Answer:
true size
Explanation:
The CAD drawing is an example of the details of the components of an engineering project. Uses CAD (Computer Aided Design) software to create drawings used throughout the design project, from conceptual design to construction or assembly.
You can control the size of the virtual drawing area in the model space by specifying the drawing boundary
Using the CAD drawing we can use the correct size of the specification project. The original unit can be used due to the sheet size.
Match each command group under Picture Tools to the appropriate tasks.
Adjust
Crop and rotate an image,
Arrange
Position images on a slide,
Size
Modify the shape, border or outline of an
image
Picture Styles
Modify the color and brightness of an image
Answer:
look at the attachment for correct answers.
The match up of the command group under Picture Tools to the appropriate tasks is given in the image attached.
What are the picture tools?Picture Tools are known to be tools that are often used to enhance an image. They includes:
BrightnessContrastCompress Pictures, etc.Conclusively, the use of this tools will make your pictures to be better and attractive to behold.
Learn more about Picture Tools from
https://brainly.com/question/9566501
#SPJ2
What tab on the Ribbon would you select to create a Photo Album?
Design
Animation
Home
Insert
Answer:
It would be the last one Insert
Explanation:
I just know
How can you find out which study method is best for you?
O
A. Use the method your friend is using, because if it works for him, it will work for you.
B. Select the first method you try, and do not try anything else.
C. Try two methods, and select the one that seems the best out of the two methods that you have tried.
O D. Try many different methods, and evaluate how effectively they work for you.
Answer:
d
Explanation:
Answer:
D.
Explanation:
You should always try each one and see which one best fits you.
A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords is called a
Answer:
Folksonomy.
Explanation:
A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords is called a folksonomy.
This ultimately implies that, folksonomy is a user-generated system which is typically used for classifying and organizing online content into various categories through the use of metadata such as keywords, electronic tags and public tags in order to make it easier to find in the future.
Hence, folksonomy is highly beneficial in areas such as collaborative learning, teacher resource repository, collaborative research, educational platforms, e-commerce etc.
Can anyone give me $2 (Reddem code/Promo Code)
The cloud-based office suite will also work when users are offline.
Describe how this is possible.
Answer:
This is possible because the the system is managed by a third party and so the users don’t have to be online all the time for the office suite to work.
Explanation:
Hope this helped, I was stuck on this too :)
Cloud-based office suites, such as Microsoft Office 365, offer offline functionality through a technology called "offline access" or "offline mode."
When users are online, their files and documents are automatically synced and stored in the cloud, accessible from any device with an internet connection.
However, to enable offline access, the cloud-based office suite downloads a copy of essential files and data to the user's device.
This cached version allows users to continue working on their documents, spreadsheets, or presentations even when they are offline or experiencing internet connectivity issues.
Once the device regains internet access, the changes made in offline mode are automatically synced back to the cloud, ensuring seamless collaboration and data integrity.
Know more about office suite;
https://brainly.com/question/24207427
#SPJ5
An authentication system based on the physical characteristics or behavioral tendencies of an individual is the definition of biometrics. True False
Answer:
True.
Explanation:
In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.
Hence, an authentication system based on the physical characteristics or behavioral tendencies of an individual is the definition of biometrics.
In Computer science, some examples of tools or elements used for performing user authentication are biometrics scanner, smart cards, digital certificates, picture passwords, magnetic stripes etc.
Which of the following do plant cells need for photosynthesis to take place
A. Oxygen
B.glucose
C. Light energy
D. Chemical energy
Answer:
C. Light energy
Explanation:
The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
Answer:
anti-malware software.
Explanation:
An anti-malware software can be defined as a software application or program designed to avail end users the ability to protect their computer system and other end devices from malicious programs (malwares) such as rootkit, worms, adware, spam, spyware, etc.
Some examples of anti-malware softwares are Avast, Comodo, Kaspersky, Norton, Eset 360 etc.
Hence, the best way to help prevent a system from a worm attack is to use an anti-malware software.
Basically, anti-malware software has some inbuilt techniques such as sandboxing, behavior monitoring and malware removal feature designed to help prevent a system from a worm attack and other malicious programs.
The Date Navigator is a small calendar that is displayed in the __________ Pane or in the Calendar peek that provides a quick way to display specific dates or ranges of dates in the calendar.
Answer:
The Date Navigator is a small calendar that is displayed in the _Navigation___ Pane or in the Calendar peek that provides a quick way to display specific dates or ranges of dates in the calendar.
Explanation:
Navigation Pane gives access to database objects. Its purpose is to enable quick movements from one area of the document to another. The Navigation Pane also displays the folders within view. It is an important tool for users to navigate from one window area to another. Some Navigation Panes, especially on the Microsoft word, display the headings, pages, and results.
sin lord is 35k a=ok awesome but i think mythic gem better ok so yeyeyeyeyeyeyeyeye
or no, does somebody know sinister lords value or mythic infinity gem i think sin lord is 35k but what about mythic gem.
Answer:
sinister lord I'm pretty sure is 35-36k and mythic I'm not sure but i think the shiny value is like 35-34k and dropping and sin is rising, I don't know mythic value but u can check in a value list but sinister lord is rising so yea but if your doing mythic for sin lord L because mythic is worth way more than the shiny gem because its more rare.
Explanation:
What is abstraction and how does it relate to how computers store information?
Answer:
Definition - What does Abstraction mean?
Abstraction is a fundamental principle in some types of computer science. It is a key design aspect of object-oriented programming languages and application programming interfaces. It's also one of the least understood ideas in programming, partially for semantic reasons.
PLEASE MARK BRAINLIEST
Abstraction is commonly defined as the extraction of relevant information from a larger data set, where utilizing abstraction allows engineers and others to simplify a codebase.
Techopedia explains Abstraction
The reason this is confusing to many people is that abstraction doesn't “sound like” what it is, semantically. It sounds like making something more vague, because that's how we use it in general language.
However, in computer science, abstraction typically means simplification and separating the signal from the noise in order to make programming more efficient and effective.
Explanation:
Are you prepared for a terrorist attack?
Answer:
Uh, no probably not. I would be doomed.
make sure im first,
The process that allows you to copy data from another source file to a database without having to open the sources file is called
Answer:
Importing.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.
In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.
This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.
Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.
The process that allows you to copy data from another source file to a database without having to open the sources file is called importing.
Hence, import is a computer feature that avails users the ability to copy data directly from another source file to a database without opening the source file and as such is less cumbersome and saves time.
What is the best way to set up the spreadsheet? List each expense in a row. List each income source in a column. List each expense and income source in a separate column. List each month in a row. List each month in a column. List each expense in a row. List each expense in a column. List each month in a row.
Answer:
is b
Explanation:
List each income source in a column is the best way to set up the spreadsheet.
What is a spreadsheet?A spreadsheet is a computer program for organizing, calculating, and storing data in tabular form. Spreadsheets were created as digital counterparts to traditional paper accounting spreadsheets.
The data entered into a table's cells is what the program uses to run. Each cell may include text, numeric data, or formula results that automatically calculate and display values based on the contents of neighboring cells.
One such electronic document may also be referred to as a spreadsheet. Users of spreadsheets can change any stored value and watch the changes in calculated values.
This enables quick investigation of numerous scenarios without the need for manual recalculation, making the spreadsheet helpful for "what-if" study.
Modern spreadsheets include built-in functions for typical financial accounting and statistical procedures in addition to conducting basic mathematical and arithmetic operations.
Learn more about spreadsheet, here
https://brainly.com/question/8284022
#SPJ6
Changing the position of text on the screen is called ________.
Answer:
Formatting
Explanation:
Hope this helps
var grades = 88;
for(var i=0; i < 100; i++){
grades++;
}
How many times does this loop iterate?
Answer:
100 times
Explanation:
first value of i in the loop is 0. Last value is 99. So loop never iterates with i at 100.
Please select the word from the list that best fits the definition
.edu sites
- Safe Sites
- Unsafe Sites
Answer Is
Safe Sites.
Explaining:
Edu Sites Are For Educational Purposes. So They Need To Be Secure.
Answer:
safe sites
Explanation:
i got it right on edg
A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output is the miles walked.
Answer:
The program in Python is as follows:
steps = int(input("Steps: "))
miles= steps/2000
print("Miles: "+str(miles))
Explanation:
This prompts the user for number of steps
steps = int(input("Steps: "))
This calculates the miles walked
miles= steps/2000
This prints the calculated miles
print("Miles: "+str(miles))
Which of the following did you include in your notes?
Check all that apply.
how you will keep costs down
how you will offer a better product
how you will be innovative in what you offer
Id
Economía
Answer:
How you will be innovative in what you offer
Explanation:
personally I think all 3 but it is what it is
Organizational Units are Active Directory __________ into which you can place users, groups, and computers. policies domains buckets containers
Answer:
containers
Explanation:
Organizational units are used to segment or assign objects in the Active Directory into their different locations. Just like files are arranged in folders, so also can objects in the Active Directory such as users, groups, and computers be assigned to different locations. It is like a container where objects are stored.
When the organizational unit is set up, by default, the users and computers account are created into which new users and computers are placed.
What colorful format should you use to bring attention to an important sentence or phrase
Font size
Highlight
Italicize
Underline
Answer:
Highlight
Explanation:
Answer:
Highlight
Explanation:
Convert the
binary number
10 110 110 111
to hexadecimal
Answer:
0x5b7
Explanation:
You should group the binary digits in groups of 4 for easier conversion:
10 110 110 111 = 0101 1011 0111
Then you can look it up in a table and find 5b7
_____ is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it.
Answer:
Case-based reasoning.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.
In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.
This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.
Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.
Case-based reasoning is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it. It is typically based on cognitive science and artificial intelligence.
Case-based reasoning is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it.
What is Case-based Reasoning?Case-based reasoning is a system of solving problems in engineering and artificial intelligence. Here, problem-solvers resolve problems based on past experiences.
For example, to repair a faulty computer, the repairman recalls a computer that such a similar case and applies the same reasoning in solving the current problem.
Therefore, the correct answer is case-based reasoning because, past problems are stored with keywords that will make it easier to solve new problems.
Learn more about casebased reasoning here:
https://brainly.com/question/9305378
To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Modify Read & Execute
Answer:
Deny
Explanation:
Under the New Technology System, the Deny permission is applied when the administrator wants to overrule the permission given to members of a group. The Allow and Deny options help in regulating access to the components of the system. Only authorized groups are granted access to the files.
Most times, the Deny permission is considered before the Allow permission. If the user is denied access to some files and granted access to some, the deny permission is most times considered first.
PLEASE HELP PLS HELP GUYS PLEASE HELP THIS IS DUE IN 5 MINUTES GUYS PLS HELP I WILL GIVE BRAINLIEST FOR PROPER ANSWER
List four "beliefs" in which evolutionary scientists place their faith when supporting the theory of evolution. Use complete sentences.
Answer:
The four belief systems of the example in the case throughout the question are described elsewhere here.
Explanation:
The belief that perhaps the average temperature of the globe has never significantly altered. The belief inside of an undiscovered or unidentified very first-life species. Belief throughout the hypothesis that human existence had begun mostly in the seafloor. The belief that human existence has managed to transform from concrete to abstract.Answer:
answers are down below
Explanation:
One aspect in which evolutionists place their faith is the geological column. If you examine a chart of it, you will notice a trend. As you go deeper into the geological column, the fossils found there to get more and more "simple". On the surface of the geological column, scientists have found more complex life forms. This trend suggests that organisms evolved, and the geological column represents this trend in chronological order. However, this data could be used against evolution as well. Therefore, it is inconclusive. If you believe the sedimentary rock formed so rapidly due to the biblical flood, this is evidence against evolution. If you believe rocks formed according to the observations of Charles Lyell, then this could be evidence for evolution. It all depends on how one interprets the data.
Another aspect in which evolutionists place their faith is something they call "intermediate links" Intermediate links are supposed to indicate a transitional form between two different creatures to show that they evolved. For example, evolutionists state that the creature Archaeopteryx is the transitional form between reptiles and birds. Another example of a transitional form found is the Australopithecus afarensis, which is supposed to be the transitional form between apes and humans due to similar bone structures and that this creature was bipedal like us humans.
Another belief evolutionists have to support the theory of evolution is the science of structural homology. Structural Homology is a science that studies similar structures in different organisms. For example, if you examined the forearms of a bat, bird, porpoise, and human, you would find that they have similar forearm structures, They all have a radius, humerus, ulna, carpals, metacarpals, and phalanges. This indicates that all these creatures evolved from a common ancestor due to their strikingly similar structures.
Another aspect in which evolutionists place their faith is in the science of molecular biology. You see, all organisms contain a common protein called cytochrome C. Cytochrome c performs the same basic function in every organism. It is possible to calculate the percentage difference between the cytochrome c in each organism. Evolutionists have created a table that shows the percentage difference between a few different species of organisms. What they found appeared to indicate an evolutionary trend. However, more research shows that this data is highly flawed. If you calculate the percentage difference of this protein between a horse, pigeon, tuna, silkworm moth, wheat, the yeast and compared it to a bacterium ( the "simplest" life form) you would find that all these organisms are almost the same percent different from each other, indicating individual species rather than evolving from a common ancestor. All of these assumptions stated above can be evidence for or against evolution. It all is determined by how someone interprets these facts. I hope this helped you! Good luck :)
What software application can be used to send and receive email messaging and management appointments in calendar's
Excel
One drive
Outlook
PowerPoint
Answer:
Outlook
Explanation:
is a biometric system an input, output, storage or soft device?
Answer: Input
Explanation:
Biometric systems work by using a person's physical or behavioral characteristics to digitally ascertain that it is indeed that person that is requesting access to what it is they are requesting access to such as systems, data and devices.
Examples include fingerprints and facial patterns. Biometric systems therefore take in the information presented which makes them input devices.
A(n)
is a fast compute with lots of storage. pls help
Answer:
That last answer was amazing, but the answer you're looking for is server
Explanation:
On a network, a server is a computer that distributes files to numerous clients. The opposite of storage is a device where you keep data that you can access when you require it.
What is the role server in fast compute with storage?A cloud server is a pooled, centrally placed server resource that is hosted and made available through an Internet-based network—typically the Internet—for use by a variety of users.
The same ways that a traditional physical server would be able to provide processing power, storage, and applications are also possible with cloud servers.
One system may include both servers and storage. The purpose of storage is to provide long-term access to files. Distributing work, sharing resources, and exchanging data are the duties of a server.
Therefore, a server is a fast compute with lots of storage.
Learn more about server here:
https://brainly.com/question/28560376
#SPJ2
how has State-terrorism done for us and how we can prepare for it?
Answer:
Developing a plan that prepares not just one family but their whole community.
Explanation:
I think a great way to prepare for state-terrorism is by developing a disaster awareness plan. An event that hosts first-responders, medics, policemen, etc. To speak over these circumstances in the event, there are many possibilities with a disaster awareness event, activities for the younger ages that teach kids to be "prepared not scared" this event can go a lot farther than state-terroism a step further would be to prepare people for natural disasters that can occur, and the ways to prepare for this.