There are dash types of symbols

Answers

Answer 1

Answer:

logo , pictogram, ideogram, icon, rebus, phonogram and typogram

Explanation:

they are forty symbols


Related Questions

Functions are used to _________

Answers

enable programmers to break down or demolish a problem into smaller chunks

Huffman encoding uses variable length binary strings to represent particular characters. Group of answer choices False True

Answers

The answer is true.

______ states that the value or power of a network grows exponentially as a function of the number of network members.

Answers

Metcalfe's Law

Metcalfe's Law” says that a network's price is proportional to the square of the kind of nodes withinside the network. The forestall nodes can be computers, servers and without a doubt users


Should spreadsheets be used to maintain a checkbook?
YES

NO

Answers

Yes, because it keeps all your data organized and allows you to see the trend and growth of your data by automatically creating different types of charts and graphs to help you visualize your data.

Hope that helps!

A ________________ is a special type of array that implements a last-in, first-out collection of values.

Answers

Answer:

A stack is a special type of array that implements a last-in, first-out collection of values.

A user guide is a type of
O accessibility tool
0 comment
O version control
O documentation

Edge

Answers

When we buy a new object, it usually comes with a user guide, a tool to guide us in its use, and the manufacturer's recommendations.

What is a user guide?

A user guide is a tool that indicates all the recommendations and instructions that the manufacturer advises the consumer to avoid.

For example, if I buy a car, I need to know how it works so as not to misuse it and damage it. Therefore, manufacturers include this tool in the box of all their products.

Learn more about user guide in: https://brainly.com/question/6689072

Answer:

Documentation

Explanation:

A user guide is a type of documentation.

name any five components of the Photoshop window​

Answers

Answer:

File, edit, image, layer, select, filter, view, window & help

Now that you have explored several different languages (Python, HTML, CSS, and JavaScript), what can you do to keep straight which rules apply to which language?​

Answers

The applications are given below:

CSS applies to a stylesheet language or style.Python and JavaScript applies to programming languages.html  will show a horizontal rule and it applies to web browser.

What is CSS?

Cascading Style Sheets (CSS) is nown to be a type of a stylesheet language that is often used to depict a presentation of a document that are written in HTML or XML.

Python is known to be a high-level, all-purpose programming language. that is set up for design code readability.

Learn more about html  from

https://brainly.com/question/4056554

A dim display on a laptop LCD screen might indicate that there is a problem with: (Select 2 answers)

Answers

Answer:

GPU or Display Connector.

Conduct research online or through other means on one source of renewable energy. Describe the applications and benefits of the energy source.
Earth Science (Plato)

Answers

A source of renewable energy is Solar energy.

What is the source of the solar energy?

The sun is known to be the source of Solar energy. This is known as any type of energy that is gotten from the sun.

Solar energy is formed by nuclear fusion that occurs in the sun. Fusion is said to take place when protons of hydrogen atoms does collide in the sun's core and fuse to form a helium atom.

Solar power  or energy benefits includes thermal or electrical energy. One can also get the cleanest and most abundant renewable energy source from here.

Learn more about renewable energy from

https://brainly.com/question/545618

To improve readability and maintainability, you should declare ________ instead of using literal values such as 3.14159.

Answers

π

use the pi symbol,instead of the literal value.

hope this helps!! (gabby)

Your friend Aria is complaining that programming seems too complicated. She says, “Why do we need things like sequence, selection, iteration, and variables? It’s too much to bother with.” Explain to Aria what control structures like sequence, selection, and iteration do and why they are needed. Then tell her why variables are important in programming.

Answers

Answer: A sequence is a basic algorithm. A set of logical steps is carried out in order. A Selection and coding is the section of code that is only carried out if the conditions are met. A iteration is A line of code that is being repeated until the desired results has come out. A variable is a value that can change when the condition is changed your information passed through the program.

Explanation:

Gaining information by tricking an individual into releasing information is often referred to as.

Answers

Answer:

Social engineering

Explanation:

A ________ uses the internet to create the appearance of private, secure connections.

Answers

a VPN uses the internet to create the appearance of private, secure connections

Most P2P apps or services provide safety and privacy features such as verification of payment amount before payment is sent, a user PIN, and _____.

Answers

Most peer-to-peer (P2P) apps or services provide safety and privacy features such as onetime password (OTP).

What is P2P service?

P2P service is an abbreviation for peer-to-peer (P2P) service and it can be defined as a decentralized platform through which two (2) individuals or business firms interact with each other directly, without any third-party or an intermediary  being involved.

Generally, most peer-to-peer (P2P) applications or services provide safety and privacy features to customers such as:

Verification of payment amount before payment is sent.A user PINThe use of a onetime password (OTP).

Read more on P2P here: https://brainly.com/question/26190446

Write an expression (Links to an external site.) that evaluates (Links to an external site.) to true (Links to an external site.) if and only if the integer (Links to an external site.) x is greater than (Links to an external site.) the integer (Links to an external site.) y.

Answers

Answer:

index > last_index

c != str(" ")x == 0profits==losses

What is nail punch in your own words?

Answers

Answer:

in my own words

nail punch

a punch for driving the head of a nail below or flush with the surrounding surface

Explanation:

Sana po naka tolung

correct me if im wrong thanj you

#Brainly

Why do you think You Tube became so popular so quickly? What is its unique appeal?

Answers

Answer:

it became popular because you could post anything in the world and it could be anything ur favorite show memes and pranks  it got so popular because there was no limit even i can post

Explanation:

thats why it is so poular

I think it’s because people can post and watch things they are interested in.

Write a short thesis statement about the IoT (Internent of things) I just need this just for ideas on my thesis statement. :)

Answers

The Internet of Things, or IoT for short, is a relatively new topic in the world of technology. This topic is both engaging and innovative for students pursuing their bachelor's and master's degrees. They can write their M.Tech. or Ph.D. thesis in this field. The internet has become an integral component of our everyday lives. The Internet of Things (IoT) concept is centered on the combination of comfort and the Internet.

Calculate the time necessary to perform a multiply using the approach described in the text (31 adders stacked vertically) if an integer is 8 bits wide and an adder takes 4 time units.

Answers

The time that will be used to perform a multiplication using the approach is 28 time units.

How to calculate time taken?

From the information given, the following can be noted:

A = 8 (bits wide)

B = 4 time units.

The multiplication will be performed based on the adder stack. Since A = 8, then, A - 1 = 8 - 1 = 7.

Now, the time taken will be:

= 7 × B

= 7 × 4tu

= 28 tu

In conclusion, the correct option is 28 time units.

Learn more about time taken on:

https://brainly.com/question/10428039

When an item in a menu is black, it means that _____.
(CORRECT ANSWER GET'S BRAINLIEST)
A) It is the only command that can be selected
B) A dialog box is present
C) The item can be selects
D) The item is unavailable

Answers

Answer:

no sure but I think c

Explanation:

because I am a awesome and cool perso

Answer:

the other person is wrong its d

actually no im wrong it is c lol

A charity is keeping track of donations for one month. The director would like to create a report that groups data by week. Each group will contain donations collected on each day of the week. Which type of calculated figure should the director use to display a cumulative total beneath each group?

running sum

sum

grand total

percentage

Answers

The calculated figure that the director should use to display a cumulative total beneath each group is option A: "running sum".

Which type of calculated figure is this?

A "running sum" is used by the director to display cumulative totals beneath each group. It accumulates the values of a field over time or across a grouping.

Director groups donations weekly and displays total for each day using running sum to calculate and add up amount as days progress. Director groups donations weekly by creating a running sum field that adds daily totals until end of the week. Cumulative totals for each day of the week displayed in report.

Learn more about  sum from

https://brainly.com/question/25734188

#SPJ1

Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond

Answers

Answer:

Request timeout

Explanation:

If a computer makes a request and does not hear a response within an acceptable amount of time, the computer assumes that no answer is coming and reacts accordingly.

The method that allows a computer to react accordingly when it requests data from a server and the server takes too long to respond is request timeout.

What is response timeout?

A response timeout is known to be a situation that often occurs after the request has been sent to the CICS server.

Conclusively, In the aspect of request timeout, this  message is one that often comes up when there is a kind of  firewall that is said to be blocking the connectivity as in the case of the serve in the above question.

Learn more about computer from

https://brainly.com/question/24540334

A __________is a software program that appears to be a physical computer and executes programs as if it were a physical computer.

Answers

Answer:

Virtual Machine

Explanation:

I had to look this up, since there were no options from the question. If this is wrong, let me know!

Which Windows service is used to keep information about the networks the server connects to and communicates network information to applications on the server

Answers

Answer:

windows 7

am I correct..

Which is true regarding how functions work? Group of answer choices A return address indicates the value returned by the function If a function returns a variable, the function stores the variable's value until the function is called again After a function returns, its local variables keep their values, which serve as their initial values the next time the function is called A function's local variables are discarded upon a function's return; each new call creates new local variables in memory

Answers

The true statement is that A function's local variables are discarded upon a function's return; each new call creates new local variables in memory.

What is function?

A function is known to be a term that tells the linkage between a set of inputs that are known to have one output each.

It is known to show the relationship between inputs where each input is said to be linked to one output. Note that a function's local variables are removed from memory when a function's return.

Learn more about function from

https://brainly.com/question/25638609

Once again im asking,
Absolute cell references should be used when possible to avoid having to make multiple updates when a key value changes.
True
False

PLEASE PLEASE HELP MEEE

Answers

Absolute cell references should be used when possible to avoid having to make multiple updates when a key value changes.

True

An absolute cell reference is a cell address that contains a dollar sign ($). It can precede the column reference, the row reference or both. An absolute cell reference can keep a row or a column constant or keep both constant. It doesn't change when copied to other cells.

Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!

Stay Brainy!

-[tex]Kallmekris[/tex]

You are a solutions architect who works at a large retail company that is migrating its existing infrastructure to AWS. You recommend that they use a custom VPC. When you create a VPC, you assign it to an IPv4 Classless Inter-Domain Routing (CIDR) block of 10.0.1.0/24 (which has 256 total IP addresses). How many IP addresses are available

Answers

In this case, there are 251 IP addresses available. They are unique addresses for the Internet Protocol.

What is an IP address?

An Internet Protocol (IP) address is a unique address on Internet, which is used to indicate a local network.

The term 'Internet Protocol' indicates the principles associated with the format of the data used by the local network.

An Internet Protocol address is always denoted by a set of numerical tags that indicate the local network.

Learn more about IP address here:

https://brainly.com/question/24930846

What is a shortcut for adding a timeline marker

Answers

Answer:

To add a marker to a clip in the Timeline, do the following:

Set up a keyboard shortcut for Add Clip Marker in Edit > Keyboard Shortcuts (Windows), or Premiere Pro > Keyboard Shortcuts (Mac OS).

Select the clip.

Place the Playhead where you want to place the marker.

Press the keyboard shortcut you created for Add Clip Marker.

Explanation:

hope this helps!

Answer:

Ctrl+3 (windows) & Cmd+1 (mac)

i hope you mead adobe premium

Which component of windows prompts the user for credentials or permissions to minimize the dangers of unintended software installations?.

Answers

Answer:

User Account Control (UAC)

Explanation:

User Account Control (UAC) prompts the user for credentials or permission in an effort to minimize the dangers of unwanted actions or unintended software installation. Windows firewall protects the system from network attacks. Windows Firewall with Advanced Security (WFAS) is a feature with provides advanced firewall settings beyond the program or service rules enforced by Windows Firewall. Windows Defender scans software for malicious code.

Other Questions
Find each missing measure, PLS help me my last question, i have like 7 pages of math to get done tonight pls help me with this ONE problem!!!!! Write the ratio as a fraction in simplest form, with whole numbers in the numerator and denominator. 40 : 24 What agency owns and operates more than 500 wildlife refuges and 26,000 waterfowlproduction areas?A. The Bureau of Land Management C. Ducks UnlimitedB. The U.S. Fish and Wildlife Service D. The National Park Servic how would the heating curve for glass be different from the heating curve for water What can be used to define anynonvertical line in the Cartesiancoordinate system? can someone help me pls. I will mark you branliest solve by factoring x^2 + 6x = -9 Hint: this is a double root the answer isn't +/-15 A line passes through the point (1,2) and has a slope of 8.Write an equation in point-slope form for this line. What happens when we are we elecrtic shocked? Which sentence from the passage would support the claim that the themes of langston hughes' poetry matched the themes of jazz music?. Andrew was taking a math quiz. There was a question on the quiz that had theexpression 8x 9 12x + 5. Andrew's teacher told the class there was a typoand the expression was supposed to have one set of parentheses in it.-1. Where could you put parentheses in 8x 9 12x + 5 to make a newexpression that is still equivalent to the original expression? How do you knowthat your new expression is equivalent?2.-Where could you put parentheses in 8x - 9 - 12x + 5 to make a newexpression that is not equivalent to the original expression? List as manydifferent answers as you can. in 1960 the population of Indonesia was 88 million. in 2010 the population of Indonesia was 242 million. *calculate the percentage increase from 1960 to 2010? *estimate the population in 2060 if the rate of increase doesn't change After encountering a network attack in your enterprise network, the chief network security engineer assigned you a project. The project was to create a vulnerable network that is similar to your enterprise network and entices the threat actor to repeat the attack. This is to analyze the behavior and techniques the attacker is using to ensure better defenses to your enterprise network in the future. Required:What appliances should you use? discuss three main components of the justice system in south africa Is Harry Potter evil what is the hook There are three types of contractual conditions: condition precedent, condition subsequent, and concurrent conditions. Group of answer choices true false List the potential solutions to 2 ln x = 4 ln 2 from least to greatest. X = and x =. 1. The nurse asked the young man to ___ the child on the bed.a. lyeb. layc. lie2. she has ____ away from home.a. running b. ranc. run3. which of the following is written in the passive voice.a. the meeting was held at the office.b. they were having a meeting at the office.c. the meeting had taken place at the office. HELPP ASAPPP PLSSShakespeare's A Midsummer Night's Dream is a __________ version of what could happen if Queen Elizabeth I did not have a successor while Shakespeare's Hamlet was the _________ version of what could occur if she did not have a successor. drama; tragiccomedic; tragictragic; dramatragic; comdeic Pls help me im drowned !!!