Answer:
1. Add options and names.
2. Allow to provide back feedback.
3.Pay attention to patterns.
4.Stay consistent.
5.Use visual hierarchy.
Explanation:
Navigating an online interface describes how to move and locate features of an application software or program. He, some implementation which might aid easy navigation include ;
Adopting a simple User interface :
The use of a simple rather than a complex user interface will usually allow users get used to working with an application more easily.
Use of color and texture :
Color schemes may be adopted in other to aid segmentation of categorization of features or classes in other to make reasonable grouping of features or classes.
Visual hierarchy :
This describes logical and strategic arrangement of features or elements in such a way that users could easily grasp the pattern in the arrangement.
Learn more :https://brainly.com/question/20380750
Explain the emerging trends in microcomputer technology in relation to size
Answer:
The answer to this question is given below in the explanation section.
Explanation:
"emerging trends in microcomputer technology"
At International data corporation we do market and competitive analysis for both vendors and users of information processing equipment. Therefore,when i look at where the technology has been and where it is going.I see it from two views point where the industry is moving and how well users are adapting to the changes,But from both view point the movement can be summarized in three words faster smaller and cheaper.
It may be helpful to think in terms of micro computer life cycle.The first is hard were introduction during which time users have the opportunity to review hardware capabilities.The second phase is response to that original debut whatever it attracts peripheral vendors of hardware and stimulate software development that provide a wide and rich work development.No corporation not even IBM can stand alone in this marketplace.All need the diversity of the expansion board vendors,the software vendors,the whole new industry that the emerged over the last few years.
In this first stage we dealt with the personal computer as an individual workstation,as an independent processing unit rather than as a part of larger organizational framework.We also had to deal with the whole all of shared peripherals,secondary to whatever unit was on the desk.
It is not important to type '=' before a formula or a function
Answer:
no
Explanation:
because it designates the sum or total
4. Why isn't it realistic to market a new product using promoted tweets?
Answer:
Great question
Explanation:
is not realistic because nearly everyone doesn't even consider to look at the ad. Most people actually find it annoying when they are scrolling on their feed and all of a sudden an ad pops up.
Answer:
The tactics cost hundreds of thousands of dollars to implement. ... In other words, not every tweet should be about how great your product is. Use at least one relevant hashtag each time you tweet.
Explanation:
Hope it's help
i dont understand this also i have 18 points im asking more questions under this one in the comments
Answer:
Marshmallow → Android 6
Jelly Bean → 4.1
Donut Android → 1.6
KitKat → 4.4
Honeycomb → 3.0
Gingerbread → 2.3
Explanation:
Android Marshmallow is Android's 13th version and the the 6th major version of the Android released officially on October 2015
Android Jelly Bean is the 10th version of the Android mobile operating system initially released on the 9th of July, 2012
Android Donut is the 4th version of the Android which is no longer supported and was initially released on the 15th September, 2009
Android KitKat is the 11th version of the Android that came with improved system performance and was initially released on the 31st of October 2013
Android Honeycomb is the 8th version of the Android made for devices with large screen and was initially released on the 22nd of February 2011
Android Gingerbread is the 7th version of the Android released in December 2010.
Which statements describe the elements of the email function? Check all that apply.
Which statements describe the elements of the email function? Check all that apply.
Messages are delivered from one email address to another.
An email address can be used to identify the sender in Contacts.
The local part of the email address contains the user name.
The domain part of the email address can a business name.
Answer:
The local part of the email address contains the user name.
The domain part of the email address can a business name.
Explanation:
Elements of email function include the local part of the email which can contain the username, the domain part of the email, the sender, receiver, and other components.
In an Email the elements that are a part of the outlook are Ribbon , Quick Access Toolbar , Reading Pane , Command Groups.
The main elements of the email function are the :
The Messages are delivered from 1 email address to another. The email address is used to identify the sender in the Contacts. All local parts of the email address contains all the user name. The domain parts of the email address has a business name.Learn more about the elements of the email function.
brainly.com/question/19592165.
make a clan using 5S of the current state of your workstation now in the computer laboratory room how are you going to manage smooth workplace
Answer:
Explanation:
Using your toilet as a trash can. ...
Taking baths and long showers. ...
Conventional showerheadsYou should consider switching to a low-flow showerhead, which uses about 2 gallons of water per minute. ...
Leaky pipes. ...
Laundry loads that are only half full. ...
Running a dishwasher that's not completely full.
Select the correct answer.
What helps the project team to identify the latest software build?
A.
defect
B.
version number
C.
test plan
D.
test environment
E.
hardware
Answer:
B version number
Explanation:
what is the difference between cd-r, cd-rw and cd-rom
Answer:
The answer to this question is given below in this explanation section.
Explanation:
"difference between cd-r, cd-rw and cd-rom"
CDs are also known as WORM discs,for "write once Read many".A re writable version based on excitable crystals and known as CD-RW was introduced in the mid 1990s because both CD-R and CD-RW recorders originally required a computer to operate they had limited acceptance of use as computer software.
A compact Disc Read only memory (CD-ROM) is a read only disc.A compact disc Re-writable (CD-RW) is an erasable disc that can be reused.The data on a CD-RW disc can be erased and recorded over numerous times.CD-RW may not be readable outside of the drive it was created in.
cd-r :
CD-R is a digital optical disc storage format.A CD-R disc is compact disc that can be written once and read arbitrarily many times.
CD-R stand for" compact disc" Record-able .CD-R disc are blank CDs that can record data written by a CD burner.The word "record-able" is used because CD-R are often used to record audio,Which can be play back by most CD players.
cd-rw:
CD-RW compact disc re-writable is a digital optical disc,storage format introduced in 1997.A CD-RW compact disc can be written read erased and re-written.
in this case of CD-RW the writing laser makes permanent marks in a layers of dye polymer in the disc.CD rewrite-able discs in a similar fashion,except that the change to the recording surface is revers able.
cd-rom:
CD-Rom observation of compact disc read only memory type of computer memory in the form of compact disc that is read by optical means.A CD-ROM drive uses a low power laser been encoded in the form of tiny pits on a optical disk.The "ROM" part of the term means the data on the disc "read only memory" or cannot be altered or erased.
difference between food chain and food web
Answer:
A food chain is a basic network that shows the linear flow of nutrients and energy from one trophic level to another. A food web is a multitude of food chains that are interconnected at many trophic levels. Furthermore, a food web accurately represents all the various food chains that exist in an ecosystem.
Complete the sentence.
It is always a good idea to initialize variables that will obtain values through calculations to either a _________ (“ “) or to zero (0 or 0.00) before using them in programming statements.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
This question is about a good programming practice, that you have to initialize the variable to either null value or zero before using them in a programming statement.
So the correct fill-in-the-blank is given below:
It is always a good idea to initialize variables that will obtain values through calculations to either a Null (“ “) or to zero (0 or 0.00) before using them in programming statements.
It is noted that when you assign (" ") to a variable it is not an empty value but it has a null value (blank).
Answer:
space character
Explanation:
this is 100% right on edge 2021
Al thecnology can do all the following except
Answer:
D.
Explanation:
What are characteristics of an effective study space? Check all that apply.
good lighting
O uncomfortable seating
disorganized area
Ofree from distractions
O comfortable temperature
Answer:
Good lighting
0Free from distractions
The characteristics of an effective study space are as follows:
Good lighting.Free from distractions.Comfortable temperature.Thus, the correct options for this question are A, D, and E.
What do you mean by Effective study space?Effective study space may be defined as a type of study space that should have an appropriate amount of learning space for students to be able to accomplish their work. It is the place that is utmostly favorable for students in order to perform their work with their full focus.
An effective study space is only made when it has certain characteristics. It basically includes a good lighting source, free from distractions, and a comfortable temperature for the body. Characteristics like disorganized areas, uncomfortable seating, full of distractions, etc. are not favorable for an effective study space.
Thus, the correct options for this question are A, D, and E.
To learn more about An effective study space, refer to the link:
https://brainly.com/question/8821867
#SPJ6
How do you write a paragraph in a paper? Check all that apply.
- by writing a topic sentence
-by writing a concluding sentence
-by identifying the purpose the paragraph will serve
- by making certain there are sufficient supporting details
- by using transitions to link ideas
-by making certain the paragraph supports the thesis statement
Answer:
by writing a topic sentence.
Answer:
All of them
Explanation:
Would it be possible for two people to have the same email address? Explain.
note oj cyber security
Answer:
The answer to this question is given below in this explanation section.
Explanation:
"cyber security"
cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized access.Cyber security may also be referred to as information technology security.
Importance:
Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems use to process or store it.
Challenges of cyber security:
For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:
Network securityApplication securityEndpoint securityData securityIdentity managementDatabase and infrastructure securitycloud securityMobile securityManaging cyber security:
The national cyber security alliance,through recommends a top down approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.
Sierra needs to ensure that when users are entering data into a datasheet or form that they are limited in the values they can select. Which option should she use as the data type?
Lookup list
Bound value
Short-text
Date/time
Answer:
A
Explanation:
edge
Critical Thinking Questions
1. Choose a game in which something about the art style or motif reflects a culture from a different geopolitical region than the one in which the game was developed Name both the developer's culture (to the best of your knowledge) and the culture of the thing being referenced. In the global market, what would be some of the advantages and concerns of referencing cultural artifacts from outside your own culture?
2. Rate the following games from LEAST to MOST abstract Modern Warfare Pac Man Asteroid Explain how you came up with your ranking
3. Choose a 3D game and discuss the textures used in the game levels Classify at least three textures as tiled or bespoke and explain what led you to your conclusions
4. Think of a 2D game you enjoyed recently Did it use vector graphics or bitmap graphics? How do you think the developers made their decision between which style to use-beyond the consideration of scalability?
5. Consider all of the visuals you see in a typical game. What artistic task was NOT described in the unit--something some artist had to design and implement but which wasn't listed as a specific role or career option. Which kind of artist do you think performs that design task?
i need help badly
Answer:
Explanation:
1) Assassins Creed Valhalla. The developers (ubisoft?) is canadian i think. The culture of ACV is of the vikings. Some advantages would be many people could learn about viking culture but some concerns is since it may not be the developers culture some information could be wrong and many people could be misinformed
2) personally i would put them in the order of Asteroid, Pac Man, then modern warfare.
this is all i really know sorry
but i hope this helps <3
Answer:Assassins Creed Valhalla. The developers (ubisoft?) is canadian i think. The culture of ACV is of the vikings. Some advantages would be many people could learn about viking culture but some concerns is since it may not be the developers culture some information could be wrong and many people could be misinformed
Explanation:
plzz help....
i will mark u as brainliest if u answer correct
Answer:
import java.util.Scanner;
class Main {
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
while(true) {
System.out.print("Enter an integer (0 to exit): ");
int num = scan.nextInt();
if (num == 0) break;
if (num%3 == 0 && num%5 == 0) {
System.out.printf("%d is divisable by both 3 and 5.\n", num);
}
else if (num%3 == 0 && num%5 != 0) {
System.out.printf("%d is divisable by 3 but not by 5.\n", num);
}
else if (num%3 != 0 && num%5 == 0) {
System.out.printf("%d is divisable by 5 but not by 3.\n", num);
} else {
System.out.printf("%d is not divisable by 3 or 5.\n", num);
}
}
scan.close();
}
}
To set a column style, click this button of the page layout tab?
Answer:
Click the page layout in the ribbon menu of the application, then click the down button of the columns option and select the desired column style.
Explanation:
Microsoft word is a software used to create and edit text documents. The ribbon menu is at the top of the application. It holds the functions and styles of the word processing tool.
The column of a word document can be styled to have one (default) or more columns. This functionality is found in the page tab in the ribbon.
4. Why are forests affected by wars?
Answer:
Forests are affected by wars because forest products are used for fulfilling various needs and requirement during war. In the case of India, during the First World ...
Explanation:
Answer:
Forests are affected by wars because forest products are used for fulfilling various needs and requirement during war. In the case of India, during the First World War and the Second World War the forest department cut trees freely to meet British war needs. ... Thus, wars also led to destruction of forests.
Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies. Do each of the policies have sections addressing information security requirements? What clauses should a termination policy contain to prevent disclosure of an organization's information? Create your own version of either a hiring or termination policy.
Answer:
Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies. Do each of the policies have sections addressing information security requirements? What clauses should a termination policy contain to prevent disclosure of an organization's information? Create your own version of either a hiring or termination policy.
Explanation:
Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies. Do each of the policies have sections addressing information security requirements? What clauses should a termination policy contain to prevent disclosure of an organization's information? Create your own version of either a hiring or termination policy.
A written document that describes the termination process within your organization is known as a termination policy.
What is meant by termination policies?An agreement or clause prohibiting the publication of an organization's information should be included in a termination policy. A written document that describes the termination process within your organization is known as a termination policy. It goes over each step of the procedure to show employees what to expect as well as to keep HR on track. A termination policy is typically quite high-level.
By having a comprehensive termination policy, employers can streamline this process so that it doesn't have a negative influence on the business, including morale. It also helps them to understand what to expect before, during, and after leaving the company.
To learn more about termination policies refer to:
https://brainly.com/question/15043006
#SPJ2
Manuel is recording a macro and made a mistake. What is the best option for addressing this situation? O Pause and rewind the macro to fix it. O Rerecord the macro. O Use the Undo function in Word. Find a more complex way to manage tasks.
Answer:
Pause and rewind the marco to fix it
Explanation:
the answer is number 1
Which of the statements below is true about the Windows OS?
-The Start menu is located in the top right comer.
-You can access Help files from the Start menu.
-The Web browser icon is usually found in the Quick Launch area.
-The Show Desktop icon will minimize all open windows
O Clicking on the X in the upper right corner of a window will close the window
Answer:
1. false
2. true
3. true
4. false
5. true
Explanation:
A user can access help files from the Start menu, the Web browser icon is typically located in the Quick Launch area, and clicking the X in the upper-right corner of a window will close it are all true statements about the Windows operating system.
What is the Windows OS?Microsoft Windows is a personal computer operating system (OS) created by the Microsoft Corporation. It is also known as Windows and Windows OS (PCs).
Microsoft created and distributes a number of proprietary graphical operating system families under the name Windows. With Windows NT for consumers, Windows Server for servers, and Windows IoT for embedded systems, each family targets a certain area of the computer industry.
Therefore, the statements A and D are false.
Learn more about the windows, refer to:
https://brainly.com/question/13502522
#SPJ2
"Abusing information technology is punishable by the law." Justify this statement with suitable reason.
Answer: See explanation
Explanation:
Information technology is simply defined as the application of technology so as to solve certain issues and achieve a particular goal.
Information Technology abuse is the willful unauthorized activity which impacts on the integrity or the confidentiality of information technology resources.
Examples of information technology abuse include damaging of state records, falsification of records etc. These offences are punishable by law and anyone caught could end up serving some time on jail.
Which is an advantage of using a flat file instead of a relational database?
O A flat file is easier to set up.
O It is easier to assign foreign keys to a flat file.
A flat file reduces storage of redundant data.
O A flat file reduces storage of irrelevant data.
Hurryyyyyy plssssss
Answer:
The answer to this question is given below is the explanation section.
Explanation:
"A flat file is easier to set up" This option is correct
The advantages we will examine is a flat file is easier to setup.A flat file system can be viewed from any number of application making is very accessible. user will also have very little difficult with understanding the data because each record contains all available about a given flight.simple queries and storing should be no problems for most flat file based systems.
Answer:
a
Explanation:
edge
the volume of two similar solids are 1080cm and 1715cm .if the curved surface area of the smaller cone is 840cm .fond the curved surface area of the larger cone
Answer:
[tex]A_{big} = 1143.33cm^2[/tex]
Explanation:
The given parameters are:
[tex]V_{small} = 1080[/tex]
[tex]V_{big} = 1715[/tex]
[tex]C_{small} = 840[/tex]
Required
Determine the curved surface area of the big cone
The volume of a cone is:
[tex]V = \frac{1}{3}\pi r^2h[/tex]
For the big cone:
[tex]V_{big} = \frac{1}{3}\pi R^2H[/tex]
Where
R = radius of the big cone and H = height of the big cone
For the small cone:
[tex]V_{small} = \frac{1}{3}\pi r^2h[/tex]
Where
r = radius of the small cone and H = height of the small cone
Because both cones are similar, then:
[tex]\frac{H}{h} = \frac{R}{r}[/tex]
and
[tex]\frac{V_{big}}{V_{small}} = \frac{\frac{1}{3}\pi R^2H}{\frac{1}{3}\pi r^2h}[/tex]
[tex]\frac{V_{big}}{V_{small}} = \frac{R^2H}{r^2h}[/tex]
Substitute values for Vbig and Vsmall
[tex]\frac{1715}{1080} = \frac{R^2H}{r^2h}[/tex]
Recall that:[tex]\frac{H}{h} = \frac{R}{r}[/tex]
So, we have:
[tex]\frac{1715}{1080} = \frac{R^2*R}{r^2*r}[/tex]
[tex]\frac{1715}{1080} = \frac{R^3}{r^3}[/tex]
Take cube roots of both sides
[tex]\sqrt[3]{\frac{1715}{1080}} = \frac{R}{r}[/tex]
Factorize
[tex]\sqrt[3]{\frac{343*5}{216*5}} = \frac{R}{r}[/tex]
[tex]\sqrt[3]{\frac{343}{216}} = \frac{R}{r}[/tex]
[tex]\frac{7}{6} = \frac{R}{r}[/tex]
The curved surface area is calculated as:
[tex]Area = \pi rl[/tex]
Where
[tex]l = slant\ height[/tex]
For the big cone:
[tex]A_{big} = \pi RL[/tex]
For the small cone
[tex]A_{small} = \pi rl[/tex]
Because both cones are similar, then:
[tex]\frac{L}{l} = \frac{R}{r}[/tex]
and
[tex]\frac{A_{big}}{A_{small}} = \frac{\pi RL}{\pi rl}[/tex]
[tex]\frac{A_{big}}{A_{small}} = \frac{RL}{rl}[/tex]
This gives:
[tex]\frac{A_{big}}{A_{small}} = \frac{R}{r} * \frac{L}{l}[/tex]
Recall that:
[tex]\frac{L}{l} = \frac{R}{r}[/tex]
So, we have:
[tex]\frac{A_{big}}{A_{small}} = \frac{R}{r} * \frac{R}{r}[/tex]
[tex]\frac{A_{big}}{A_{small}} = (\frac{R}{r})^2[/tex]
Make [tex]A_{big}[/tex] the subject
[tex]A_{big} = (\frac{R}{r})^2 * A_{small}[/tex]
Substitute values for [tex]\frac{R}{r}[/tex] and [tex]A_{small}[/tex]
[tex]A_{big} = (\frac{7}{6})^2 * 840[/tex]
[tex]A_{big} = \frac{49}{36} * 840[/tex]
[tex]A_{big} = \frac{49* 840}{36}[/tex]
[tex]A_{big} = 1143.33cm^2[/tex]
Hence, the curved surface area of the big cone is 1143.33cm^2
distinguish between the desktop publishing packages and multimedia packages
Answer:
___________________________________________________________
Word processing software is used for working with text, while desktop publishing software involves production of documents that combine text with graphics. DTP software is perfect for making flyers, brochures, booklets. This type of software is usually more advanced than word processing apps.
___________________________________________________________
How do you think weather can affect sailing?
What would be good sailing weather?
Answer:
Weather can affect sailing because if its raining it can sink it also if theres a storm. Good weather that would be good to sail in is if its a little windy because if its just sunny and not windy it wont move. ps you can copy it if u want idc
When talking about careers in designing game art, the unit mentioned that a good portfolio and a clear record of experience in game design boosts your likelihood of employment. Think through all of the different skills you have been learning in this course. If you were given the option to shadow someone using these skills to develop a game, which skills are you most interested in developing right now? What kinds of creations could you add to your portfolio after shadowing someone in this field?
Answer:
Explanation:
Many different answerd to this
I dont know what course your taking exactly but i'll do my best <3
Personnally im most interested in balancing in game rewards, balancing AI, or balancing in game currency.
Hmm... I dont really kno what you could add to your portfolio tho. Maybe some things you did that involve what youre interested in doing.
Hope this helps <3
What is the scope of numC?
def usernameMaker (strFirst, strLast):
return strFirst + strLast[0]
def passwordMaker (strA, numC):
answer = dogName[0:3]
return answer + str(numC)
# the main part of your program that calls the function
username = usernameMaker ('Chris', 'Smith')
dogName = 'Sammy'
favoriteNumber = 7
password = passwordMaker (dogName,favoriteNumber)
Options
the entire program
usernameMaker
passwordMaker
# the main part of your program that calls the function
Answer:
local scope which is the entire body of the function/method that it is being used in
Explanation:
The variable numC has a local scope which is the entire body of the function/method that it is being used in, which in this scenario is the passwordMaker method. This is because the variable numC is being used as a parameter variable for that method, meaning that a piece of information is being inputted by when the method is called and saved as the variable numC which is then used by the lines of code inside the method, but cannot be accessed from outside the method thus.
Answer:
The answer is passwordMaker
Explanation:
Edge 2020.