How many pages is 2000 words double spaced 12 font.

Answers

Answer 1

Answer: 8 pages

Explanation:


Related Questions


Should spreadsheets be used to maintain a checkbook?
YES

NO

Answers

Yes, because it keeps all your data organized and allows you to see the trend and growth of your data by automatically creating different types of charts and graphs to help you visualize your data.

Hope that helps!

Write an expression (Links to an external site.) that evaluates (Links to an external site.) to true (Links to an external site.) if and only if the integer (Links to an external site.) x is greater than (Links to an external site.) the integer (Links to an external site.) y.

Answers

Answer:

index > last_index

c != str(" ")x == 0profits==losses

What is nail punch in your own words?

Answers

Answer:

in my own words

nail punch

a punch for driving the head of a nail below or flush with the surrounding surface

Explanation:

Sana po naka tolung

correct me if im wrong thanj you

#Brainly

A charity is keeping track of donations for one month. The director would like to create a report that groups data by week. Each group will contain donations collected on each day of the week. Which type of calculated figure should the director use to display a cumulative total beneath each group?

running sum

sum

grand total

percentage

Answers

The calculated figure that the director should use to display a cumulative total beneath each group is option A: "running sum".

Which type of calculated figure is this?

A "running sum" is used by the director to display cumulative totals beneath each group. It accumulates the values of a field over time or across a grouping.

Director groups donations weekly and displays total for each day using running sum to calculate and add up amount as days progress. Director groups donations weekly by creating a running sum field that adds daily totals until end of the week. Cumulative totals for each day of the week displayed in report.

Learn more about  sum from

https://brainly.com/question/25734188

#SPJ1

You are a solutions architect who works at a large retail company that is migrating its existing infrastructure to AWS. You recommend that they use a custom VPC. When you create a VPC, you assign it to an IPv4 Classless Inter-Domain Routing (CIDR) block of 10.0.1.0/24 (which has 256 total IP addresses). How many IP addresses are available

Answers

In this case, there are 251 IP addresses available. They are unique addresses for the Internet Protocol.

What is an IP address?

An Internet Protocol (IP) address is a unique address on Internet, which is used to indicate a local network.

The term 'Internet Protocol' indicates the principles associated with the format of the data used by the local network.

An Internet Protocol address is always denoted by a set of numerical tags that indicate the local network.

Learn more about IP address here:

https://brainly.com/question/24930846

Functions are used to _________

Answers

enable programmers to break down or demolish a problem into smaller chunks

A dim display on a laptop LCD screen might indicate that there is a problem with: (Select 2 answers)

Answers

Answer:

GPU or Display Connector.

When an item in a menu is black, it means that _____.
(CORRECT ANSWER GET'S BRAINLIEST)
A) It is the only command that can be selected
B) A dialog box is present
C) The item can be selects
D) The item is unavailable

Answers

Answer:

no sure but I think c

Explanation:

because I am a awesome and cool perso

Answer:

the other person is wrong its d

actually no im wrong it is c lol

Gaining information by tricking an individual into releasing information is often referred to as.

Answers

Answer:

Social engineering

Explanation:

What is a shortcut for adding a timeline marker

Answers

Answer:

To add a marker to a clip in the Timeline, do the following:

Set up a keyboard shortcut for Add Clip Marker in Edit > Keyboard Shortcuts (Windows), or Premiere Pro > Keyboard Shortcuts (Mac OS).

Select the clip.

Place the Playhead where you want to place the marker.

Press the keyboard shortcut you created for Add Clip Marker.

Explanation:

hope this helps!

Answer:

Ctrl+3 (windows) & Cmd+1 (mac)

i hope you mead adobe premium

Which Windows service is used to keep information about the networks the server connects to and communicates network information to applications on the server

Answers

Answer:

windows 7

am I correct..

Why do you think You Tube became so popular so quickly? What is its unique appeal?

Answers

Answer:

it became popular because you could post anything in the world and it could be anything ur favorite show memes and pranks  it got so popular because there was no limit even i can post

Explanation:

thats why it is so poular

I think it’s because people can post and watch things they are interested in.

Conduct research online or through other means on one source of renewable energy. Describe the applications and benefits of the energy source.
Earth Science (Plato)

Answers

A source of renewable energy is Solar energy.

What is the source of the solar energy?

The sun is known to be the source of Solar energy. This is known as any type of energy that is gotten from the sun.

Solar energy is formed by nuclear fusion that occurs in the sun. Fusion is said to take place when protons of hydrogen atoms does collide in the sun's core and fuse to form a helium atom.

Solar power  or energy benefits includes thermal or electrical energy. One can also get the cleanest and most abundant renewable energy source from here.

Learn more about renewable energy from

https://brainly.com/question/545618

Now that you have explored several different languages (Python, HTML, CSS, and JavaScript), what can you do to keep straight which rules apply to which language?​

Answers

The applications are given below:

CSS applies to a stylesheet language or style.Python and JavaScript applies to programming languages.html  will show a horizontal rule and it applies to web browser.

What is CSS?

Cascading Style Sheets (CSS) is nown to be a type of a stylesheet language that is often used to depict a presentation of a document that are written in HTML or XML.

Python is known to be a high-level, all-purpose programming language. that is set up for design code readability.

Learn more about html  from

https://brainly.com/question/4056554

______ states that the value or power of a network grows exponentially as a function of the number of network members.

Answers

Metcalfe's Law

Metcalfe's Law” says that a network's price is proportional to the square of the kind of nodes withinside the network. The forestall nodes can be computers, servers and without a doubt users

Write a short thesis statement about the IoT (Internent of things) I just need this just for ideas on my thesis statement. :)

Answers

The Internet of Things, or IoT for short, is a relatively new topic in the world of technology. This topic is both engaging and innovative for students pursuing their bachelor's and master's degrees. They can write their M.Tech. or Ph.D. thesis in this field. The internet has become an integral component of our everyday lives. The Internet of Things (IoT) concept is centered on the combination of comfort and the Internet.

A user guide is a type of
O accessibility tool
0 comment
O version control
O documentation

Edge

Answers

When we buy a new object, it usually comes with a user guide, a tool to guide us in its use, and the manufacturer's recommendations.

What is a user guide?

A user guide is a tool that indicates all the recommendations and instructions that the manufacturer advises the consumer to avoid.

For example, if I buy a car, I need to know how it works so as not to misuse it and damage it. Therefore, manufacturers include this tool in the box of all their products.

Learn more about user guide in: https://brainly.com/question/6689072

Answer:

Documentation

Explanation:

A user guide is a type of documentation.

Identify a characteristic that is a disadvantage of cloud-based hosting.

Answers

The characteristic that is a disadvantage of cloud-based hosting is  loss of control over data location.

What is Cloud hosting?

This is known to be a kind of applications and websites that often makes them accessible via cloud resources. Here, a network of linked virtual and physical cloud servers is said to be the one that host the application or website.

The Disadvantages of cloud computing are:

There is a data loss or theft.There is also data leakage.There is account or service hijacking, etc.

See options below

a. ongoing support costs

b. increased management requirements

c. significant development effort

d. loss of control over data location

Learn more about cloud-based hosting from

https://brainly.com/question/19057393

Calculate the time necessary to perform a multiply using the approach described in the text (31 adders stacked vertically) if an integer is 8 bits wide and an adder takes 4 time units.

Answers

The time that will be used to perform a multiplication using the approach is 28 time units.

How to calculate time taken?

From the information given, the following can be noted:

A = 8 (bits wide)

B = 4 time units.

The multiplication will be performed based on the adder stack. Since A = 8, then, A - 1 = 8 - 1 = 7.

Now, the time taken will be:

= 7 × B

= 7 × 4tu

= 28 tu

In conclusion, the correct option is 28 time units.

Learn more about time taken on:

https://brainly.com/question/10428039

Which is true regarding how functions work? Group of answer choices A return address indicates the value returned by the function If a function returns a variable, the function stores the variable's value until the function is called again After a function returns, its local variables keep their values, which serve as their initial values the next time the function is called A function's local variables are discarded upon a function's return; each new call creates new local variables in memory

Answers

The true statement is that A function's local variables are discarded upon a function's return; each new call creates new local variables in memory.

What is function?

A function is known to be a term that tells the linkage between a set of inputs that are known to have one output each.

It is known to show the relationship between inputs where each input is said to be linked to one output. Note that a function's local variables are removed from memory when a function's return.

Learn more about function from

https://brainly.com/question/25638609

Your friend Aria is complaining that programming seems too complicated. She says, “Why do we need things like sequence, selection, iteration, and variables? It’s too much to bother with.” Explain to Aria what control structures like sequence, selection, and iteration do and why they are needed. Then tell her why variables are important in programming.

Answers

Answer: A sequence is a basic algorithm. A set of logical steps is carried out in order. A Selection and coding is the section of code that is only carried out if the conditions are met. A iteration is A line of code that is being repeated until the desired results has come out. A variable is a value that can change when the condition is changed your information passed through the program.

Explanation:

Once again im asking,
Absolute cell references should be used when possible to avoid having to make multiple updates when a key value changes.
True
False

PLEASE PLEASE HELP MEEE

Answers

Absolute cell references should be used when possible to avoid having to make multiple updates when a key value changes.

True

An absolute cell reference is a cell address that contains a dollar sign ($). It can precede the column reference, the row reference or both. An absolute cell reference can keep a row or a column constant or keep both constant. It doesn't change when copied to other cells.

Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!

Stay Brainy!

-[tex]Kallmekris[/tex]

Huffman encoding uses variable length binary strings to represent particular characters. Group of answer choices False True

Answers

The answer is true.

A __________is a software program that appears to be a physical computer and executes programs as if it were a physical computer.

Answers

Answer:

Virtual Machine

Explanation:

I had to look this up, since there were no options from the question. If this is wrong, let me know!

Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond

Answers

Answer:

Request timeout

Explanation:

If a computer makes a request and does not hear a response within an acceptable amount of time, the computer assumes that no answer is coming and reacts accordingly.

The method that allows a computer to react accordingly when it requests data from a server and the server takes too long to respond is request timeout.

What is response timeout?

A response timeout is known to be a situation that often occurs after the request has been sent to the CICS server.

Conclusively, In the aspect of request timeout, this  message is one that often comes up when there is a kind of  firewall that is said to be blocking the connectivity as in the case of the serve in the above question.

Learn more about computer from

https://brainly.com/question/24540334

name any five components of the Photoshop window​

Answers

Answer:

File, edit, image, layer, select, filter, view, window & help

Most P2P apps or services provide safety and privacy features such as verification of payment amount before payment is sent, a user PIN, and _____.

Answers

Most peer-to-peer (P2P) apps or services provide safety and privacy features such as onetime password (OTP).

What is P2P service?

P2P service is an abbreviation for peer-to-peer (P2P) service and it can be defined as a decentralized platform through which two (2) individuals or business firms interact with each other directly, without any third-party or an intermediary  being involved.

Generally, most peer-to-peer (P2P) applications or services provide safety and privacy features to customers such as:

Verification of payment amount before payment is sent.A user PINThe use of a onetime password (OTP).

Read more on P2P here: https://brainly.com/question/26190446

Which component of windows prompts the user for credentials or permissions to minimize the dangers of unintended software installations?.

Answers

Answer:

User Account Control (UAC)

Explanation:

User Account Control (UAC) prompts the user for credentials or permission in an effort to minimize the dangers of unwanted actions or unintended software installation. Windows firewall protects the system from network attacks. Windows Firewall with Advanced Security (WFAS) is a feature with provides advanced firewall settings beyond the program or service rules enforced by Windows Firewall. Windows Defender scans software for malicious code.

To include a column in the output that is not a result of an aggregate calculation, it must be included in the _____________ clause.

Answers

Answer:

group by

Explanation:

To improve readability and maintainability, you should declare ________ instead of using literal values such as 3.14159.

Answers

π

use the pi symbol,instead of the literal value.

hope this helps!! (gabby)

Other Questions
If you want to sell your cupcakes for $2 per dozen, you can make a profit of $160. If raise the cupcake price by$1, you can make a profit of $216. If you raise the cupcake price by $2 (which makes them S4 per dozen) you canmake $256 profit. What is the maximum profit you can make? What should you charge for your cupcakes? Two sides of a triangle measure 8 centimeters and 13 centimeters. Which of the following could not be the length of the third side?. form of government in which one person rules and the authority is inherited ____ Which statement best describes the difference between psychodynamic therapy and behavioral therapies? Find the missing side (X) round to the nearest hundredth I need help with rates ratios and properties. Need help solving this problem You estimate that there are 52 marbles in a jar. The actual amount is 88 marbles. Find the percent error. Round to the nearesttenth of a percent if necessary. What are the difference between malachite and pyrite and how they are alike (07.03 LC)What is the solution to the equation x + 7 = 63? How is desalination different from water reclamation? a. desalination is less expensive than water reclamation. b. desalination recharges aquifers. c. desalination provides water suitable for drinking. d. none of the above please select the best answer from the choices provided a b c d Jesselyn made 6 muffins. She used 3/8 teaspoon of baking powder for each muffin. How much baking powder did Jesselyn use for all of the muffins? A.18/48B.9/8C.18/8 D.48/3 help its over due :( The Shakespearean sonnet from the Renaissance is also called the Italian sonnet. TrueFalse expand (5/8x+y^5)(y^5-5/8 x)PLEASE HELP ME PLEASE I WILL GIVE BRAINLYEST Why is the making of metamorphic rock a chemical change? Explain your answer no using 9009le why is concept of gender inclusion necessary give reasons a bowl in the shape of a half-sphere has a diameter of 18cm. what volume of soup can four bowls hold if they are completely filled? The sum of the measures of angle A and angle B is 90 The measure of angle A is (4x + 30)The measure of angle B is (40)What is the value of x? Megan added two numbers and the resulting sum was the new rational number. If the first number was 2/3, which of the following could be the second number? Select two that apply