Which of the following animation is not common to both slide transition and
custom animation?


Answers

Answer 1

Answer:

slide transition pls mark me branilest


Related Questions

what are the functions of an input device​

Answers

to provide data and control signals to an information processing system such as a computer or other information appliance.

Answer:

This article does not cite any sources.

In computing, an input device is a piece of equipment used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mouse, scanners, cameras, joysticks, and microphones.

Write a short note on
i) Printer
i)Speaker
( no problem if u don't know but don't just spam :(.....)​

Answers

A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.5" by 11" sheets of paper. Printers vary in size, speed, sophistication and cost.

2. Which of these Is NOT part of the definition of Electricity?

A. Ability to do work

B. Closed Circuit

C. Power Supply

D. Movement of electrons

Answers

Answer:

B. closed circuit

Explanation:

please follow me

hope it helps you

why do many webpages use graphical design and images

Answers

Answer:

Many web pages use graphical designs and images because people are drawn more to images and graphics than just plain text.

Saving means

A) Copying data from memory to disk

B) Copying data from disk to
memory

C) Preserving a program

D) Storing data in a program

Answers

Answer:

To copy data from a temporary area

in media literacy,
how does media influence public? and the press

⚫ analyze or compare the influences of social media
⚫ analyze the ethics or journalist, news outlets, etc​

Answers

what is mean by computers

Identify the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory.
a. Programmed I/O.
b. Direct Memory Access (DMA).
c. Polling.
d. CPU interrupt.

Answers

Answer:

B. - Direct Memory Access (DMA)

Explanation:

...

Direct Memory Access (DMA) is the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory. Thus, option B is correct.

What is Direct Memory Access?

Direct memory access is a computer system feature that allows some hardware subsystems to access main system memory without relying on the central processor unit.

Direct memory access (DMA) is the method of transmitting data without using the CPU. It is frequently used to transport data to and from input/output devices. To manage the transfer, a second DMA controller is necessary.

DMA is a mechanism that allows an input/output (I/O) device to transmit or receive data directly to or from main memory, bypassing the CPU to speed up memory operations. A chip known as a DMA controller manages the process (DMAC).

Therefore, option B is correct.

Learn more about the Direct Memory Access, refer to:

https://brainly.com/question/7218477

#SPJ5

Egovernment involves the use of strategies and technologies to transform government by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government.

a. True
b. False

Answers

I guess the answer True

Most shop accidents are caused by?

Answers

Answer:Most shop accidents are caused by÷

liftingpoor light trips and fallsstressdangerous materialsact of shop violencedehydrationextreme tiredness

Run the program and observe the output to be: 55 4 250 19. Modify the numsInsert function to insert each item in sorted order. The new program should output: 4 19 55 250.
#include
#include
using namespace std;
void numsInsert(vector& numsList, int newNum) {
unsigned int i;
for (i = 0; i < numsList.size(); ++i) {
if (newNum < numsList.at(i)) {
// FIXME: insert newNum at element i
break; // Exits the for loop
}
}
// FIXME: change so executes if higher number NOT found
// Change "true" to "i == ??" (determine what ?? should be)
if (true) { // No higher number was found, so append to end
numsList.push_back(newNum);
}
}
void numsPrint(const vector& numsList) {
unsigned int i;
for (i = 0; i < numsList.size(); ++i) {
cout << " " << numsList.at(i) << endl;
}
}

int main() {
vector numsList;
numsInsert(numsList, 55);
numsInsert(numsList, 4);
numsInsert(numsList, 250);
numsInsert(numsList, 19);
numsPrint (numsList);

return 0;
}

Answers

Answer:

#include <iostream>

#include <vector>

using namespace std;

void numsInsert(vector<int>& numsList, int newNum) {

   unsigned int i;

   for (i = 0; i < numsList.size(); ++i) {

       if (newNum < numsList.at(i)) {

           // FIXME: insert newNum at element i

           numsList.insert(numsList.begin() + i, newNum);

           break; // Exits the for loop

       }

   }

   // FIXME: change so executes if higher number NOT found

   // Change "true" to "i == ??" (determine what ?? should be)

   if (i == numsList.size()) { // No higher number was found, so append to end

       numsList.push_back(newNum);

   }

}

void numsPrint(const vector<int>& numsList) {

   unsigned int i;

   for (i = 0; i < numsList.size(); ++i) {

       cout << " " << numsList.at(i) << endl;

   }

}

int main() {

   vector<int> numsList;

   numsInsert(numsList, 55);

   numsInsert(numsList, 4);

   numsInsert(numsList, 250);

   numsInsert(numsList, 19);

   numsPrint(numsList);

   return 0;

}

Explanation:

Write short note on:
i) keyboard
ii) Web camera

Answers

Um I’m not sure about that
_ Stay positive because failure is sort of success
_ dream big work hard
_no caption the ____ said it all

What software programming language was first
used to power the Internet (.com, .net)?

Answers

Answer:

the answer should be .com, because the very first domain was Symbolics.com

Explanation:

hope this helps, have a great day.

What are the things you needed to create a bootable USB Windows Installera​

Answers

Answer:

RUFUS

Explanation:

Try installing rufus software and burn the ISO file on your USB by choosing appropriate partition scheme MBR or GBT.  Usually MBR works for all computers but GPT is for new systems with latest technology.

When it comes to memory, why is it important to have enough storage space on a hard drive when using many RAM intensive programs?

Answers

Answer:

Memory and storage are important concepts to master in Information Technology. ... This type of memory is volatile which means that the actual data disappears when the computer loses power. Because memory needs to be much faster than storage, it is rather more expensive than storage per GB.

Explanation:

Juan is a network administrator and must set up a VPN for his company's network. To allow safe communication, he should

select Control Panel, then Network Protocols, then Internet
select the radio button, then change the adapter settings protocol
select the Security tab, then PPTP, and then Allow Protocols
select Set Up a Public Connection, then Disable Protocols

Answers

Answer:

select Control Panel, then Network Protocols, then Internet

Explanation:

Seeing as Juan is a network admin, he has access to the programs of the computer. Being tasked with setting up a VPN, he must go to the control panel, then network protocols (to see the network rules, per say), then the internet tab to finally set up the VPN.

To allow safe communication, Juan must select control panel  then, network protocols, and then  internet. Therefore, option A is correct.

What is VPN ?

You can interact secretly and securely within your corporation using a virtual private network (VPN), which is an extension of a company's intranet over the preexisting structure of either a public or private network.

The i5/OS operating system is utilised by both businesses, and a VPN connection can give them the protection they require to communicate between their respective networks. Compared to using conventional non-switched lines, creating a VPN is more cost-effective.

To allow a safe communication, the network operator should allow the internet protocol to interpret and which can be activated from the control panel. Hence, option A is correct.

Find more on VPN:

https://brainly.com/question/29432190

#SPJ3

software.
Q4..
Microsoft word is an example of
(A) System
(1) word processor
(°) Presentation software
(P) Spreadsheet

Answers

Ms Word is an example of a word processor.

One example of a Word Processor is Microsoft Word, but other word processing applications are also widely used.

45. _____ is used to create an object. a. Class b. constructor c. User-defined functions d. In-built functions

Answers

Answer: B

Explanation:       A constructor is a special method of a class or structure in object-oriented programming that initializes a newly created object of that type. ... Instead of performing a task by executing code, the constructor initializes the object, and it cannot be static, final, abstract, and synchronized.

In computer programming, a resource which is used to create an object is called: B. constructor.

What is a constructor?

A constructor can be defined as a special method that is designed and developed to enable programmers create and initialize objects in Java programming.

This ultimately implies that, a constructor is a resource which can used to create an object in computer programming.

Read more on constructor here: https://brainly.com/question/26914047

List the resulting array after each call of the merge method. Indicate the number of character-to-character comparisons made for each call to merge (line 22 of the merge method at the end of the assignment). Sort the following array of characters into alphabetical order: C Q S A X B T.
01 public static void mergesort (char[] a, int i, int r){
02
03 if (1 >= r) {
04 return;
05 }
06 int middle = (1+r)/2;
07 mergesort(a, l, middle);
08 mergesort(a, middle+1, r);
09 merge(a, l, middle, r);
10 }
11
12 public static void merge (char[] a, int i, int m, int r){
13
14 //copy lower half of the array into b
15 char [] b = new char[m-1+1];
16 for (int i = 0; i <= m-1; i++ ) {
17 b[i] = a (1+i);
18 }
19
20 int i = 0, j m+1, k = 1;
21 while (i <= m-1 && j <= r ) {
22 if (a[j] < b[i]) {
23 a[j];
24 k += 1;
25 j += 1;
26 } else {
27 a[k] b[i];
28 k += 1;
29 i += 1;
30 }
31 }
32 while (i <= m-1) {
33 a[k] b[i];
34 k += 1;
35 i += 1;
36 }
37 while ( j <= r ) {
38 a[k] a[j];
39 k += 1;
40 j += 1;
41 }
42 }

Answers

Answer:

40j

Explanation:

the no. divided by one is that no.

Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 ​n ​​ and that executing an implementation of it on a particular machine takes tt seconds for nn inputs. Now suppose that we are presented with a machine that is 64 times as fast. How many inputs could we process on the new machine in tt seconds?

Answers

Hope this helps!

https://www.chegg.com/homework-help/questions-and-answers/suppose-particular-algorithm-time-complexity-t-n-3-x-2-n-executing-implementation-particul-q18423534

True or False, In adversarial searching, agents using the MiniMax algorithm always select the state that has the highest guaranteed net value.

Answers

Answer:

True

Explanation:

The MiniMax algorithm computes the MiniMax decision from the current state. The MiniMax algorithm always is especially known for its usefulness in calculating the best move in two-player games where all the information is available

_____________ is driving a complete reanalysis of what information is collected and how it is presented, navigated, and used internally.

Answers

“Internal Self-Service” is driving a complete reanalysis of what information is collected and how it is presented, navigated, and used internally.

When it comes to different ways of storing data on the device in a cross-platform manner, what is convenient about both native iOS and Android platforms?

a. they both provide secure file i/o
b. they both provide key-value, file i/o and sqlite data storage
c. the both provide the exact same system calls, since both platforms rely on ARM processors
d. they both provide the exact same APIs, regardless of language used

Answers

A - both provide secure file i/o

Comparison
Cloud computing and parallel processors

Answers

Anwser is 2/3

Explanation:

Software engineer is responsible for defining the level of maturity the software program must perfom at in order to declare software test

a. True
b. False

Answers

Answer:

true

Explanation:

Hope, it helps to you

Suppose you are asked to design a rotating disk where the number of bits per track is constant. You know that the number of bits per track is determined by the circumference of the innermost track, which you can assume is also the circumference of the hole. This, if you make the hole in the center of the disk larger, the number of bits per track increases, but the total number of tracks decreases. If you let r denote the radius of the platter, and x · r the radius of the hole, what value of x maximizes the capacity of the disk?

Answers

Answer:

suppose i was i would tell them i dont know and walk away

Explanation:

in thoery this is correct

you said suppose so i answerd

there is no use in reporting or getting this taken down

nether is it right

im not stealing points

Because in thoery its an answer

THIS IS MY PROTEST

_ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.

Answers

The right answer will be "The Internet of Things (IoT)".

Connecting computers systems, electromechanical machinery as well as digital ones with distinctive identifications as well as the possibility of transference of information through the internet without interactivity as well as people.Such an IoT system would be a collection of web-enabling connected devices which employ embedded subsystems, particularly CPUs, captors, and networking gear, to gather as well as transmit information from their surroundings and execute upon that.

Learn more about IoT here:

https://brainly.com/question/19995128

what is web browser give answerwh
at is web browser

Answers

Answer:

A software application used to access information on the World Wide Web is called a Web Browser.

Explanation:

When a user requests some information, the web browser fetches the data from a web server and then displays the webpage on the user's screen.

Please answer this, don't skip please. I would really appreciate if you had knowledge over this question and helped out :)

1) The tag is the second of two main parts of a web page. The information between the opening and closing tag is seen by web page visitors in the browser window. True or False
2) The area is the first of two main parts of a web page. The header is where the operation code resides. True or False


3) The next tag is the tag - the head is the first of two main parts of a web page. The head is where the operation code resides. True or False

Answers

Answer:

1) they are only visible to the to the person/people who are running the website. therefore the answer to that statement is false.

2) they operation code of a website resides at the end of a address, therefore that statement is also false

Explanation:

4. What is an Abacus?​

Answers

Explanation:

an abacus is a simple device for calculating, consisting of a frame with rows of wires or grooves along which beads are slid.


8. Which of the following is
most likely to contain a
computer virus?


1.CD-ROM
2.RAM
3.Floppy Disk
4.ROM

Answers

Answer:

4. A floppy Disk

Explanation:

This is because it can be transfered from one device to another. So, if one device is infected with a virus, it'll be affected

[tex].[/tex]

Other Questions
Please help Ill give brainly !! FAST THANK YOUUUU Read the introduction [paragraphs 1-4].What purpose does the introduction serve in developing the main idea?It shows the reactions of Americans and Britons who read the Declaration of Independence.It explains the flaws that caused Congress to hesitate to act on the Declaration of Independence.It lists the names of the men who were chosen to write the Declaration of Independence.It describes the reasons and purposes for writing the Declaration of Independence What is the factored form of 250x^3 16? A. 2(5x 2)(25x2 + 10x + 4) B. 2(5x + 2)(25x2 10x + 4) C. (5x 2)(25x2 + 10x + 4) D. (5x + 2)(25x2 10x + 4) Help PLEASE ITS DUE TODAY Mary takes 8 days to do a full check of thelibrary's online catalog. Her assistant takes12 days. If they work together, determine thefraction of the catalog that is checked after4 days. This is my second time posting this can anyone help me PLZ !! 4,582 x 10Written in place value form The students at a school assemblywere divided into 4 equal groups.There were 73 students in eachgroup. Write and solve an equationto determine the number of studentsthat were at the assembly. Find the total surface area of the pyramid with base length and height be 10 cm and 12 cm respectively. The temperature at 10 A.M. is 12 degrees Fahrenheit. The temperature at 6:00 A.M.was -7degrees Fahrenheit. How many degrees did the temperature rise? List down at least 10 reasons that separates Human being from other animals. Find the distance between each pair of points (2, -6) and (7, -2) One pager woods runner Which of these things are NOT listed in the periodic table?Element Name or SymbolAtomic WeightAtomic NumberAtomic Orbital Radius please help meintegrate In x[tex] \frac{ lnx ^{2} }{x}[/tex] Place of residence is an example of a(n) ok yall helppp Today, you will be investigating the teacher. Your first task is to observe the suspect (your teacher) and the scene (the classroom).What evidence do you notice and what does it say about your teacher?Use the handout to record your evidence, then analyze each piece of evidence to see what it reveals about the suspect. Finally, summarize your conclusions.** Your goal is to describe your teacher, and the classroom, as thoroughly as possible (consider things like personality, style, attitude, hobbies, etc)i chose Most Likely To Awards sooo what do i dooooooo Subtract.135(258)Enter your answer as a simplified fraction by filling in the boxes.[ ][ ] Please help!! I will appreciate it help is really needed...Find the volume.A. 240 mB. 351 mC. 214 mD. 356 m