stop the inappropriate behaviour, with help
from a senior staff at the pub. Subsequently, report this matter to grb mail address
c.Only Ms.B can report such a complaint.Hence, there is no action required from your end.
d.Since the incident happened at the pub, there is no need to report it further to the organization.

Answers

Answer:

b.becomr a supportive bystander and intervene to stop the inappropriate behavior with help from a senior staff at the pub.

remember to give be Brainest.

like,star and comments.

You should become a supportive bystander and intervene to stop the inappropriate behavior, with help from senior staff at the pub. Subsequently, report this matter to grab the mail address. The correct option is b.

What is sexual harassment?

Unwanted physical contact or touching. Inappropriate sexual approaches. It is forbidden to make unwanted sexual advances toward a candidate or employee.

Unwelcome sexual advances, requests for sexual favors, and other forms of verbal or physical harassment of a sexual character can all be considered harassment.

Therefore, the correct option is b. Become a supportive bystander and intervene to stop the inappropriate behavior, with help from senior staff at the pub. Subsequently, report this matter to grab mail address.

To learn more about sexual harassment, refer to the link:

https://brainly.com/question/13182824

#SPJ2

which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data?

Answers

Services for managing and storing corporate data as well as giving users the tools to analyze it.

VoIP, also known as IP telephony, enables users to place or receive phone calls through a broadband internet connection. In this regard, VoIP serves as the foundational technology for the online transmission of speech and other multimedia material. The services offered by all the software and hardware are the main emphasis of IT infrastructure. IT infrastructure is a group of company-wide services that management budgets for and consists of both technical and human resources. SaaS offers on-demand or recurring delivery of software programs through the internet. The cloud service providers host, control, and manage the software program as well as look after the supporting infrastructure.

Learn more about Services here-

https://brainly.com/question/12096912

#SPJ4

Driving is expensive. Write a program (in Python) with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles.


Output each floating-point value with two digits after the decimal point, which can be achieved as follows:

print('{:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3))

Answers

x=float(input("How many miles can your vehicle travel on 1 gallon of gasoline?: "))

y=float(input("How much does 1 gallon of gasoline cost?: "))

print('20 miles: {:.2f}$\n75 miles: {:.2f}$\n500 miles: {:.2f}$'.format((20/x)*y, (75/x)*y, (500/x)*y))

4. A piece of wire of cross-sectional area 2 mm² has a resistance of 300.Find the resistance of a wire of the same length and material if the cross-sectional area is 5 mm². the cross-sectional area of a wire of the same length and material of resistance 750.​

Answers

The resistance of a wire of the same length is 750Ω.The cross-sectional area of a wire is 5mm².

What is cross-sectional area?

The area of a two-dimensional shape obtained when a three-dimensional object, such as a cylinder, is sliced perpendicular to some defined axis at a point is known as the cross-sectional area. A cylinder's cross-section, for example, is a circle when sliced parallel to its base.

The solution of the question will be:

A= 2mm²

= 2 × 10⁻⁶m

R= 300Ω

Let, the resistance= R¹

A¹ = 5mm²

= 5 × 10⁻⁶m.

(R= lA/l)/(R¹= lA¹/l)

⇒ R/R¹ = A/A¹

⇒R¹/R = A¹/A

R¹ = A¹/A × R

    = (5×10⁻⁶/2×10⁻⁶) × 300

    = 750Ω

Let, the area be A¹¹

A¹¹ = ?, R¹¹ = 750Ω

R¹¹/R = A¹¹/A

(750/300) = (A¹¹/2 × 10⁻⁶)

⇒A¹¹ = (750/300) × (2 × 10⁻⁶)

=5 × 10⁶

=5mm²

To learn more about cross-sectional area

https://brainly.com/question/12820099

#SPJ13

PLEASE HELP
Find five secure websites. For each site, include the following:

the name of the site

a link to the site

a screenshot of the security icon for each specific site

a description of how you knew the site was secure

Use your own words and complete sentences when explaining how you knew the site was secure.

Answers

The name of the secure websites are given as follows:

wwwdotoxdotacdotuk [University of Oxford]wwwdotmitdotedu [Massachusetts Institute of Technology]wwwdotwordbankdotorg [World Bank]wwwdotifcdotorg [International Finance Corporation]wwwdotinvestopediadotorg [Investopedia]

Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.

What is Website Security?

The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.

It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.

Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.

Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.

Learn more about website security:
https://brainly.com/question/28269688
#SPJ1

Which errors need to be corrected on this bibliography page? Check all that apply.

Answers

The errors need to be corrected on this bibliography page are:

A. The page title should not be bolded and underlined.

C. The second entry needs a hanging indent.

D. The last entry needs to have a date accessed.

E. The citations should be in alphabetical order.

What is bibliography?

The sources you utilized to gather information for your report are listed in a bibliography. It appears on the final page of your report, near the finish (or last few pages).

A bibliography is a list of all the sources you utilized to research your assignment. The names of the authors are typically included in a bibliography. the names of the pieces. the names and locations of the businesses that released the sources you used for your copies. 3

The things to write on a bibliography page are:The author name.The  title of the publicationThe  date of publication.The  place of publication of a book.The  publishing company of a book.The  volume number of a magazine or printed encyclopedia.The  page number(s)

Learn more about bibliography page  from

https://brainly.com/question/27566131

#SPJ1

See options below

Which errors need to be corrected on this bibliography page? Check all that apply.

The page title, “Bibliography,” should not be in bold or underlined.

The first entry needs the author’s name.

The second entry needs a hanging indent.

The last entry needs to show the date it was accessed.

The citations should be in alphabetical order.

Answer:

What is the purpose of a bibliography or a works-cited list? Check all that apply.

to credit an author’s original idea or information

to avoid plagiarism

to organize source material

to direct readers to sources

Explanation:

Other Questions
in which situation is nitrogenase expression up-regulated? choose one: a. low nh4 and low o2 conditions b. high nh4 and high o2 conditions c. low nh4 and high o2 conditions d. high nh4 and low o2 conditions Working alone, it takes Kristen 10.2 hours to harvest a field. Kayla can harvest the same field in 16.5 hours. Find how long it would take them if they worked together. In gym class, a student can do 30 sit-ups in 60 seconds and 90 sit-ups in 180 seconds.Graph the proportional relationship. graph with x axis labeled time seconds and y axis labeled sit ups, with a line from 0 comma 0 going through 90 comma 60 graph with x axis labeled time seconds and y axis labeled sit ups, with a line from 0 comma 0 going through 120 comma 60 graph with x axis labeled time seconds and y axis labeled sit ups, with a line from 0 comma 0 going through 60 comma 50 graph with x axis labeled time seconds and y axis labeled sit ups, with a line from 0 comma 0 going through 90 comma 30 a ball on the end of a string is whirled around in a horizontal circle of radius 0.300 m. the plane of the circle is 1.40 m above the ground. the string breaks and the ball lands 1.50 m (horizontally) away from the point on the ground directly beneath the ball's location when the string breaks. find the radial acceleration of the ball during its circular motion. can you help me with discount tax tip and markup the term mare nostrum refers to the select one: a. impact of hellenism on roman society. b. legal status of roman mothers. c. roman conquest of the mediterranean world. d. alliance between rome and the rest of the italian peninsula. e. the destruction of carthage in the third punic war. Lessons of Dr. Martin Luther King, Jr. By- Cesar Chavez1. Review and Clarify With your group, reread paragraphs 45-50 ofhe refers to "economic slavery"? Do you think Chavez's use of this term is"Lessons of Dr. Martin Luther King, Jr." What does Chavez mean whenjustified based on the evidence he presents? Explain.2. Present and Discuss Now, work with your group to share other keypassages from "Lessons of Dr. Martin Luther King, Jr." What made youchoose these particular sections? Take turns presenting your choices.Discuss parts of the text that you found to be most meaningful, thequestions you asked, and the conclusions you reached as a result ofreading those passages.3. Essential Question: How can words inspire change? What have yourlearned about the power of words from reading this speech? as a penetration tester you want to get a username and password for an important server, but lockout and monitoring systems mean you'll be detected if you try brute force guessing. what techniques might directly find the credentials you need? choose all that apply. At the end of the accounting period anderson company had $4,500 in accounts receivable and $500 in its allowance for doubtful accounts account. Based on this information the net realizable value of accounts receivable is?. A labor union is a group of workers who work together to make their jobs better. True or False Maggie has $30 in an account. The interest rate is 10% compounded annually.To the nearest cent, how much will she have in 1 year?Use the formula B=p(1+r)t, where B is the balance (final amount), p is the principal (starting amount), r is the interest rate expressed as a decimal, and t is the time in years. Briefly explain how to apply the rule of subject-verb agreement in the following scenarios: Two subjects joined by and Note also the exceptions. Two subjects joined by or or nor. Subjects that are singular indefinite pronouns. Subjects and verbs separated by words that come in between (prepositional phrases). Inverted sentences. the Anderson are going on a long sailing trip during the summer however one of the sails on their sailboat ripped and they have to replace it the sail is pictured below if the sailboat sails are sale for 2$ per square foot how much will the new sail cost? What is the purpose for separating the powers of the government into three branches which transformation occurred to create the graph shown below from square root parent function? What is the value of in if the remainder of /is 2?O A. 1OB. iO C. -1 O D. -1 Change the sentence in to passive voiceThe sesonal rain in portau price causes which issues would a democratic party candidate most likely support. Which phrase best describes the translation from the graph y = 2(x-15) + 3 to the graph of y = 2(x-11) + 3?O4 units to the left4 units to the rightO 8 units to the leftO 8 units to the rightMark this and returnSave and ExitNextSubmit Can u help me in solving this worksheet