what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage

Answers

Answer 1

Answer:

could have used a browser  but ok

Explanation:

The arrangement of various flash elements such as the tools panel control panel property inspector and windows is called the Workspace. Explanation: The workspace in a computer system makes us easy to navigate to different features and control options.


Related Questions

A laptop can be kept on palm to work. [true/false) ​

Answers

Answer:

Explanation:

false

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.
As a first responder, which of the following is the next BEST step to perform?
A. Prevent such an incident from occurring again.
B. Investigate how the attack occurred.
C. Contain the problem.
D. Hire a forensic team to gather evidence.

Answers

Answer:

First you need to investigate how the attack occurred, because if you don't know the root cause how are you going to prevent it from happening again.

Hope this help please give the brainliest award.

is a technique for breaking a problem down into smaller, less complex parts.



A- Pattern recognition
B- Decomposition

Answers

Decomposition hope this helps :)

Answer:

B) decomposition

Explanation:

I got it right on the test

Order the steps to describe how to access the Electronics Business Card dialog box.

Answers

Answer:

posting it fren.  your order is correct

Explanation:

The Electronics Business Card dialog box is a feature in Microsoft Outlook that allows you to create and manage virtual business cards. Here are the steps to access the Electronics Business Card dialog box:

How to access the Electronics Business Card dialog box ?

Open Microsoft Outlook on your computer.

Click on the "File" tab located in the top left-hand corner of the screen.

From the drop-down menu, select "Options".

In the Options window, select "Contacts" from the left-hand menu.

Scroll down to the "Create contacts" section and click on "Electronic Business Cards".

In the Electronic Business Card Editor, you can create and manage your virtual business card by adding or editing the fields as needed.

Once you have completed making changes, click on "Save & Close" to save your electronic business card.

By following these steps, you can easily access the Electronic Business Card dialog box and create or manage your virtual business card in Microsoft Outlook.

Learn  more about Electronics Business Card here

https//brainly.com/question/19446197

#SPJ3

why is a fragmented disk slower than one that is defragmented?

Answers

Answer:

Explanation:

The fragmented program has parts stored all over the hard driven. The computer has to keep on checking for where the next fragment is. All if this takes time especially if the program that you are trying to load is very large.

If the sectors for a program are consecutive, that makes loading a whole lot easier.

A document used to convince a panel of potential funders to help a product, programor service become reality.

Answers

Answer:

Concept paper

Explanation:

only cool people answer this question.




are you cool?

Answers

Answer:

Yes

Explanation:

I like frogs

Answer:

always been coolswag

I will make you brainless Just answer this question!!

A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on.​​

Answers

Answer:

1. 3

2. 8

3. 2

4. 6

5. 4

6. 5

7. 9

8. 1

9. 7

Explanation:

Im not sure about this but I hope it helps

The number 8 is actually first

As a member of your barangay,how will you help your community in improving solid waste management?

Answers

Answer:

Reuse materials whenever possible. Recycle materials and organize for government and industry to develop community recycling programs. Collect, transport, and store wastes safely.

How do people decide their ethical behavior

Answers

Explanation:

Ethical behavior is based on written and unwritten codes of principles and values held in society. Ethics reflect beliefs about what is right, what is wrong, what is just, what is unjust, what is good, and what is bad in terms of human behavior.

Answer:

most people go by the crowd to the way they act. theres are also people who have to make very hard decisions and not everyone makes the right choice.

Explanation:

what was the name of the earliest iteration of the internet?

Answers

Answer:

ARPANET

Explanation:

ARPANET was the name of the earliest iteration of the internet.

What is ARPANET?

The first open packet-switched computer network was the U.S. Advanced Research Projects Agency Network (ARPANET). In 1989, it was ultimately deactivated after being put into use in 1969. The primary applications of ARPANET were in academia and research.

The Advanced Research Projects Agency Network, or ARPANET, was developed in the late 1960s and served as the first functional prototype of the Internet. ARPANET, which was first supported by the US Department of Defense, used packet switching to enable multi-computer communication across a single network.

The first distributed control network was the ARPANET. It introduced TCP/IP protocols initially. With the employment of these technologies, the Internet was essentially only getting started. It was created with the fundamental goal of facilitating communication among scientific users.

Thus, it is ARPANET.

For more information about ARPANET, click here:

https://brainly.com/question/28577400

#SPJ2

Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?

Answers

Answer:

OOP TY!

Explanation:

TY

The water splashed all over the top of the car.

Answers

Answer:

e

Explanation:

Dry the car of i guess

You are trying to sell a new product to a store owner. Which method of presentation
is likely the most effective?

A. a chart showing how sales will go up if they use this product
B. quotes from other store owners on success of this product
C. a free trial option to use the product for six months, no questions asked
D. all of the above

(10pts)

Answers

I would have to say answer b

What is the difference between a filter and a Search Folder?

*manually & *on demand

Answers

Answer:

manually and on demand is correct

Explanation:

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Answers

The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."

A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.

A device driver is a form of software file that ensures hardware device functions as designed.

Several types of device drivers include:

BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.

Hence, in this case, it is concluded that the correct answer is Device Driver.

Learn more here: https://brainly.com/question/19473613

what is the answer ??​

Answers

Answer:

D all of the above

B operating system

the person above ^ me is correct

You can open an HTML document only in ________.
A. Internet Explorer
B. M.S Excel
C. Note Pad
D. None of these
please solve it fast its urgent ​

Answers

Answer:

You can open a HTML document in internet explorer usually browsers can open HTML files.

you can use view the ______ file to view the hard drive details.

Answers

Answer:

/proc/partitions

where should the works cited page appear in the document?

Answers

Answer:

The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).

An advantage of a private home network is that is typically more secure than public Wi-Fi.

Answers

Answer:

yes it's true

Explanation:

please mark brainiest

Answer:

I agree on that.

Explanation:

Of course you can use a vpn to encrypt your data being sent to router but it is easier to just connect to a private network.

Hope this help please give the brainliest award would be much appreciated.

Write pseudocode for one or more selection statements to decide whether a year is a Leap year. The rules are:

A year is generally a Leap Year if it is divisible by 4, except that if the year is divisible by 100, it is not a Leap year, unless it is also divisible by 400. Thus 1900 was not a Leap Year, but 2000 was a Leap year.

Answers

Year = input()

isLeapYear= false
if Year%4 = 0
if Year%100 != 0 or Year%400 == 0
isLeapYear = true
print(isLeapYear)

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

Year = input()

isLeapYear= false

if Year%4 = 0

if Year%100 != 0 or Year%400 == 0

isLeapYear = true

print(isLeapYear)

See more about python at brainly.com/question/26104476

8
Select the correct answer from each drop-down menu.
The AND operator narrows
your search results. The OR operator broadens your search resul
Result. Am I right?

Answers

Answer:

yes you are correct

the AND operator narrows

the OR operator broadens your search results

Answer:

yes your right

(:

Explanation:

What is word in computer?

Answers

Answer:

In computing, a word is the natural unit of data used by a particular processor design. A word is a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor.

This the answer you wanted? (brainliest?)

Tim has joined a new firm as a network engineer. Which three personal qualities will help him in his career? A. open-mindedness B. flexibility C. willingness to learn D. confidentiality E. ethnicity

Answers

Answer:

I would say A B and C

Explanation:

which data type consumes the least storage space?
text
OLE object
yes/no
memo​

Answers

Answer:

yes/no

Explanation:

Since yes /no has a storage of only 1 bit. Text max. 250 characters, memo 65,535 characters, OLE object 4G.B.

what is the problem here

Answers

Answer:

I think ...............

in 2014, what percentage of the world population has access to the internet?

Answers

Answer:

At that time 43.9% of people have access to the global internet.

cui documents must be reviewed to which procedures before destruction?

Answers

Answer:

Documents containing CUI must be destroyed by shredding..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

The procedure before the destruction of the CUI document will be Records Management.

What is the CUI documents procedure?

Any CUI must go through the Records Management processes before it may be deleted. It must be determined if it is transient or persistent and then treated accordingly. Agencies are required to destroy CUI in a way that makes it unrecoverable, unreadable, and indecipherable, even when information is in electronic form.

Agencies are required to apply the procedure specified by law, legislation, or government-wide policy when destroying records. Cross-cut shredding that results in particles that are 1 mm x 5 mm (or less) in size or crushing are two techniques that have been authorized for eliminating paper-based CUI.

To acquire regulatory advice for records management and destruction processes, go to the course resources.

The CUI document must be reviewed to which procedures before destruction by Records Management.

More about the CUI documents procedure link is given below.

https://brainly.com/question/29871876

#SPJ12

fields where computers are used include: business, education, banking, government, true or false​

Answers

Answer:

True. Most businesses use computers, including all 4 mentioned in your questions.

Other Questions
Factorize 3x + 7xy - 6y. Evaluate the expression in (a) above if x = 4 and y = 3. Please help. Thanks. Find the equation of a line that passes through the point (-3,-2) and has a gradient of -4.Leave your answer in the form y = mx + cmaths help pls Bacteria for these three. Morphology and arrangement? The pressure on a diver in the water varies directly as the depth. If the pressure is 3.6 Ib/in^2 when the depth is 8ft, what is the pressure when the depth is 30ft.I give Brainliest! Please show your work 6. during the first part of prophase, dna condenses into? The DuPont equation Corporate decision makers and analysts often use a particular technique, called a DuPont analysis, to better understand the factors that drive a companys financial performance, as reflected by its return on equity (ROE).a. Trueb. False Does this match for a renaissance queen? HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP 4d=d4Choose the property of real numbers that justifies the equation Read the first two sentences of Minas personal narrative, My First Tryout. When I was in ninth grade, I [WOL] out for the lacrosse team, even though I had never played before. My older sister had been a star goalie when she was my age, and I [WOL] to follow in her footsteps. Fill in the blanks in order. tried . . . . want tried . . . . wanted try . . . . want try . . . . wanted Solve for x using the figure to the right. the range of all forms of radiant energy is called the PLS HELP ASAP ILL GIVE THANKS AND BRAINLIEST IF YOU GET THEM ALL RIGHT:1. Software used to search a database using keywords or phrases entered by the user.A) Navigation TrackingB) NetworkC) Search EngineD) Ethernet Cable2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly. A) Antivirus application B) Ethernet cable C) Computer virus D) HTML 3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers. A) ModemB) USBC) Intranet D) Desktop Interface4. software that the owner maintains exclusive control over how it is modified and distributedA) proprietaryB) navigation trackingC) SpywareD) operating system5. set of principles that help users determine what is right or wrong in regards to computers.A) modemB) HTMLC) navigation trackingD) Computer ethics6. spyware that manages all of the installed applications and hardware on a computer or device. A) Computer virusB) operating systemC) citationD) HTML7. physical components of a computer system such as computer, mouse, or modem.A) softwareB) Network C) browserD) hardware8. A malicious software program that spies on the user and share the information with a third-party. A) antivirus applicationB) malwareC) spywareD) Desktop interface9. icons and menus on the computer that allow the user to interact with the operating system. A) Desktop interfaceB) intranetC) navigation trackingD) Computer ethics10. A tool that provides directions using satellitesA) asynchronous communicationB) navigation trackingC) Ethernet cableD) HTML11. A restricted private network used by organizations to communicate. A) asynchronous communicationB) navigation trackingC) intranetD) browser12. content that is not owned by any individual or company that is free to use. A) networkB) proprietaryC) Desktop interfaceD) public domain13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computerA) Cable InternetB) Computer virusC) public domainD) operating system 12. content that is not owned by any individual or company that is free to use. A) networkB) proprietaryC) Desktop interfaceD) public domain13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computerA) Cable InternetB) Computer virusC) public domainD) operating system Why did the United States implement a policy to help Japan recover and rebuild after the war? GRAPHIC ORGANIZER #3: Creating a Spider Concept Map Directions: Read John 14:6. Create a concept map that outlines the verse, who is speaking, who the audience is, and the meaning of the verse. To insert in text to the graphic organizer, click in the circles to type. You should fill in the empty purple circles. John 14:6 Verse says Verse Speaker Verse Meaning Verse Audience A Bible Verse with Similar Message Why was the printing press so important to the renaissance? (Your response has to be at least 5-7 strong sentences. Thanks!) I am my .assignment right now.write writing wrote What is the range of the function? help im in school and failing 5A line passes through the point (4, - 7) and has a slope of--4Write an equation in slope-intercept form for this line.