Answer:
U can't remove it because it is a flash drive, so remove your flash drive and it will go away. Moreover you can't just erase those files if is the life of the computer. Anyways it if talking about rename it just click on rename.
What uses web-based and mobile technologies to generate interactive dialog with members of a network
Answer:
Social media
Explanation:
The term "social media" refers to a type of computer-based technology that allows people to share ideas, opinions, and information via virtual networks and communities. I hope this helps! ^-^
The third finger on the left hand types _____.
7 U J M
3 E D C
8 I K ,
1 Q A Z
Answer:
3 E D C
Explanation:
Note that there are typically a outdent on the "f" key and "j" key, which are used by your pointer fingers. The "f" key is the one pressed by your left hand, and next to your pointer finger is your third finger, which rests on the key "d". Since only one answer has the "d" option, then it is your answer.
There is obviously some differences, and not everybody may type as such. However, I personally use that finger to type "e", "d", & "c", and so it should be your answer choice.
~
All of the following are good tips regarding using humor in your speeches, except:
a.
Before using humor in your speech, try it out with small groups of people.
b.
Make sure the humor relates to the point you are making.
c.
Begin your joke by saying, “Let me tell you a funny story.”
d.
When possible, choose humor that comes from people you interact with.
Please select the best answer from the choices provided
A
B
C
D
Answer:
C
Explanation:
Sometimes by saying its going to be a funny story, they brace themselves for whatever is coming, so you get less of a reaction out of them. And it won't always work in the wrong context.
PLS ONLY ANSWER IF U ACTUALLY KNOW!! PLSS ANSWER ASAP!!
A computer scientist creates an app that tells you a funny joke each time you touch the
Joke button.
a. What does the view layer for this app contain?
contain?)
b. What does the controller layer do for this app?
Answer:
B and A
That's how my quiz allowed me.
Explanation:
Consider the following code segment:
int[][]nums = {{1, 2, 3},
{100,200,300},
{4, 6, 5},
{7,8,6}};
int sum = 0;
for(int row = 0; row < nums.length/2; row++)
{
for(int col = 0; col < nums[row].length/2; col++)
{
sum += nums[row][col];
}
}
System.out.println(sum);
What will be displayed as a result of executing this code segment?
The code segment is an illustration of loops and arrays
What is a loop?A loop is a program statement used to perform repetitive operations
What is an array?An array is a variable used to hold multiple values
How to analyze the program?The loop of the program adds the index 0 elements of the first and the second row of the 2-dimensional array.
From the program, the numbers to add are 1 and 100
The sum of 1 and 100 is 101
Hence, 101 will be displayed when the code segment is executed
Read more about code segments at:
https://brainly.com/question/26683418
Jake has a worksheet with many columns of data. He wants to see different parts of a list at the same time. Which action would be best for him to take
The action that would be best for Jake to use on the given worksheet is to; Split vertically
How to properly arrange excel columns?In Microsoft excel, we know that there are usually rows and columns on the worksheet.
Now, these rows and columns could be edited to suit the information required to be entered into them. Now a list is usually in columns and not rows and as such for Jake to see the different parts of the list at the same time, he needs to split the list vertically.
In conclusion, the best action for Jake is to split vertically.
Read more about Microsoft Excel at; https://brainly.com/question/25863198
What are the two types of namespace that can be created when configuring the new namespace wizard in dfs?.
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch
The Trunk ports is the type of switch ports are members of all VLANs defined on the switch.
What are trunk ports?A trunk port is known to be a type of of port that can be found on a network switch.
It is a port that helps or allows data to move across a network node for a lot of virtual local area networks or VLANs. You can say that it is a “bundle” of personal branches in a telecom network connection.
What is a Trunk Port? - Definition from Techopediahttps://www.techopedia.com › .
Learn more about VLANs from
https://brainly.com/question/25867685
What is the name of the final version of software when all design requirements have been met?
Answer: Alpha Version
Explanation: Yes, definitely you need one apart from SRS.
A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a(n) ______ number.
A sequence number is a 32-bit number that's used to indicate where you are in a sequence of TCP segments.
What is TCP?TCP is an acronym for Transmission Control Protocol and it is an essential and important standard protocol of the Internet protocol network.
In Computer technology, TCP is an essential part of the transmission control protocol and internet protocol (TCP/IP) network which has a wide range of applications in the following areas:
File transfersWorld wide web (WWW).Remote administrationE-mailIn TCP segments, a sequence number is a 32-bit number that's typically used to indicate where an end user is in a sequence.
Read more on TCP here: https://brainly.com/question/17387945
five different procedures to automate a office?
Answer :
The practice of seeing data flow around on its own without human interference, inaccuracies, or errors is known as office automation. It is the process of creating, collecting, storing, analyzing, and sharing sensitive office data using an automated technology in order to successfully complete basic day-to-day regular activities and operations.
1. Workflow designer that is simple
Hard-core system developers used to be the only ones who could create processes. As workflow software progressed, it assumed that the individuals who used it were also programmers.
However, a modern office automation system should start with the business user in mind, not the coder.
When you sit down to trial an office automation tool, start off by making your own workflows. How easy is it? Can you intuitively create the sequence of tasks needed to finish a process? If you can’t figure it out within the first five minutes, you need to move on to the next option.
Your business's activities should not be dictated by a piece of software. Instead, it should assist your employees in improving their current procedures.
2. Compatibility with mobile devices
Your office should be mobile, and so should all of your tools. Whether you have remote workers or just want to check in while waiting for a flight, the office automation solution you pick should perform just as well on a phone in China as it does on a PC in the office.
Your marketing strategy can't be postponed for a day simply because Greg is returning from his vacation in Machu Picchu.
You should be able to conduct your essential operations from a secure cloud and never have to worry about your data's location or security. If you use an office automation platform like Kissflow Workflow, Greg may review the marketing strategy on his phone while in the Peruvian hotel lobby and give his approval before going on to shoot pictures with the llamas.
3. Integration with other applications
You're not the only one using office automation software. You already have an internal database, a CRM, a marketing automation tool, and finance software, to name a few. You need a tool that doesn't just stay to itself when you're relying on so many systems.
Office automation software should be the easiest to combine with your other tools out of all the software available. If it doesn't, you'll be trapped moving data from one system to the next.
When evaluating office automation software, look for pre-integrations or check whether it takes use of linking to a platform like Zapier to gain access to hundreds of other cloud apps.
4. Analytics and reports
How can you tell whether your workplace automation is working? You can't judge the success of a procedure only on how pleased your employees are. Data is the ultimate decision-maker, and it's critical for your company to compare the history of a process, its speed, the quality of the product, and so on.
It's inconvenient and time-consuming to switch to another program to track your workflow data. Why not create a single piece of software that has reporting and analytics capabilities? The greatest office automation systems now include this capability as part of their core functionality.
5. Options for access control
You should assign access privileges to all of your business workflows the same way you limit admittance to your workplace.
Access control is an important component of a good workflow automation system because it recognizes this sensitive necessity. When looking for office automation software for your company, don't forget about this feature.
A ________________ is text or a graphic that is displayed on top of or behind the text in a document.
Answer: watermark
Explanation:
general knowledge
Which word did alexander graham bell want adopted as a telephone greeting instead of hello.
Answer:
I believe it was Ahoy.
Explanation:
I could be wrong though.
Answer: Ahoy
Explanation: According to nrp.com "Alexander Graham Bell initially suggested that the standard greeting when answering a telephone should be 'ahoy', but instead 'hello' (suggested by Thomas Edison) was adopted."
Amaya is looking for a hardware chip or integrated circuit (IC) that can be programmed by the user to carry out one or more logical operations, can be reprogrammed when needed, and can be configured by either the user or designer. Which option should Amaya select
A hardware chip or integrated circuit (IC) that can be programmed by the user such as Amaya, to carry out one or more logical operations is: Field-programmable gate array (FPGA).
What is a hardware?A hardware can be defined as a physical component of an information technology (IT) or computer system that can be seen, programmed, and touched by the end users.
In Computer technology, a field-programmable gate array (FPGA) refers to a type of hardware chip or integrated circuit (IC) that can be programmed by the user, so as to perform one or more logical operations. Also, it can be reprogrammed when the need arises and configured by both the user and designer.
Read more on hardware here: brainly.com/question/959479
What does it mean when your ip address is blacklisted.
Answer:
It means your IP Address cannot access certain websites, depending on the type of blacklist.
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point
Answer:
Evil twin AP
Funny name, yes, but this is actually a not-so-funny term for an AP set up by an attacker, mimicking your AP, and using this method to attack your client devices and networks.
Please thank me if you are reading this, and have a good day.
Which system uses 16 digits to represent data?
O A. Hexadecimal code
O B. Decimal code
O C. Binary code
O D. Encode
How would you write out the Python code to PRINT the answer to 5 times 2?
I dont this this is the place to ask
what was the first computer name brand
Answer: Electronic Controls Company and was founded in 1949 by J. Presper Eckert and John Mauchly.
hope this helps!
The first computer name brand was MITS and the computer was named The Altair.
Explanation:
Hope this help! Jesus loves you!
Have a great day!
You want to make sure that an airline flight in your app cannot be deleted if there are still passengers assigned to it. What should you configure
Answer:
In short words, be awesome like the sta.r you truly are.
-this is why with Potato
Explanation:
In the given case, one should go for the configuration of prevention of delete.
What is configuration?A configuration in the context of computers and computer networks frequently refers to the precise hardware and software details in terms of the devices connected, the capacity or capability, and the components that make up the system. A configuration in a network frequently refers to the network topology.
The definition of configuration in the context of computers and technology is the organization of the IT system's hardware and software.
A better level of control over the devices on your network is provided through management of the components, settings, and other factors that guarantee the proper operation of all IT systems.
In order to prevent the deletion of an airline flight in your app while it still has passengers assigned to it, Therefore, one should opt for deletion prevention configuration.
Thus, this can be done for the given scenario.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
_____ is an online data entry method where a blank form that duplicates or resembles the source document is completed on the screen
Answer:
form filling
Explanation:
form filling is an online data entry method where a blank form that duplicates or resembles the source document is completed on the screen
u can use quizlet for this or any thing
This Question is for an excel class
Please post detailed answers to the following questions. Please use complete sentences.
What is the point of charts and similar data illustrations? What do they offer someone that merely looking at the data in a spreadsheet cannot? Make an argument for why charts are a critical component of communicating spreadsheet-formatted information.
Answer:
Graphs are a common method to visually illustrate relationships in the data. The purpose of a graph is to present data that are too numerous or complicated to be described adequately in the text and in less space. Do not, however, use graphs for small amounts of data that could be conveyed succinctly in a sentence.
Explanation:
What does the dram shop act mean to a seller/server?.
Answer:
If the seller/server sells an alcohol to an intoxicated person and they cause damage
the seller/server can be held civilly liable by a court for their actions.
What allows outlook to automatically flag forward move tag and respond to email messages.
The outlook that automatically flag forward move tag and respond to email messages is known as Rules.
What is rules in terms of an outlook?Rules is known to be a function in a system that helps one to move, flag, and answer to email messages automatically.
Note that a person can use rules do some other functions such as:
Play sounds.Move messages to foldersShow new item alerts.Learn more about Rules from
https://brainly.com/question/5707732
An engineer has reported that a printer is no longer working and needs troubleshooting. You have been informed that there is a problem with the extruder. What type of printer will you be working with
Answer:
3D Printer.
extruders are in 3D printers.
Susan is a network administrator and is setting up her company's network. In the process to determine an open port on a firewall, she should
Answer:
type C:\>nmap 203.0.113.100 then Enter
Explanation:
because none of the other chooses make sense
____ uses a computer to design and test new products and modify existing ones. Computer-aided manufacturing Just-in-time design Flexible manufacturing system Computer-aided design Materials resource planning
Answer:
3D printing
Explanation:
Answer:
Computer-aided design (CAD)
Explanation:
What software can be used for remote operation of a sunsdr2 dx?.
Answer:
Install the ExpertSDR2 Remote Client software on your PC. Download the client here. You can also access your device via any web browser
A data type consisting of numbers, letters and symbols is a _____.
Answer:
That's the answer
Hope it helps
#brainliest
#heart
#star
#Carryonlearning
Algorithm to calculate the sum and difference of 15 and 12