benifits Ease of Access to Information. The World Wide Web, abbreviated as www has made the world a social village. Saves Time. Ease of Mobility. Better Communication Means. Cost Efficiency. Innovation In Many Fields. Improved Banking Better Learning Techniques.
risks Theft or manipulation of sensitive or private information, such as financial or health records.
Virulent computer viruses that can destroy data, damage hardware, cripple systems and disrupt a business' operations.
Computer fraud.
Which of the following quantities has decreased with the advent of digital technology? attendance at live performances quality of music production cost of performance advertising longevity of established artists
Answer:
A. The correct answer is attendance at live performances.
Explanation:
took it on edge 2020
Use the drop-down menus to complete the steps for creating a new note.
1. Open the Notes view by clicking Notes in the
2. Click New Note and type the information.
3. Change the
to categorize the note.
4.
off of the note to save it on the Notes view.
Answer:
✔ Navigation bar
✔ color
✔ Left-click
Explanation:
on edg
Answer:
1. Open the Notes view by clicking Notes in the Navigation bar
2. Click New Note and type the information.
3. Change the color to categorize the note.
4. Left-click off of the note to save it on the Notes view.
Explanation:
These are the answers from Edge2020
Complete the statement below using the correct term.
All digital devices use software programs to function. Software
create these programs.
Answer:
System software and Application software
Explanation:
System software Includes Operating System, Database Management Systems, and Software Utilities
Application software Includes performance of a particular application
What is the full form of GIGO?
List 2 benefits of printing in pla filament
what is part of computer
Answer:
The parts of a computer are listed below;
MonitorCPU (computer processing unit)KeyboardMouseSpeaker.What capital city is located at 33 s and 71w?
Answer:
jmkk;
Explanation:
In what ways are Outlook notes useful for personal or professional use? Check all that apply.
Notes can be dragged and dropped onto your computer desktop.
Notes can be saved as an Outlook item in a Contact or Calendar Event.
Notes can send reminders for important tasks and events.
Notes are useful for saving hard-to-remember information.
Notes can be used for taking meeting notes.
Notes can save file attachments and pictures.
Answer:
a b d e on edge 2020.........
Notes can be dragged and dropped onto your computer desktop. Notes can be saved as an Outlook item in a Contact or Calendar Event. Notes are useful for saving hard-to-remember information. Notes can be used for taking meeting notes. The correct options are A, B, D, and E.
What are Outlook notes?The preferred email client for sending and receiving emails from Microsoft Exchange Server is Microsoft Outlook. Accessibility to contact, email, calendar, and task management tools is also provided by Outlook.
You can send and receive emails, manage your calendar, add and remove contacts, and keep track of projects with Outlook.
The counterpart of physical sticky notes in computer form is a note. Use notes to scribble down everything you would write on paper, including inquiries, ideas, reminders, and more. While working, one can leave notes open on the screen.
You can drag and drop notes onto the desktop of your computer. Notes may be saved in a Contact or Calendar Event as an Outlook item.
Hard-to-remember information can be saved in notes. You can utilise notes to record meeting minutes.
Thus, the correct options are A, B, D, and E.
For more details regarding Outlook, visit:
https://brainly.com/question/13040097
#SPJ2
What does the shell of an operating system do? changes the operating system so that it can be installed on smartphones
Answer:
The shell of an operating system is the main base for many things.
Explanation:
The "shell" is the place where you can control the operating system in ways that your typical keyboard/mouse user could not. PC or Mac operating systems cannot be installed on smartphones, however, with a tablet, you can remotely control a computer.
Answer:
Your interface to the operating system is called a shell. The shell is the outermost layer of the operating system. Shells incorporate a programming language to control processes and files, as well as to start and control other programs.
-Thanks
Vote Brainliest
Which of the following is not a thing needed to make a network?
a)Network software b)Network devices c)Motherboard d)Cables
Answer:
d) cables is your answer
Answer:
Motherboard is not a thing needed to make network
Which of the following elements does the cinematographer have to be concerned with? (Select all that apply).
balance of light and dark
film distribution
selection of actors
depth of focus
Answer:
A cinematographer has to be concerned with the balance of light and dark and depth of focus.
Answer:
a: depth of focus
b: balance of light
Explanation:
edg2021
dont laugh . How do I get a bee out of my but?
Answer:
i'd get that checked out by a doctor asap!
Explanation:
please go to the doctor or tell your parents!
Answer:
I-
Explanation:
Just go to the doctor. And how did it get there in the first place? Also cant tell if this is a joke or not lol
Why do you think they added the wait .5 seconds block?
Answer:
Satisfaction
Explanation:
People enjoy the sensation of the computer doing something and the feeling that the program is advanced.
What is a help desk
technician?
O An individual who troubleshoots and repairs smartphone hardware components
O An individual who manages and maintains network servers
O An individual who diagnoses and resolves users' technical hardware and software problems
An individual who manages and maintains a network infrastructure
Answer:
C: An individual who diagnoses and resolves users' technical hardware and software problems
Which of the following is not an effective listening strategy?
a.
Be “other-oriented”
b.
Attend completely
c.
Interrupt to share your thoughts
d.
Look for nonverbal messages
Interrupting to share your thoughts. If you are trying to be a good listener then you should listen to what they have to say first before sharing your thoughts.
Answer:
I believe the answer is c but I may be wrong
Which computer program offers a comprehensive collection of tools for creating digital art by using a variety of shapes, lines, and letters which can be easily measured and formatted?
Answer:
LibreOffice Draw
Explanation:
Answer:
A
Explanation:
Which type of memory resides within a computer's CPU?
_____ memory resides within a computer's CPU.
(not multiple choice)
Main memory.
Main memory resides within a computer's CPU.
Answer:
Internal
Explanation:
Which task option will keep you aware of the progress of a task you assign?
Set reminders on tasks with due dates.
Set the Quick Click flag for automated actions.
Keep my task list updated with copies of tasks.
Send a status report when I complete an assigned task.
Answer:
It's C
Explanation:
Correct on edg
Answer:
C is right
Explanation:
$ sgin is user for absolute referencing
Answer:
money
Explanation:
Answer:
Unlike relative references, absolute references do not change when copied or filled. You can use an absolute reference to keep a row and/or column constant. An absolute reference is designated in a formula by the addition of a dollar sign ($) before the column and row.
Explanation:
Which is the best reason for why it is important to keep personal information private online?
to prevent becoming the target of a scam
to ensure strangers do not approach them
to prevent others from using it dishonestly
to stop people from following them online
Answer:
A. To prevent becoming the target of a scam
Explanation:
The more person information you put out on the internet, the easier it is for people to steal it and use it for malicious purposes.
Answer:
To prevent others from using it dishonestly.
Explanation:
Keeping private information to yourself is always a safe approach. Giving out your private information could result in false behavior on your account.
this device can be used to type documents,send email,browse the internet,handle spreadsheets,do presentations,play games,and more.
Which term describes the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable?
fault-tolerance
file tolerance
fault-line
file protection
Answer:
the answer is fault tolerance
Explanation:
Answer:
fault-tolerance
Explanation:
On Edge, fault-tolerance is described as the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable.
I hope this helped!
Good luck <3
Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?
On the Insert tab, click the Insert New command.
On the Insert tab, click the Add New command.
On the Home tab, click the New Slide command.
On the Home tab, click the Arrange command.
Answer:
C on edg
Explanation:
I just took the review
Answer:
On the Home tab, click the New Slide command
Explanation:
What is the definition of delimited text?
Answer:
A delimited text file is a method of representing a table of data in a text file using characters to indicate a structure of columns and rows. This is typically used to provide an import/export function for services, software and databases that represents data in a neutral format. The following are common types of delimited text file. Hope this helps!
Answer:
Characters are separated by commas or tabs.
Explanation:
I just did it on edg 2020
Which of the following is a way to keep you safe online? (select all that apply)
set up a spam folder
give out personal information to strangers
only open e-mails from people you know
keep anti-virus software up to date
Answer:
1). set up a spam folder
3).only open e-mails from people you know
4).keep anti-virus software up to date
Explanation:
IM DIFFERENT BREEED!
The options that are a way to keep you safe online are:
Set up a spam folder.Only open e-mails from people you know.Keep anti-virus software up to date.What ways can keep you safe online?When a person keep their personal information private and from online views, one can be able to keep themselves safe.
Conclusively, Note that a lot of Hackers do make use of the profile of people on social media and as such, doing the above things can help keep you safe.
Learn more about online from
https://brainly.com/question/2014724
#SPJ2
When comparing programming languages, what is commonly used by all software developers?
elements, controls, and variables
variables, loops, and nouns
elements, commands, and variables
variable, loops, and tags
Answer:
The answer to this question is given below in the explanation section
Explanation:
This question is about when comparing programming languages, what is commonly used by all software developers? The correct answer is elements, controls, and variables.
elements, controls, and variables
Every programmer used these three elements, controls, and variables. for example elements are buttons, link, input field etc, controls are loops and decision statements and variables are to store value for some object. so, elements, controls, and variables are most commonly used by all software developers.
variables, loops, and nouns (false)this is not correct, because nouns are not most commonly used by all developers. However, it is noted that a noun is used mostly in the requirement elicitation phase for capturing objects.
elements, commands, and variables (false)commands are not most commonly used by developers, commands are used by those programmers who are doing console programming.
variable, loops, and tag (false)tag are used in HTML language but it is not most commonly used by the developers.
Suppose you have a word processing application on your smartphone, your tablet, and your laptop. You are at home, and you need to write a paper for a class. A [_____] would be easiest to use for writing your paper.
the words you can use are
desktop
tablet
smartphone
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct option for the fill-in-blank of this question is desktop.
Because you can easily use the word application using the desktop. You can also use tablet and smartphone for writing a paper on a word processing application. But you cannot comfortably and easily write the paper as compared to using the desktop for writing the paper. Furthermore, some wordprocessing features are limited in tablets and in smartphones as compared to desktop wordprocessing application.
So a desktop wordprocessor would be easiest to use for writing your paper.
Answer:
It's "Laptop"
Explanation:
(what is word processing
Answer:Processing: perform a series of mechanical or chemical operations on (something) in order to change or preserve it
Explanation:
What is cognitive overload?
A. The notion that too many images can create fatigue in the
audience.
B. The concept that too much textual information needs to be
balanced with media.
O C. A state of confusion brought on by a person processing too mu
information at once.
O D. A theory backed by current research that states that the human
mind can only comprehend five new concepts in an hour.
Answer:
C
Explanation:
C mentions the brain being overloaded
Statement that can be considered as true statement about cognitive overload is C. A state of confusion brought on by a person processing too much information at once.
Cognitive overload can be regarded as used amount of working memory resources. It involves giving more than expected load to the memory.When this takes place, individual will find it difficult in processing informations, and this could be intrinsic cognitive load.Therefore, option C is correct.
Learn more at:
https://brainly.com/question/15094030?referrer=searchResults
Dayla is concerned about managing her digital footprint. What does she mean by this? *
Answer:
The answer to this question is given below in the explanation section.
Explanation:
First we know what is digital footprint.
A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and the information you submit to online services.
So, Dalya is concerend about managing her digital footprints means she has concerned to store password that used to be login and make them secure, the email she is sending to the correct address and text in the email is grammatically correct, information that she is submitting online does not violate the security concerns, etc.
The right answer is D).