When text is used as a Hyperlink, it is usually underlined and appears as a different color.
Question 3 options:
True
False
What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
O email address
O web address
O UNC path
O All will be automatically converted.
Answer:
UNC path seems to be the answer
Answer:
UNC path
Explanation:
What is a fundamental difference between the SAP platform and the AirBnB platform?
The fundamental difference between the SAP platform and the AirBnB platform is that;
SAP is an enterprise resource planning platform and AirBnb is a collaborative platform
SAP and AirBnB SAP ERP is defined as an enterprise resource planning software developed by the German company SAP SE. Thus, it is used to assist companies with the management of business areas involving finances, logistics and human resources. Meanwhile AirBnB is collaborative platform that allows property owners to list their place as holiday accommodation in order to permit travellers to locate somewhere to stay when they are away from home and family.Read more about management tools at; https://brainly.com/question/17493537
if the Titanic sank today , in what format would people receive or read the news? Indicate your favorable from of media format you can think that is existing during this time and discuss why you chose this media format.
Answer:
It would hit MSM the soonest such as CNN, Fox , and all other news sources. The second that tge news got out, these news sources would dig in and find all information available and do a report on it
Write a program that asks for the number of units sold and computes the total cost of the purchase. Input validation: Make sure the number of units is greater than 0. Use output (stream) manipulators: 2 digits after the decimal point g
Answer:
Explanation:
The following code is written in C++, it asks the user for input on number of units sold and places it in a variable called units_sold. Then it asks for the package price and places that value in a variable called package_price. Finally it multiplies both values together into a variable called final_price and adjusts the decimals.
#include <iostream>
#include <iomanip>
using namespace std;
int main()
{
// Variables
int units_sold,
final_price;
// ask user for number of units sold
cout << "\nEnter number of units sold: ";
cin >> units_sold;
//ask for Package price
cout << "\nEnter Package Price: ";
cin >> package_price;
// Total amount before discount
final_price = units_sold * package_price;
cout << setprecision(2) << fixed;
cout << endl;
return 0;
}
You are the administrative assistant for the Psychology Department in your college, and they have assigned you to set up a small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users. For example, faculty will use the server to post and receive class assignments. Which edition of Windows Server 2016 is most appropriate for this situation?
Answer: Standard edition
Explanation:
Based on the information given in the question, the edition of Windows Server 2016 that is most appropriate for this situation will be the standard edition.
Since it's going to be fora small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users, the standard edition is appropriate.
Standard edition is ideal in a scenario whereby there's a non-virtualized environments or low density with regards to the population.
The computer scientists Richard Conway and David Gries once wrote: The absence of error messages during translation of a computer program is only a necessary and not a sufficient condition for reasonable [program] correctness. Rewrite this statement without using the words necessary or sufficient.
Answer:
A computer program is not reasonably correct if it has no error messages during translation.
Explanation:
First, we need to understand what the statement means, and we also need to identify the keywords.
The statement means that, when a program does not show up error during translation; this does not mean that the program is correct
Having said that:
We can replace some keywords as follows:
absence of error messages := no error messages
What Is the Purpose of a Web Browser? *
Answer:
This is your answer. If I'm right so,
Please mark me as brainliest. thanks!!!
As Jane was setting up her projector, she realized that the images on the screen appeared blurred. How would Jane sort out the issue by herself?
A.
check that the monitor is connected properly with the projector
B.
adjust the distance between the screen and the projector
C.
make changes in the system settings
D.
adjust the focus
User ideas for ro blox? I prefer no numbers or underscores.
do what the other person said
Assume in the for loop header, the range function has the three arguments: range (1, 10, 3), if you were to print out the value of the variable
in the for loop header, what will be printed out? List the values and separate them with a comma.
Answer:
1, 4, 7
Explanation:
The instruction in the question can be represented as:
for i in range(1,10,3):
print i
What the above code does is that:
It starts printing the value of i from 1
Increment by 3
Then stop printing at 9 (i.e.. 10 - 1)
So: The sequence is as follows
Print 1
Add 3, to give 4
Print 4
Add 3, to give 7
Print 7
Add 3, to give 10 (10 > 10 - 1).
So, it stops execution.
What is Mobile Edge Computing? Explain in tagalog.
Answer:
English: Multi-access edge computing, formerly mobile edge computing, is an ETSI-defined network architecture concept that enables cloud computing capabilities and an IT service environment at the edge of the cellular network and, more in general at the edge of any network.
Very very rough Tagalog: Ang multi-access edge computing, dating mobile edge computing, ay isang konsepto ng network architecture na tinukoy ng ETSI na nagbibigay-daan sa mga kakayahan sa cloud computing at isang IT service environment sa gilid ng cellular network at, higit sa pangkalahatan sa gilid ng anumang network.
Explanation:
Fyroff consultants, a leading software consulting firm in the United States, decides to launch an Enterprise Resource Planning (ERP) solution. The company chooses the brand name Fyroff Enterprise for the new solution. However, when the company attempts to register the domain name, it finds that a small unknown firm is already registered under the same domain name. The small firm is now attempting to sell the domain name to Fyroff. Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?
a. cybersquatting
b. logic bombing
c. cyberbullying
d. bot herding
e. cyberstalking
Answer:
The correct answer is a. cybersquatting
Explanation:
Cybersquatting is the registration of a domain name that corresponds to the denomination of a brand or name, with the main objective of obtaining some economic benefit from its sale to the owner and legitimate owner of the brand. Cybersquatting can range from making money by parking domains (buying names that are then "parked", that is, left unused but generating advertising revenue based on the visits they receive) to redirecting users to another website In order for it to get more traffic, that is, with cybersquatting it is generally intended to sell the registered domain names to the legitimate owners or interested parties, at a price well above the cost of registration or also to use the domain taking advantage of the recognition associated with the legitimate owner to obtain commercial advantages, as clients in the network.
A Multi-Node computing platform utilized to share computing resources and characterized by centralized administration. This is a ..... environment
A.Multi-Programming
B.Peer-to-peer
C.Parllel.
D.Distributed
E.Cluster.
Answer:
B
Explanation:
Multi-Node
How have newspapers and magazines adapted to digital technology? Give at least two examples.
Firstly, the newspaper is a reliable source of information as the news, critics, pictures have gone through professional journalists and editors that does not publish any unreliable information.
Secondly, in this digital age there are still old folks that are not techno-savvy and poor people that cannot afford to be connected to the society.
Hence, at this point of time, the newspaper still comes to play as it is the most affordable and alternative method from online news while still providing information for the old and poor. Thus, newspapers still have a role in my society in this digital age.
Answer:
They have adapted to digital technology by creating apps for their readers to access their content on their phones or computers.
Explanation:
I Hope this helps.
how can we achieve an effective communication with other people
____ a device receiving a process variable
Answer:
Transmitter
Maybe this is the answer or the question is wrong.
Explanation:
In the world of process control, a Transmitter is a device that converts the signal produced by a sensor into a standard instrumentation signal representing a process variable being measured and controlled.
With contention:_______.
a. computers wait until the circuit is free before they send data
b. the server or front end processor works consecutively through a list of clients to determine who should have access to the media
c. the front end processor must wait for a response from the polled client or terminal
d. one computer starts the poll and passes it to the next computer on the multipoint circuit
e. there is never a chance for collision, or two computers trying to send data at the same time
Answer:
a. computers wait until the circuit is free before they send data.
Explanation:
In Computer science, controlled access (X-ON/X-OFF) is typically the opposite of contention.
Controlled access is mainly used by computer networks that are being managed by a host mainframe computer system. X-ON is ready to receive while X-OFF isn't ready to receive.
With contention, computers wait until the circuit is free before they send data. It generally prevents collision between computer systems.
Return a formatted string with numbers The function below takes three numerical inputs: num1, num2, and num3. Implement it to return a formatted string with an underscore between the first two numbers and space, exclamation point, and another space between the second and third number. For example, if the inputs are 1, 2, and 3, then the function should return the string '1_2 ! 3'.
Answer:
In Python:
def ret_formatted(num1,num2,num3):
result = str(num1)+"_"+str(num2)+" ! "+str(num3)
return result
Explanation:
This defines the function
def ret_formatted(num1,num2,num3):
This generates the output string
result = str(num1)+"_"+str(num2)+" ! "+str(num3)
This returns the result string
return result
Write Python code to convert miles to kilometers. This does not need to be written in a Python function, but it should use the input()function. Running your code should produce a statement asking for the user to enter a number (in miles). Then it should print out a sentence of what that number is in kilometers. Use the conversion rate of 1 mile
Answer:
It can be so frustrating that the entire planet can't just agree on one system of measurement, whether it relates to measuring distances, weights, temperatures, etc (for the record...same goes for which side of the road everyone drives on). If every country used the same units of measurement, then these formulas would be useless and obsolete, but until then, it might be a good idea to understand how to convert miles to kilometers, and vice versa. If you're a Python developer, then knowing how to write the formulas in Python might be especially useful. Keep reading to see just how it's done.
Converting miles to km isn't especially difficult. To do a rough estimate of the conversion in your head, all you really need to remember is that a mile equals about 1.6 kilometers (or that a kilometer is approximately 2/3 of a mile). When trying to find the correct conversion using a formula, we must use the more precise conversion factor, which is equal to 0.62137119.
To convert miles to kilometers, the formula is very straightforward. All you need to do is divide the number of miles by the conversion factor. To see how it would look written out in Python, check out the example below:
Explanation:
Answer:
All you need to convert the Python code is TWO variables, a Outcome variable and a income variable.
Explanation:
i Hope this helps u
A resistor is found to have 3 A going through it with a voltage of 150 V. What is the resistance of the resistor?
10 points
Answer:
50 ohms
Explanation:
voltage = current * resistance, this is rearranged as
resistance = voltage / current, so if you plug in the numbers, you'll get
150/3,
resistance = 50 omhs
Computers were originally invented to
Group of answer choices
A.to share information on the Internet.
B.make complex mathematical calculations possible and make tasks easier for humans.
C.to play video games.
Answer:
B
Explanation:
It's B because why would it me made to play video games
Answer:
B
Explanation:
A, the internet didnt exist yet, so it cant be this
C, video games would require computers, so its ruled out on a similar basis as the previous
The following segment of code is meant to remove the even numbers from an ArrayList list and print the results:
int counter = 0;
while(counter < list.size())
{
if(list.get(counter) %2 == 0)
{
list.remove(counter);
}
counter++;
}
System.out.println(list.toString());
The method as written, however, is incorrect. Which ArrayList(s) list would prove that this method was written incorrectly?
I.
[1, 2, 3, 4, 5]
II.
[2, 4, 5, 6, 7]
III.
[2, 4, 6, 8, 10]
IV.
[2, 5, 6, 7, 8]
III only
II and IV
II only
I and IV
II and III
Answer:
II and III
Explanation:
I took the quiz and got this wrong, but it gives you the answer afterwards, just trying to help everyone else out.
Answer:
II and III
Explanation:
Order the steps to autofilter data
Answer:
Select the data you want to filter.
Click Data > Filter.
Click the arrow. ...
Choose specific values: Uncheck (Select All) to clear all of the check boxes, and then check the boxes for the specific value(s) you want to see.
Explanation:
1. Select the data you want to filter.
2. Click Data > Filter.
3. Click the arrow. ...
4. Choose specific values: Uncheck (Select All) to clear all of the check boxes, and then check the boxes for the specific value(s) you want to see.
Answer:
Select any cell in the data range > Click the data tab > Go to the sort & filter group > Click filter and select proper controls
Explanation:
i got it right lol :)
Bugs always seem to creep into programs and code. What strategies have you learned to find bugs more easily and crush them with a fix?
The process involves in finding bugs as well as crushing them in a debugging process is extensive and this can consist of following process;
Examination of the error symptoms
identifying the cause of it
fixing of the error.
This process is usually required a large amount of work, Although no precise procedure that is set in for fixing all error, but some useful strategies that use in reducing the debugging effort.
One of the significant part of this process is localizing of the error, which is figuring out the cause as well as the symptoms. Strategies that I have learnt in finding and fixing the error in the process of debugging includes;Incremental as well as bottom-up program development; development of the program incrementally remains one of the most effective ways that can be used in localizing the error, often testing as the piece of code is added, so with this it will be easier to find the error since any error is from the last piece of code added.And also since the last fragment of the code will be small then searching for bugs won't take much time to find and debug.Bottom-up development helps in maximizing the benefits that comes from incremental development. With bottom-up development, after successful testing of a code, it's behavior will not change once another piece is added to it, since existing code will never replied on new part so it will be easier to trace error in the new code and fix it.Instrument program can be used to log information and there can be insertion of print statements.Instrument program using assertions; Assertions can be used in checking if the program actually maintains the properties or those invariant that the code relies on, Because the program will definitely stops once the assertion fails, and there is actuality that the point where the program reached and stops is closer to the cause, as well as good indicator of how the problem looks like , then the bug can then be fixed.breakpoints can be set in the program as well as stepping and over functions, then watching program expressions, as well as inspection of the memory contents at a particular point during the execution can give the needed run-time information.Backtracking: this option works in a way whereby one will need to start from the point that the problem occurred then go back through the code to to detect the issue, then the bug can then be fixed.Binary search: this is exploration of the code by using divide and conquer approach, so that the the bug be pin down quickly.Therefore, Bugs are treat to programs and they can be dealt with using discussed methods.
Learn more at: https://brainly.com/question/15289374?referrer=searchResults
Which option should Curt use to share his calendar with other users inside his organization?
O Email Calendar
O Share Calendar
O Publish Online
O Share Online
Answer:
Share calendar
Explanation:
Because you will be able to limit certain permissions to the organization rather than emailing it.
also, edge unit test 2022
Curt should use to share his calendar with other users inside his organization "Share Calendar"
What is calendar ?A calendar is a method of structuring and displaying time, typically for the purpose of planning and scheduling events or activities. It typically shows dates, days of the week, and yearly months and enables people to keep track of events like meetings, appointments, birthdays, and holidays. A desk calendar, a physical wall calendar, or an electronic calendar stored on a computer, smartphone, or other device are all examples of calendars
The correct option for Curt to share his calendar with other users inside his organization is "Share Calendar".
To know more about calendar check:
https://brainly.com/question/17524242
#SPJ6
How have newspapers and magazines adapted to digital technology?
Answer:
Most newspapers now have online editions. Subscription models have gone beyond print-only into digital-only and print-digital combinations -- and as print-only circulation is dropping, digital and combination circulation is on the rise.
BINARY DATA:
00000000 00000000 00001100 00000111 10101100 00001010 01111000 00101011 11001011 10011101 00111001 11110011
00001000 00000000 01000101 00000000 00000000 00101000 00000010 10001110 01000000 00000000 10000000 00000110
00000000 00000000 00001010 01111011 00001010 00100001 01101011 00010100 11011001 10101011 00111000 00010111
00000000 01010000 01001100 00100001 00011000 00001001 10011101 01100010 10100011 10001011 01010000 00010000
01000000 10110000 01011001 01110110 00000000 00000000
Required:
a. How do you know this is an IP packet?
b. What is the embedded protocol?
c. What is the size of the embedded protocol payload?
Answer:
A.
Explanation:
Answer:
a
Explanation:
Where can the Field Service Manual containing Critical Callout, Disassembly and Reassembly instructions be found?
Answer:
Somewhere
Explanation:
80. A .......... is used to read or write data.
A. CD B. VDU C. ROM D. RAM
Answer:
Depending on exactly what they mean by read and write, both A and D are valid. In fact, if you read that as "read or write" as being a logical OR and not the logical AND that the sentence probably intends, then all four answers could be correct.
What they probably mean to say though is "..... is used as a read/write storage medium", in which case A is the correct answer.
A. Data can be written to or read from a CD. This is probably the "right" answer
B. A human can "read" data from a Visual Display Unit, and the computer "write" it. That of course is not the intended meaning though.
C. Data can be read from Read Only Memory, but not written to.
D. Data can be both read and written to Random Access Memory, but not retained after the computer is powered off.