________ group is used to select font styles. ​

Answers

Answer 1

Answer:

The font group............. ...


Related Questions

Which is the highest level of the hierarchy of needs model?

A.
humanity
B.
intrapersonal
C.
team
D.
interpersonal
The answer is A

Answers

Answer:

A

Explanation:

Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B

Answers

Answer:

The answer is D. A and B

Explanation:

I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.

Answer: The answer is D. A and B

Explanation: I took this test 5 mins ago and it was right.

Compute the weakest precondition for each of the following assignment statements and postconditions:

a = 2 * (b - 1) - 1 {a > 0}
b = (c + 10) / 3 {b > 6}
a = a + 2 * b - 1 {a > 1}
x = 2 * y + x - 1 {x > 11}

Answers

Answer:

a) b > 3/2

b) c > 8

c) b > 1 - a/2

d) y > 6 - x/2

Explanation:

a)

a = 2 × (b - 1) - 1   {a > 0}

2 × (b - 1) - 1 > 0

2b - 2 - 1 > 0

2b - 3 > 0

2b > 3

b > 3/2

b)

b = (c + 10) / 3 {b > 6}

(c + 10) / 3 > 6

multiply both side by 3

((c + 10) / 3) × 3 > 6 × 3

c + 10 > 18

c > 18 - 10

c > 8

c)

a = a + 2 × b - 1 {a > 1}

a + 2 × b - 1 > 1

a + 2b - 1 > 1

a + 2b > 1 + 1

2b > 2 - a

divide both sides by 2

2b/2 > 2/2 - a/2

b > 1 - a/2

d)

x = 2 × y + x - 1 {x > 11}

2 × y + x - 1 > 11

2y + x - 1 > 11

2y + x > 11 + 1

2y + x > 12

2y > 12 - x

divide both sides by 2

2y/2 > 12/2 - x/2

y > 6 - x/2

To help mitigate the Target breach, system administrators should have implemented a system that only allowed certain programs to run on the POS (Point of Sale) system. What is the term for this concept?

Answers

Answer:

application whitelisting

Explanation:

Application Whitelisting is a term used in computer engineering to describe a situation where a system administrator implemented a system that only allowed certain programs or applications that have been approved to run or functions exclusively on a computer or network. It is considered to be more secure.

Hence, in this case, the correct answer is called APPLICATION WHITELISTING

Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).

Answers

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores

Answers

Answer:

Explanation:

The following is written in Java. It is a method/function that takes the oldScore as an int input. It turns it into a String, separates all the digits, puts them into an array. Then adds the first digit to the end and removes it from the beginning, thus shifting the entire score one to the left. Then it turns the String variable back into an Integer called finalScore and prints it out.

public static void newScore(int oldScore) {

       ArrayList<Integer> newScore = new ArrayList<>();

       String stringOldScore = String.valueOf(oldScore);

       for (int x = 0; x < stringOldScore.length(); x++) {

           newScore.add(Integer.parseInt(String.valueOf(stringOldScore.charAt(x))));

       }

       newScore.add(newScore.get(0));

       newScore.remove(0);

       String newScoreString = "";

       for (int x:newScore) {

           newScoreString += String.valueOf(x);

       }

       int finalScore = Integer.parseInt(newScoreString);

       System.out.println(finalScore);

   }

Select the items that can be measured.
capacity
smoothness
nationality
thickness
distance
scent
income

Answers

Answer:

distance

capacity

smoothness

thickness

capacity, smoothness, thickness, distance, income

explain mechanical computer ,electromechanical and electronic computer with example

Answers

Answer:

A mechanical computer uses moving parts to do it’s calculations. Think old style adding machines.Electronic computers use electronic oscillators to generate a clock. The oscillator might include a mechanical element such as a crystal, but the majority of the clock signal is processed in the electrical domain.

Explanation:

An example of a mechanical computer clock is a Swiss watch movement, which needs no electronics. Movement is based upon springs coupled to other mechanical pieces. Swiss watches are high precision mechanical computers that do counting. There are other types of more sophisticated mechanical computers. Research the works of Konrad Zuse and his Z1 mechanical computer.

How can we use variables to store information in our programs?

Answers

Computer programs use variables to store information.
...
To make a simple program that displays your name, you could program the computer to:
Ask for your name.
Store that answer as a variable called 'YourName'.
Display “Hello” and the string stored in the variable called 'YourName'

We can create tables in MS. Word from *
2 points
Insert Tab
Home Tab
Mailings Tab

Answers

Answer:

insert tab

Explanation:

hope it helps

Answer:

we can create tables in ms word from Insert table

What causes them to catch your attention in advertisements?

Answers

Answer:

advertisement should be nice and attractive to get attention of people

Write a program with 2 separate functions which compute the GCD (Greatest Common Denominator) and the LCM (Lowest Common Multiple) of two input integers.

Answers

Answer:

The program written in Python is as follows

def GCD(num1, num2):

    small = num1

    if num1 > num2:

         small = num2

    for i in range(1, small+1):

         if((num1 % i == 0) and (num2 % i == 0)):

              gcd = i

    print("The GCD is "+ str(gcd))

def LCM(num1,num2):

    big = num2  

    if num1 > num2:

         big = num1

    while(True):

         if((big % num1 == 0) and (big % num2 == 0)):

              lcm = big

              break

         big = big+1

     print("The LCM is "+ str(lcm))

 print("Enter two numbers: ")

num1 = int(input(": "))

num2 = int(input(": "))

GCD(num1, num2)

LCM(num1, num2)

Explanation:

This line defines the GCD function

def GCD(num1, num2):

This line initializes variable small to num1

    small = num1

This line checks if num2 is less than num1, if yes: num2 is assigned to variable small

    if num1 > num2:

         small = num2

The following iteration determines the GCD of num1 and num2

    for i in range(1, small+1):

         if((num1 % i == 0) and (num2 % i == 0)):

              gcd = i

This line prints the GCD

    print("The GCD is "+ str(gcd))

   

This line defines the LCM function

def LCM(num1,num2):

This line initializes variable big to num2

    big = num2  

This line checks if num1 is greater than num2, if yes: num1 is assigned to variable big

    if num1 > num2:

         big = num1

The following iteration continues while the LCM has not been gotten.

    while(True):

This if statement determines the LCM using modulo operator

         if((big % num1 == 0) and (big % num2 == 0)):

              lcm = big

              break

         big = big+1

This line prints the LCM of the two numbers

     print("The LCM is "+ str(lcm))

The main starts here

This line prompts user for two numbers

print("Enter two numbers: ")

The next two lines get user inputs

num1 = int(input(": "))

num2 = int(input(": "))

This calls the GCD function

GCD(num1, num2)

This calls the LCM function

LCM(num1, num2)

See attachment for more structured program

Consider an instruction within a certain instruction-set architecture (ISA): ADD R1, R2, R3. This instruction adds the value in Register R1 with the value in Register R2, and stores the result in Register R3. What is the maximum number of physical memory accesses that may be caused by this single instruction?
a) 1
b) 2
c) 3
d) 4

Answers

Answer:

C = 3

Explanation:

The maximum number of physical memory accesses that may be caused by this single instruction is ; 3

This is because In the case of loading two values into R2 and R3 there is need for their memories to be accessed and after execution R1 value there will be a write back into memory hence another memory is also accessed and that makes the number of Physical memories accessed to be three(3) in Total

Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.

What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?

Answers

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

discuss data and its types from computer programming and data analysis prospectively?​

Answers

Answer:

With the use of data and their types the extent of how much data can be stored can get insanely large. types like doubles and longs allow for a range of values nearly incomprehensible in their size for storing user information, web pages, games ect. Using them essentially allows you to plan for the future of the size of whatever you're creating. On top of that, it allows for a preciseness not typically able to be reached without these types.

Raw information that is made up of simple facts and figures is referred to as data. Computer data can take many different forms, including financial data, notes, photographs, and coding.

What is data?

The amount of data that may be kept can become absurdly vast depending on how it is used and the categories of data. For storing user information, web pages, games, etc., types like doubles and longs provide for a range of values almost incomprehensible in their vastness.

Utilizing them effectively enables you to plan for the magnitude of whatever you're developing in the future. Additionally, it enables a level of precision that is often not possible without these types.

Therefore, raw information that is made up of simple facts and figures is referred to as data. Computer data can take many different forms, including financial data, notes, photographs, and coding.

To learn more about data, refer to the link:

https://brainly.com/question/10980404

#SPJ5

What game is this? helpppppp

Answers

Answer:

the sims lol

Explanation:

so i am on a Chromebook with headphones , and I am wondering if you can make it that a tab only play sound on one side of the headphones and other tabs to the other side of the headphones

Answers

No you cannot do that with a single pair of headphones. If you had an dual aux split... you could plug in two pairs of headphones... even if you had two bluetooth pairs I don't think it'd be possible... What do you need to do that for? Maybe I can help find an alternative solution

A network the size of the Internet requires DNS services in order to function. Discuss the advantages and disadvantages of implementing DNS relative to the size of the network.

Answers

Answer:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

Explanation:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?

Answers

Answer:

3 Volts.

Explanation:

Answer:

3 Volts

Explanation:

Because Power = Voltage x Current, so if you substitute the values into the equation, it would be :

2.4 W = Voltage x 0.8 A

Then if you rearrange the equation, it would be :

2.4 W / 0.8 A = Voltage

Which is :

3 V = Voltage

What is an example of an absolute cell reference? 52% D2 $B$5 !90!

Answers

Answer:

$B$5 is an example of absolute cell reference

Explanation:

There are two types of referencing in MS Excel.

1. Relative

2. Absolute

Relative cell referencing changes according to the corresponding new cells when it is copied in other cells. MS Excel uses relative cell referencing by default.

Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.

From the given choices in question,

$B$5 is an example of absolute cell reference

An example of an absolute cell reference is "$B$5".

Thus, option (C) is correct.

Cell references can be either relative or absolute.

A relative cell reference changes when it is copied to another cell.

For example, if you have a formula in cell C2 that references cell A2 as "=A2+1", and you copy this formula to cell C3, it will automatically adjust to "=A3+1".

An absolute cell reference remains constant, regardless of where it is copied. When a cell reference is made absolute, the dollar sign ($) is used to indicate this.

For example, if you have a formula in cell C2 that references cell B5 as "=B$5+1", and you copy this formula to cell D3, it will still refer to cell B5 as "=B$5+1". The row and column references remain fixed.

Therefore, "$B$5" is an absolute cell reference.

Thus, option (C) is correct.

Learn more about Cell Reference here:

https://brainly.com/question/30714866

#SPJ6

Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs will be most helpful?

A. counter module

B. while loop

C. for loop

D. mean module

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is A: counter module.

Counter module in python or Python counter is a container that holds the count of each of the elements present in the container. It is a sub-class available in the dictionary class. Jamal can use this module in Python to write a program that will find the 10 most common words in Romeo and Juliet.

Other options are not correct because:

While loop: while loop only iterates its body until a specific condition is met. For loop is used to iterate to a pre-specified condition and iterate until the condition is reached. While the mean module of Python is used to calculate mean and average.

A scared kangaroo clears a fence that is 2.44 meters tall. What is the vertical component of the kangaroos velocity at take off ? If the horizontal component of the kangaroos velocity is 4.80 m per s at what angle did the kangaroo take off the ground? (hint: at its maximum height the kangaroos vertical velocity is 0)

Answers

Answer:

a) The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.

b) The angle at which the kangaroo took off the ground is approximately 46.066º.

Explanation:

a) According to the statement, the kangaroo has an initial horizontal velocity and jumps to overcome the fence until velocity becomes zero. If effects from non-conservative forces can be neglected, then we represent the situation of the kangaroo by Principle of Energy Conservation:

[tex]K_{1}+U_{g,1} = K_{2}+U_{g,2}[/tex] (Eq. 1)

Where:

[tex]K_{1}[/tex], [tex]K_{2}[/tex] - Initial and final translational kinetic energies, measured in joules.

[tex]U_{g,1}[/tex], [tex]U_{g,2}[/tex] - Initial and final gravitational potential energies, measured in joules.

By definitions of translational kinetic and potential gravitational energies, we expand and simplify the equation above:

[tex]\frac{1}{2}\cdot m\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = m\cdot g \cdot (y_{2}-y_{1})[/tex]

[tex]\frac{1}{2}\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = g \cdot (y_{2}-y_{1})[/tex] (Eq. 2)

Where:

[tex]m[/tex] - Mass of the kangaroo, measured in kilograms.

[tex]g[/tex] - Gravitational acceleration, measured in meters per square second.

[tex]y_{1}[/tex], [tex]y_{2}[/tex] - Initial and final heights of the kangaroo above the ground, measured in meters.

[tex]v_{1,x}[/tex], [tex]v_{1,y}[/tex] - Vertical and horizontal initial velocities, measured in meters per second.

[tex]v_{2,x}[/tex], [tex]v_{2,y}[/tex] - Vertical and horizontal final velocities, measured in meters per second.

If we know that [tex]v_{1,x} = 4.80\,\frac{m}{s}[/tex], [tex]v_{2, x} = 0\,\frac{m}{s}[/tex], [tex]v_{2,y} = 0\,\frac{m}{s}[/tex], [tex]g = 9.807\,\frac{m}{s^{2}}[/tex] and [tex]y_{2}-y_{1} = 2.44\,m[/tex], then (Eq. 2) is reduced into this:

[tex]11.52+0.5\cdot v_{1,y}^{2}=23.929[/tex]

Lastly, we solve for [tex]v_{1,y}[/tex]:

[tex]0.5\cdot v_{1,y}^{2}=12.409[/tex]

[tex]v_{1,y}^{2} = 24.818[/tex]

[tex]v_{1,y} \approx 4.982\,\frac{m}{s}[/tex]

The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.

b) The angle at which the kangaroo took off the ground ([tex]\theta[/tex]), measured in sexagesimal degrees, is obtained by the following inverse trigonometric relation:

[tex]\theta =\tan^{-1}\left(\frac{v_{1,y}}{v_{1,x}} \right)[/tex] (Eq. 3)

[tex]\theta = \tan^{-1}\left(\frac{4.982\,\frac{m}{s} }{4.80\,\frac{m}{s} } \right)[/tex]

[tex]\theta \approx 46.066^{\circ}[/tex]

The angle at which the kangaroo took off the ground is approximately 46.066º.

Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75). You should use input to read a string and float() to convert the string to a number. Do not worry about error checking the user input - assume the user types numbers properly.​

Answers

I've included my code in the picture below. Best of luck.

Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote

Answers

Answer:

tyafana

Explan

ation:n umbers

The designer of an agent traveled to a beach for a holiday. He took the agent to the beach. He wanted the agent to capture the sunrise and the high tide. What kind of knowledge representation will the agent use in this new environment?

A.
picture
B.
number
C.
graph
D.
meta

Answers

The answer is C. Which is graph

Answer:

Picture

Explanation:

What is the benefit of encapsulation?

A. To rename variables
B. To reuse code
C. To make all members public
D. To make all members protected

Answers

Answer:

B. To reuse code

Write a JavaScript script that has subprograms nested three deep and in which each nested subprogram references variables defined in all of its enclosing subprograms.

Answers

Answer and Explanation:

Subprograms are nested three deep hence we would have three subprograms/functions under one program(function)

We call the program/function MotherFunction( using camel case variable naming rules)

function MotherFunction() {

var mother= 8;

console.log(mother);

function subDaughter1() {

var subDaughter1X = mother + 12;

console.log(subDaughter1X);

function subDaughter2() {

var subDaughter2X= mother + 5;

console.log(subDaughter2X);

function subDaughter3() {

var subDaughter3X= mother + 3;

console.log(subDaughter3X);

alert("sum="+subDaughter1X+subDaughter2X+subDaughter3X);

}

}

}

}

MotherFunction();

We created the first function and nested subfunctions under it, adding up the variable from the parent function(mother function) to its subfunctions and then alerting the total value of all the subfunction variables summed in the last/third subfunction. We then called the function after defining it.

Write a command that will list the names of all link files in the working directory, sorted by inode number.

Answers

Answer:

The answer is "Is command".

Explanation:

This command can be used to display the directory lists via input data throughout the command-line tool. It is a standard result of this report are described, that would be redirected to the command to display the directory information in alphabetical order. This command is part of its GNU core tool package, which is required on all Linux distributions.

how do you keep word from trying to capitalize every isolated letter "i"

Answers

Write "i" the write random words then delete it and add the lowercase i
Answer: It’s best to write the letter “i” then on the word suggestions, click “i” and repeat it a few times to let the phone register that you only want your individual “i” to be lowercase.

The coding system that has just two characters is called:

a
binary
b
dual.
c
basic.
d
double.

Answers

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

Answer:

a binary

Explanation:

ascii. an agreed method for paring the alpanumeric characther set with binary repersenations used in computers. binary. Pertaining to a number system that has just two unique digits 0 and 1. binary code.

Other Questions
Given: AB GF = O, E interior of GOB, H interior of AOF. Without changing the picture indicate: PLEASE HELP ILL GIVE BRAINLIEST Theodor Schwann was a German scientist who wanted to understand how different types of cells worked and performed functions in different tissues. He was one of the first to theorize that all living things are made up of cells. Rudolf Virchow was a German doctor who wanted to discover the origin of diseases. He accepted the idea that all living things are made up of cells and extended the idea to theorize that many diseases are the result of bacterial cells infecting the body.The example described above suggests that A. scientific discoveries are never made by doctors. B. scientists always have the same goals when making related discoveries. C. German scientists were the first to disprove cell theory. D. people with different goals can make contributions to scientific knowledge. -4y - 20 +19= -y + 172. Solve for yi posted the same question but they didnt tell me how they got it so could someone show me how they got the answer pleaseee help! im confused and 100 points Which is the BEST description of the Treaty of Ninety Six?A)Backcountry Loyalists agreed that they would stay neutral in the fightagainst the British during the American Revolution.B)It marked a turning point in the war because the colonies gained thesupport of France in their fight against the British.C)Lowcountry planters agreed to stop fighting and cooperate with the Britishin exchange for the right to trade in the Caribbean.DIt marked the end of South Carolina's involvement in the Revolutionbecause the Patriot militia was forced to surrender after the Battle of KingsMountain What is the link between propaganda and rhetorical devices?The person gets brainliest What is Peat coal? Give pictures because I don't know which is peat coal. Please look at the imagine and tell me what the answer is PLEASE ANSWER THESE 4 QUESTIONS WILL MARK BRANLIEST I AM TIMED :) Based on the chemical equation, use the drop-down menu to choose the coefficients that will balance the chemical equation: ( )O2->( )O3 1 1 2 2 3 3Its one of the numbers for each blank space inside the parenthesis write 5 sentences about why is it important to keep a healthy life style and eating healthy food (its for a 3rd grader ) What is Isaac Newtons third law of motion? Explain? what college is better Massachusetts Institute of Technology or University of Chicago? lemme kno plz nd thx foo. HELP I AM TIMED I WILL MAR BRAINLEST Analyze the photos below and answer the question that follows.Four photos are placed next to each other labeled 1, 2, 3, and 4. 1 is a crowd of people on a street. 2 is a crowd of people inside a building. 3 is an aerial view of a city. 4 is a road in the countryside.Images by Misterzee, Two Wings, ningyou, and John HaynesWhich of the four photos above shows a rural area?A.Image 1B.Image 2C.Image 3D.Image 4Please select the best answer from the choices provided Find the quotient mentally. Convert a fraction into a decimal2 and one half divided by one third ok this is the last one what points are solutions to the linear equality graph? Select all that apply.A. (0,0)B. (-1,2)C. (-3,0)D. (3,0)E. (-4,-1)F. (2,2) Ivian scores 58 out of 80 marks in a maths test what is his score as a percentage Henry wrote a total of 12 pages over 4 hours. How many hours will Henry have to spend writing this week in order to have written a total of 15 pages? Assume the relationship is directly proportional.