Answer:
it is called the World wide Web
What are software applications?
lines of code that were written by developers
devices that you insert into the computer
files that are stored on the computer
Answer:
the person above is correct if i were you id take notes!
Explanation:
Answer:
Only A (Top answer)
Explanation:
Files do not create any software alltogether and devices pluged in are not considered software.
What is the name of the table tools contextual tab that appears once you insert a table? Transform Design Outline Charts.
Answer: B.) Design
Explanation: just took it
Answer:
b
Explanation:
what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?
A data dictionary is also known as ________. Group of answer choices a data warehouse clickstream data a data mart ubiquitous computing a metadata repository
Answer:
A data dictionary is also known as metadata repository.
quadratic equation 4
In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.
HOPE IT HELPS:)
PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.
Answer:
JavaScript can be implemented using JavaScript statements that are placed within the ... HTML tag
Explanation:
A _____ agent can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.
Specific tasks such as the remembrance of key information when filling out Web forms can be performed by: personal agent.
A personal agent is also referred to as user agent and it can be defined as a computing software or hardware-based system that is typically designed and developed to perform specific tasks on behalf of an end user.
This ultimately implies that, a personal agent is an intelligent computer hardware or software program that can be configured to perform specific tasks on behalf of an end user.
For example, a personal agent can be configured to remember key information when filling out Web forms.
Read more: https://brainly.com/question/21656851
how do the peograms on a computer work
Answer: Computer programs work by telling the CPU to use input in a given way, manipulate it in another way, and then present the results as wanted. As you type in the words that you wish to, for example, add, the calculator program tells the processor to display them on your computer's screen.
Explanation:
Helpppp adapppppopppppp
Explanation:
(A) trust me I'm computer hecker experts
Which would a student most likely do in a digital laboratory? conduct an experiment in chemistry take continuing education classes in chemistry look for an out-of-print book about chemistry watch an instructional video about chemistry.
Answer:
conduct an experiment in chemistry
Explanation:
A digital laboratory is an interactive online tool, where students are asked to mimic an experiment.
Answer:
"conduct an experiment in chemistry"
Explanation:
A digital laboratory is an online tool used to conduct chemistry experiments when, say, you are at home or the tools needed are dangerous. It also helps to make sure you have exact results since it is computerized.
Have a nice day!
I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)
- Heather
how do you play pokemon go
Answer:
download the app then tap your screen for the rest of your life
(And I'm being serious)
To use the Expression Builder to create a calculated field, select the column in the Field row, right-click to display the shortcut menu, and then click ____.
Answer:
square brackets [ ]
Explanation:
Hope I could help. Good luck with your studies .
Give a brief explanation about the internet.plsssss
Answer:
The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.
Explanation:
INTERNET is a short form of Interconnected Network of all the Web Servers Worldwide. It is also called the World Wide Web or simply the Web.
which one of the following is not a barrier to effective communication?
A physical barrier
B linguistic barriers
C interpersonal barriers
D subjective barrier
The option that is not a barrier to effective communication is D. subjective barrier.
It should be noted that barriers to communication simply means the impediments that can affect effective communication.
Some of the barriers to communication include physical barrier, linguistic barriers, and interpersonal barriers. It should be noted that a subjective barrier isn't a barrier.
Read related link on:
https://brainly.com/question/25718682
With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.
Answer:
Your answer is...
Visual.With visual voicemail, users can view message details, and in some cases read message contents without listening to them.
I hope this helped at all.
code hs spell it out 7.2.6
what do you mean can you say it more clear?
The programming question requires that we write a function that takes a string and returns every character in it but the first character.
The function in Python, where comments are used to explain each line is as follows:
#This defines the function
def end_of_word(myStr):
#This returns every character in the string except the first
return myStr[1:]
Read more about Python functions at:
https://brainly.com/question/13795586
A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.What is the first step Accenture could take?
Accelerating output and hence, growth of an enterprise is one of the core functions of Accenture. Hence, the first step to be taken by Accenture is to design an Enterprise analytic strategy assessment.
Data science leverages the power of collected data combined with simple and complex machine learning algorithm in other to draw pattern and trends from data. Since, the healthcare provider is a large enterprise, the first step that should be followed would be to design a strategy to the assess the data available to the organization or enterpriseHence, the first step is to develop an enterprise analytic strategy assessment.
Learn more : https://brainly.com/question/25602226
Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).
- BRAINLIEST answerer
You have a server with Windows Server 2016 installed on Disk 0, a basic disk. You're using the server to store users' documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for users' documents
Answer:
Convert the new disks to GPT. Create a spanned volume using Disk 1 and Disk 2.
Explanation:
jessica has connected her new printer to her windows 10 computer, but windows is not recognizing it. what should she do?
reconnect the printer or you could Explanation:
If Windows 10 is not recognizing Jessica's new printer, she should take the following steps:
Check the physical connections: Ensure that the printer is properly connected to the computer via a USB cable or a network connection.
The Steps to takeRestart both devices: Restart the computer and the printer to refresh the system and establish a new connection.
Update printer drivers: Visit the printer manufacturer's website and download the latest drivers specific to her printer model. Install the drivers on the computer.
Run the printer troubleshooter: Go to the Windows settings, select "Update & Security," then "Troubleshoot." Choose "Printer" and follow the on-screen instructions to diagnose and fix any issues.
Read more about printers here:
https://brainly.com/question/31051187
#SPJ2
where is the flash drive listed in a windows 7 save as dialog box?
Answer:
In the left pane below Computer.
Explanation:
You have been asked to store a file with personal information on it. You need to be sure that only your user account can access the file, even if other user account have been granted permissions or if the disk is stolen. What standard NTFS feature can you use
Answer:
EFS
Explanation:
What is voice recognition system ?
Answer: Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
Explanation:
Answer:
Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands. ... Voice recognition systems enable consumers to interact with technology simply by speaking to it, enabling hands-free requests, reminders and other simple tasks.
URGENT The HTML tag of a table cell content is
A. True
B. False
An Internet address is a unique binary number assigned to a host and used for all communication with the host. Group of answer choices True False
Answer:
the correct answer is true
To break a page click the _______ tab
Answer: Page Break (or press ctrl + enter on keyboard)
Explanation:
The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.
Answer:
url
Explanation:
Which of the following can be considered as peripheral devices?
A). Primary storage media
B). User interfaces
C). Secondary storage media
D). Operating systems
The option that can be considered as peripheral device's is Primary Storage Media. Thus, option A is correct.
What is a peripheral device?A peripheral, also known as a peripheral device, is an auxiliary device used to input and output data from a computer.
Terminals, printer, outside floppy hard disks and other data storage devices, video displays, keyboards, interfaces cards, external memory adapters, and other input/output gadgets that might or might not contain digital circuitry are examples of peripheral devices.
The computer retrieves and stores the data in the primary storage device until the procedure is done, or the data is no longer needed. Primary storage devices include random-access memory (RAM), graphic card memory, and cache memory.
A computer peripheral is any outside device that allows the computer to receive and send data. Therefore, it can be concluded that option A is correct.
Learn more about peripheral device here:
https://brainly.com/question/21080721
#SPJ2
When a program unit refers to other database objects, the program unit is considered dependent on that object.
It is true that a program unit is dependent on a database object when the program unit refers to a database object
A program unit may or may not have dependency.
However, when a program unit have a dependency, the program unit will make reference to its dependency which is sometimes a database object.
Without the database object, the program would either crash or not perform as expected.
Hence, the given statement is true.
Read more about program dependency at:
https://brainly.com/question/12696037
What is the name of the type of keyboard that contains a coiled spring and a rocker, and provides both tactile and audible feedback.
Answer:
Buckling Spring