Select all examples of proper keyboarding technique.

Look at the keys while keyboarding.
Keep your hands higher than your elbows.
Sit up straight.
Relax your fingers.
Aim to make no mistakes.

Answers

Answer 1

Answer:

all except keeping your hands higher than your elbows

Answer 2

Answer:

Sit up straight.

Relax your fingers.

Aim to make no mistakes.

Explanation:


Related Questions

If a function is called more than once in a program, the values stored in the function's local variables do not _________ between function calls. g

Answers

Answer:

persist

Explanation:

Calling a function Within a program, can be regarded to as specifying of the name of the function when it is within a statement or it could be by the function itself, it possible for a particular function to call another function, in a case wherby a function returns a value, assignment or using the value to variable is not necessary. It should be noted that If a function is called more than once in a program, the values stored in the function's local variables do not persist between function calls

Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?

Answers

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

Documenting findings, actions, and outcomes of network troubleshooting calls is an essential part of the troubleshooting process. List the reasons why documentation is critical, and discuss the form that this documentation could take (e.g. blogs, wikis, professional document management software, etc). Include a detailed description of what information would need to be saved.

Answers

Answer:

The main purpose of documentation is for future reference on the cost, materials, procedures, and techniques used in a task. It can be in form of a video log, report, digital text document or software, etc.  

Explanation:

Documentation is an important practice of taking notes of events during a process. It could in the process of creating or discovering new ideas or repair or management of existing processes. It holds the time, cost, technique, event name, measures-taken, etc, that would totally describe the event.

Type the correct answer in the box. Spell all words correctly.

A freelance graphic designer has received an assignment to design a company logo. What image format is most suitable to display this logo on the company website?

The _________ format is most suitable in order to display the logo on the company website.

Answers

Answer:

The most suitable format for logo is PNG

Explanation:

PNG stands for portable network graphics. It is an improved version of gif. The best thing in png is that it is lossless compression and the background is not visible. Both 24 and 32 bit Colour can be used in png. PNG became ISO standard in sixteen years ago in 2004.

It is always better to get at least 3 times the amount of b-roll needed

True
False

Answers

Answer:

true

Explanation:

write the code that writes access granted if the correct password, swordfish is entered and access denied! otherwise

Answers

In python 3.8:

if input("Enter password: ") == "swordfish":

   print("access granted")

else:

   print("access denied!")

What is the main advantage of using a WYSIWYG (“what you see is what you get”) editor when constructing a website?
Only one programming language is required.
Websites may have more professional construction.
Knowledge of HTML is not required.
Website templates are not necessary.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer among the given options to this question is:

Knowledge of HTML is not required.

Because when you are constructing a website using WYSIWYG (“what you see is what you get”) editor, then you don't need the knowledge of HTML. Because, when you use WYSIWYG editor to insert button, table, images, text, paragraph, etc. It will automatically insert HTML code behind the page. For example, you can insert a form and a submit button using drag and drop with the help of WYSIWYG (“what you see is what you get”)  editor, for this purpose, you don't need exact knowledge of HTML. WYSIWYG (“what you see is what you get”)  automatically inserts the HTML for the form and button on a website page.

While other options are not correct because:

Using the WYSIWYG (“what you see is what you get”)  editor, you can use different programming languages in your website, such as VB.net, Asp.Net, C#, Javascript, Bootstrap, etc. It is not necessarily that you may have more professional construction and in WYSIWYG (“what you see is what you get”)   website templates are mostly used and modified using WYSIWYG editor.

Answer:

(C):Knowledge of HTML is not required.

Write a program that gives simple math quizzes. The program should display two random numbers that are to be added, such as:

Project 5-11 output

The program should allow the student to enter the answer. If the answer is correct, a message of congratulations should be displayed. If the answer is incorrect, a message showing the correct answer should be displayed.

Answers

Answer:

6

Explanation:

the answer would have to be 6

which two pieces of information must be provided when saving a file for the first time in wordpad​

Answers

The name and the saving location.

How many fnaf games did Scott Cawthon make?

Answers

Answer:

8 but he is making FNaF security breach

Explanation:

there is FNaF VR help wanted

Answer:

8 or 10

Explanation:

Which feature is being used when connecting a device to the network using an electrical outlet?

Answers

Answer:

In other words, a WiFi bridge can convert Ethernet to WiFi. WiFi bridges can be high-performance and can support more WiFi network types than the T7-Pro can.

What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures are a good mitigation against the specific attack. g

Answers

Answer:

Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.

Explanation:

The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.

SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.

Write a simplified machine language program that has register $s0 loop through the numbers 0, 100, 200, ..., 500. See Lab 11 for details on submitting the simplified machine language programs.

Answers

Answer:

Explanation:

     li $s4 , 100 // Initialize register $s4 with 500 for checking the condition when $s0 is equal to 500

Loop : li $s0 , 0 // Initialize register $s0 with0

abc : addi $s0 , 100  // Add 100 to register $s0

bne $s0, $s4 , abc  // Branch to label abc if not equal to 500

beq $s0, $s4 , Loop   // Branch to label Loop if equal to 500

Assuming int numbers[SIZE]; is initialized somehow, write a function counter() that you can send the array to, plus an extra integer, and the function will return the number of times that value is found in the array. For example, if the array of SIZE 7 contains {1,2,3,2,3,3,3}then the call
x=counter(numbers,SIZE,3); will put 4 into x.

Answers

Answer:

Explanation:

The following function is written in Java and takes in three parameters the array, its size, and the chosenNumber that will be counted. The function then creates an instance variable called Counter and loops through the given array looking for the chosenNumber. Every time that the number is found in the array it adds 1 to the counter. Once the loop is done it returns the total value of the counter variable.

 public static int counter(int[] numbers, int Size, int chosenNumber) {

       int counter = 0;

       for (int x = 0; x < Size; x++) {

           if(numbers[x] == chosenNumber) {

               counter++;

           }

       }

       return counter;

   }

Your project will require a 7-day work week rather than the traditional 5-day. How can you adapt the software to this new schedule

Answers

Answer:

Click on the Project Tab then the Change Working Time Tab

Explanation:

The software here is believed to a MICROSOFT PROJECT. This is used often by project managers to manage projects particularly in terms of project duration, methods of the undertaking, resource management, reports, etc.

Hence, to adapt the software to this new schedule to a 7-day work week from the traditional 5-day, one should "Click on the Project Tab then the Change Working Time Tab."

This can be done by

1. Click on the Project tab, then click on Properties group

2. Click on Change working time

2. From the Change Working Time window click on "Create new calendar"

3. Name your calendar a name, in this case, "7 day week, " from there on keep following the prompt questions to finish the settings.

4. After the working times are set, click Ok.

Please have a look at the screenshot below

Answers

C. Reliability

Because of the network and recovery time



Plz give brainliest

Write a recursive function that accepts two arguments into the parameters x and y. The function should return the value of x times y. Hint: multiplication can be performed as repeated addition. Test your recursive function by prompting the user to enter values for x and y and then displaying the result. Your function should be able to handle multiplication of negative values.

Answers

Answer:

In Python:

def times(x,y):

     if y<0:

           return -1*times(x,y*-1)

     if y == 1:

           return x

     return x + times(x,y-1)

x = int(input("x: "))

y = int(input("y: "))

print(times(x,y))

Explanation:

I answered the question using Python3

This defines the function

def times(x,y):

This checks for negative values

     if y<0:

           return -1*times(x,y*-1)

This is the base case where y = 1

     if y == 1:

If true, the value of x is returned

           return x

This returns the recursion and it is repeated until the base case is achieved

     return x + times(x,y-1)

This prompts user for x value

x = int(input("x: "))

This prompts user for y value

y = int(input("y: "))

This calls the recursion and also prints the result

print(times(x,y))

12. The best method of protecting the residential user with an Internet connection from intruders out on the Internet is to use

Answers

Answer:

Updated OS software patches

Explanation:

Firstly we need to know that patches are those software updates as well as operating system updates that addresses the vulnerabilities In a program or a products security. Software operators may decide to roll out new updates which have the power to fix performance bugs in a program as well as providing more enhanced methods of security.

Explain how a stored procedure is processed by the DBMS query processor (including the type of return value after the query is processed

Answers

Answer:

The stored procedures in DBMS can be executed with;

EXEC procedure_name

It can also be executed with single or multiple arguments with

EXEC procedure_name (use the at tag here)Address= data1, (use the at tag here)Address= data2;

It returns a status value of the queried table.

Explanation:

A stored procedure is a subroutine used in SQL servers to perform a task on a table in a database or the database itself. The syntax for creating a stored procedure is;

CREATE PROCEDURE procedure_name

And then, other statements can be written to be executed when the procedure is called.

list any three importance of computer​

Answers

Answer:

here is the answer

Explanation:

1) accurate

2) fast

3) can accomplish tasks more effencily

Write an LC-3 assembly language program to read in a two-digit decimal number whose digits add up to less than 10 and display the sum of those digits in the next line.
Sample execution (user input underlined) : Please enter a two-digit decimal number > 27. The sum of the digits = 9

Answers

Answer:

Explanation:

.MODEL SMALL

.STACK 100H

.DATA

   STR1 DB 0AH,0DH, 'THE SUM OF TWO DIGITS PRENT IN THE GIVEN NUMBER'

   FNUM DB ?

   STR2 DB ' AND '

   SNUM DB ?

   STR3 DB ' IS '

   ANS DB ?

   STR4 DB ' $'

.CODE

MAIN PROC

   MOV AX, "at" DATA       PLEASE NOTE: your "at" need to be in symbol

   MOV DS,AX                    It is because this text editor who allow the sub-

                                            mission of this answer if i use the symbol format

   MOV AH,2                       that is why put it in bold and parenthesis

   MOV DL,3FH

   INT 21H

   MOV AH,1

   INT 21H

   MOV BL,AL

   MOV FNUM,AL

   INT 21H

   MOV SNUM,AL

   ADD BL,AL

   SUB BL,30H

   MOV ANS,BL

   MOV AH,9

   LEA DX,STR1  

   INT 21H

   MOV AH,4CH

   INT 21H

   MAIN ENDP

END MAIN

One vulnerability that makes computers susceptible to walmare is:
A. A using antimalware software
B. Using password software
C. Using old versions of software
D. Using encryption on sensitive files

Answers

C using old versions of software

If you wanted to make the system sequentially consistent, what are the key constrains you need to impose

Answers

Answer:

The call of instructions and data must be sequential, there can be no reordering of instructions but to allow reordering, a fence must be created.

Explanation:

Sequential consistent memory model is able to use instructions when or before processing is done and after processing, so long as the instruction order is sequential.

This is similar to uploading a video on you-tube, the site immediately creates a page for the video even before the video is fully uploaded. Sent tweeter messages are seen by different people at different times, but the messages appear to be arranged sequentially.

What are url addresses for visiting websites? And what are the different parts of a URL? Answer it in a 1-2 paragraph

Answers

A URL is a website link which consists of //https and the title of the website you are going to. A URL helps guide and memorize certain links and websites. Also some URL links are fake and give false advertisement or false information especially when looking into things that happen everyday like the news. You can tell this by seeing if the url link is a trustworthy link. I hope this helps maybe you can expand on it if it’s not long enough

Answer:

Please read explanation

Explanation:

URL is the short form for "Uniform Resource Locator". A uniform resource locator tells the location of a website to the browser.

Parts of URL:

There are three main parts of URL

ProtocolDomain nameExtension

Protocol defines the type of protocol used for communicating with the website while the domain name is the name assigned to the IP address and the mapping is stored in domain name server and extension tells the type of website i.e.

.com means commercial

.org means non-profitable organization

.edu means educational website

An additional element is path which change with the website navigation.

For things like school, you should have a more serious:

Answers

Answer:

who and what do you mean

Explanation:

active cell is indentifed by its thick border true or false​

Answers

Answer:  It's identifed by its thick border so its true

Answer: true is correct

What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption

Answers

Explanation:

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major advantage of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main disadvantage of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. A major advantage of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), a disadvantage.

A strategy for concealing critical information as well as ensuring its secure communication everything in non-hidden storage is steganography.

Advantage:

Because the content is contained throughout a non-secure file, the above strategy decreases the chance of an assault on classified info.

Disadvantage:

This approach has the disadvantage that concealed information might be able to retrieve if somehow the documents have been changed or deleted as of a non-secure file.

Once again to encrypt as well as decode information, symmetric encryption employs a unique key, but asymmetric encryption utilizes two different keys, something for encryption as well as someone else for decryption.

Advantage:

One such approach is superior to steganography throughout the level of protection.

Disadvantage:

Because distinct keys have been needed to get access, such techniques of asymmetric encryption are considerably slower.

Thus the approach above is correct.

Learn more about steganography here:

https://brainly.com/question/15187715

Describe one practical application of total internal reflection. ​

Answers

Answer:

The phenomenon of total internal reflection of light is used in many optical instruments like telescopes, microscopes, binoculars, spectroscopes, periscopes etc. The brilliance of a diamond is due to total internal reflection. Optical fibre works on the principle of total internal reflection.

Explanation:

thank me later but if it wrong. sorry

PLS I WILL GIVE BRAINLIEST IF CORRECT

Select the correct answer.

Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?


A. hierarchical
B. linear
C. webbed
D. wheel

Answers

Answer:webbed

Explanation:

k

Answer:

Webbed

Explanation:

What is the purpose of the Error Alert feature?

Answers

Answer:

When you add data validation to a cell, the Error Alert feature is automatically turned on. It blocks the users from entering invalid data in the cell.

Explanation:

There ya go.. -_-

Answer:

A) To alert the user to data entry mistakes  

Explanation:

Other Questions
1. True or false: The setting of a story can change as thestory developsA. TrueB. False Kimoni wants to purchase a pair of shoes that are on sale for 10% off the regular priceof $64.00. Which is the sale price of the shoes? What does 9+10 equal? Plzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz someone helpSpanish Simplify 3/5+(-1/4) 7/10 (x 4)2 = -9 has no real solution What the cause of neutrality Please help!3 3/4 = r + 1/8 after trying a few pairs of boots sima decidecs yo buy a pair thjat all the girls at school wear even tho the boots are un comfy for her what is this an example of Find all solutions in the interval [0, 2) for 2 sin^2 x = sin x Option A: x = pi divided by three., two pi divided by three. Option B: x = pi divided by two, three pi divided by two., pi divided by three., two pi divided by three. Option C: x = 0, , pi divided by six, five pi divided by sixOption D: x = pi divided by six, five pi divided by six(Will mark brainliest) Which of the religions below has no single founder and is considered eternal?Sanatana DharmaBuddhismIslamAjivikaSikhism(25 points) NO TROLLS What weakness did delegates at the Constitutional Convention see in the Articles of ConfederationA. Some states remained loyal to Great Britain.B. The federal military was not able to provide for national security.C. The states could not raise money by collecting taxes.D .The federal government was too strong. If you're good at math, explain this. ASAP PLZZZZZZZZ HELP _____________ waves need a medium to travel, but _____________ waves do not.Group of answer choicessound; lightsound; electricallight; soundelectrical; light You can overdose on alcohol.Oa) trueOb) false 1. An element is defined by the number of:ElectronsProtonsNeutronsChemical Bondslons A child pulls a toy across the floor. What is the equal and opposite force for the force of the child pulling forward on the toy as described by Newton's third law? Choose 1 answer: Choose 1 answer: (Choice A) A Ground's normal force pushes up on the child's feet. (Choice B) B Ground's friction pushing on the toy (Choice C) C Child's feet's friction pushing on the ground in the opposite direction (Choice D) D Toy pulls on the child in the opposite direction To register your vehicle, you'll need _____. CELLULAR RESPIRATION!!!How does the cell get the sugar and oxygen needed for cellular respiration? Refer to The Lady, or the Tiger?no matter how the affair turned out the youth will be disposed of and the king would take an aesthetic pleasure in watching the course of events which will determine whether or not a young man had done wrong in allowing himself to love the princess.A) The king is considerate of his daughterB) The daughter is not considerate of her loverC) The king is considerate of the young manD) The young man is not considered of the princessE) The King is not considered of his daughter