what is the url of the website that would allow you to change your password, adjust quotas, and check a list of known computer problems on campus?

Answers

Answer 1

Answer:

Go to your schools website and look for the change password, ETC area I would guess it would be a "Help" tab

Explanation:

You did not explain what Campus your on however you can find this yourself pretty easy.


Related Questions

___________ helps businesses conduct interactive meetings online, including conferences, training, support sessions, and client presentations.

Answers

Answer: Web Conferencing

Explanation:  I was gonna say technology but that's super broad. It could also be collaborative tools but I think this is the correct answer.

The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home. (9 letters)

Answers

Answer: Hazardous

Explanation: Hazardous materials should be kept somewhere safe.

Answer:

i believe it would be dangerious

Explanation:

Write down a scratch program which:
performs the following tasks 5 times:
1. asks the user to input numbers
2. add the numbers in total variable
3. outputs the result

Answers

What computer language?

What can be written to perform a certain number of iterations or to iterate until a specific result is achieved?

Answers

so in coding we use a thing called a loop to one of the most common loops is a if or loop this is when we tell the software to keep trying the task that is in the loop until it completes the task.

-scav

When you save a page as a template, Dreamweaver stores the new template in a folder named ______________________. *

Answers

when you store a  template in Dreamweaver it is stored in the template folders it also puts a copy in the root folder.

-scav

Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed

Answers

Answer:

Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.

Explanation:

Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.

Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.

JAVA

Write a method that takes 2 parameters: an ArrayList list, and an int numRepeats representing the number of times to repeat each element in the array.


Return a new ArrayList with each element repeated numRepeats times.


For example, if we had an ArrayList list with the values ["hello", "world"]:


repeatElements(list, 3)

Should return a new ArrayList with the elements:


["hello", "hello", "hello", "world", "world", "world"]


public ArrayList repeatElements(ArrayList list, int numRepeats)

{


}

Answers

Answer:

Explanation:

The following Java code creates the repeatElements method as requested and uses the test case shown in the question to test the method. The output can be seen in the attached picture below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       ArrayList list = new ArrayList();

       list.add("Hello");

       list.add("World");

       System.out.println(repeatElements(list, 3));

   }

   public static ArrayList repeatElements(ArrayList list, int numRepeats) {

       ArrayList newList = new ArrayList();

       for (Object x:list) {

           for (int i = 0; i < numRepeats; i++) {

               newList.add(x);

           }

       }  

       return newList;

   }

}

Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal information manager V. proprietary A. software used to keep track of appointments B. software that is hosted on a website C. software used to track tasks and coordinate resources D. software which must be purchased E. software code that is freely available

Answers

Answer:

A. Personal information manager.

B. Web-based.

C. Project management.

D. Proprietary.

E. Open source.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into the following categories;

A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.

B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.

C. Project management: software used to track tasks and coordinate resources.

D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.

Following is the matched solution for the given question.

I. Web-based - B. software that is hosted on a websiteII. Open source - E. software code that is freely availableIII. Project management - C. software used to track tasks and coordinate resourcesIV. Personal information manager - A. software used to keep track of appointmentsV. Proprietary - D. software which must be purchased.

I. Web-based software refers to applications or programs that are accessed and used through a web browser. Instead of being installed on individual computers, the software is hosted on a server and accessed remotely over the internet.

II. Open source software refers to software whose source code is made available to the public. It can be freely used, modified, and distributed by anyone.

III. Project management software is designed to help teams and individuals manage projects efficiently. It assists in planning, organizing, and tracking tasks, resources, and timelines.

IV. Personal information manager (PIM) software is used to organize personal information such as appointments, contacts, notes, and tasks. It helps individuals manage their schedules, track important dates, and maintain personal productivity.

V. Proprietary software refers to software that is privately owned and controlled by a company or individual. It is typically distributed under licensing agreements, and users must purchase or obtain the necessary licenses to use the software.

Learn more about web-based software here:

brainly.com/question/4560046

#SPJ6

A DTP firm has published and printed fliers for an upcoming fundraising event. In which section of the flyer would you find the contact details of the DTP firm
A. Body
B. Credits
C. Navigation
D. Title

Answers

B.Credits at the end of the flyer

Complete the sentence with the correct response.

The central core of an operating system is called the .

Answers

Answer:

Kernel

Explanation:

The Kernel is the program that constitutes the central core of the operating system kernel is the first part of operating system to load into memory during booting kernel is made of various modules which can not be loaded in running operating system kernel remains in the memory during the entire computer session

Restricciones en el uso, adquisición de licencias, No se puede modificar, No se puede redistribuir; son características del software

Answers

Answer:

Software de propietario o privativo.

Explanation:

Este tipo de software no permite ningún tipo modificación,ni redistribución, pues esa funciones están totalmente limitadas por el propietario o dueño del software.Si se requiere alguna distribución o copia ,el cliente debe solicitar pagar.

Select the correct text in the passage.
Which sentences highlight the correct way of preparing baked potato?
George finds that there are no vegetables at home today except potatoes. He decides to prepare something simple with the potatoes. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour. Joe is at home with his friend Elvis. He shows Elvis how to prepare baked potatoes. He preheats oven at 150°F. He then puts potatoes in water. After cleaning the potatoes, he bakes the potatoes in oven at 150°F for 30 minutes.

Answers

Answer:

. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour.

Explanation:this is correct because got it right on the test.

What does a computer program use as a means to evaluate a condition as True or False?

Answers

Answer:

true

Explanation:

Answer:

A Boolean expression.

Explanation:

A Boolean expression is a logical statement that is either TRUE or FALSE . Boolean expressions can compare data of any type as long as both parts of the expression have the same basic data type.

When do you need to apply for a federal student loan?

Answers

Answer:

Explanation:

In order to apply for federal student loans, you must fill out your FAFSA during a specific time. The federal deadline for completing your FAFSA is generally very forgiving — meaning that it comes very late in the school year.

 Someone plzzz help !
Can you use 2 wireless keyboards and 2 wireless mouse on a dual monitor desktop without interfering with the other monitor ?

Answers

Answer:

Good luck

Explanation:

You might find a software but normally you'd need two different OS's but it might be possible if you go under mouse and keyboard settings but it's highly unlikely you'll find what you're looking for there

Complete the sentence with the correct response.

When choosing a new computer to buy, you need to be aware of what operating it uses.

Answers

Answer:

When choosing a new computer to buy, you need to be aware of what operating system it uses.

Explanation:

An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.

3. Maria is in charge of consolidating the names of the participants of the two-day virtual
seminar. She wants to arrange the names alphabetically using MS Excel. Which of the following is
the correct sequence of steps in sorting text?
1. Click the Sort & Filter command. A drop down menu appears.
11. Choose Sort A to Z.
III. Select the cell range needed to be sorted.
IV. Go to the Editing Styles group of Home Tab.
A. I, II, III and IV
C. III, IV, I and I
B. II, II, IV and I
D. IV, l, ll and I​

Answers

Answer:

The correct sequence of steps in sorting text is;

III, IV, I and II

Which is option 'C' where the last item is II

C. III, IV, I and II

Explanation:

Sorting is the orderly arrangement of items (data) according to a specified criteria such as arranging a list of items alphabetically or a numerical arrangement of a data collection

Filtering is the selection for display, data that meets a specific condition

To arrange the names of the participants of the two-day virtual seminar alphabetically using MS Excel the sequence of steps are;

1. Select the rows or columns the are to be sorted by using steps for selecting  rows and/or columns

2. Go to the Editing group of the Home Tab ribbon

3. Click on (the down arrow besides) the Sort & Filter command icon to display a drop down menu with options for type of sorting and filtering

4. Choose Sort A to Z to sort the contents of the cell range in increasing alphabetical order

Therefore, the correct sequence of steps are;

III. Select the cell range needed to be sorted

IV. Go to the Editing Styles group of the Home Tab

I. Click the Sort & Filter command. A drop down menu appears

II. Choose Sort A to Z.

The correct sequence is III, IV, I and II.

in ICT what is the difference between Save and Save As

Answers

Choosing "Save" simply saves your work by updating the last saved version of the file to match the current version you see on your screen.

Choosing "Save As..." brings up a prompt to save your work as a file with a different name. For example, you might choose to save a document called "Paper - rev. 3" as "Paper - rev. 4". This way, you can save you file at different stages and keep multiple versions on your hard drive.

Choosing "Save" and then "Save As..." is also a good way to make a backup of your file. Just be sure to rename the file something new when you choose "Save As..." or you will overwrite the current saved version, just like choosing the "Save" command would do.

Answer:

Save updates the files that are already created.

Save as creates a new file or store the existing file in a new location.

A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system

Answers

Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

Explanation:

A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.

PLEASE HELP !!!!!!!!!!!!!
What is revising?

Answers

Answer:

Revision literally means to “see again,” to look at something from a fresh, critical perspective. It is an ongoing process of rethinking the paper: reconsidering your arguments, reviewing your evidence, refining your purpose, reorganizing your presentation, reviving stale prose.

concept of green computing​

Answers

Answer:

Reducing Environmental Impact of Technology

Explanation:

The main concept of green computing is to reduce the environmental impact that technology has. This revolves around everything that has to do with technology and computing. Including using technology and software to create solutions to better the environment, while also using computing resources as efficiently as possible. Then when the physical devices are obsolete, recycle as much as possible in order to reduce the physical waste that technology has on the environment.

1. Atestharnessprogramfortestingsortingmethodsisprovidedwiththeprogram iles.ItisintheileSorts.javainthech11.sortspackage.Theprogramincludes aswapmethodthatisusedbyallofthesortingmethodstoswaparrayelements. a. Describeanapproachtomodifyingtheprogramsothataftercallingasorting methodtheprogramprintsoutthenumberofswapsneededbythesorting method. b. Implementyourapproach. c. TestyournewprogrambyrunningtheselectionSortmethod.Yourprogram shouldreport49swaps.

Answers

Answer:

Following are the code to this question:

//import package

import java.util.*;

import java.text.*;

public class Main//defining a class

{

static final int t = 50;//defining an integer constant variable

static int[] ele = new int[t];//defining an array

static int tS = 0;//defining integer variable

static void initelements()//defining a static method

{

Random r= new Random();//creating Random class Object

for (int i = 0; i < t; i++)//use loop to add value in array

ele[i] = Math.abs(r.nextInt()) % 100;//add value in array

}

static public boolean isSorted()//defining a method isSorted

{

boolean x = true;//defining boolean variable

for (int i = 0; i < (t - 1); i++)//use for loop to count array values

if (ele[i] > ele[i + 1])//use if to compare array values

x = false;//use boolean variable to hold false value

return x;//return boolean value

}

static public void swap(int x1, int x2)//defining swap method

{

tS++;//increment variable value by 1

//performing swapping

int te = ele[x1];//defining te variable that holds array values

ele[x1] = ele[x2];//exchanging array values

ele[x2] = te;//holding te values

}

static public void disp()//defining a method disp

{

int v1;

DecimalFormat f = new DecimalFormat("00");//creating DecimalFormat class Object

System.out.println("The elements array is:");//print message

for (int i = 0; i <t; i++)//defining for loop  

{

v1 = ele[i];//holding array value in v1 variable

if (((i + 1) % 10) == 0)//use if to check i value

System.out.println(f.format(v1));//print value

else//else block

System.out.print(f.format(v1) + " ");//print value

}

System.out.println();//print space

}

static int getMinimum(int st, int en)//defining a method getMinimum

{

int iMi = st;//defining variable that holds parameter value

for (int i = st + 1; i <= en; i++)//use for loop compare array value

if (ele[i] < ele[iMi])//compare array value

iMi = i;//use iMi to hold loop value

return iMi;//return iMi value

}

static void selectionSort()//defining a selectionSort method

{

int e = t - 1;//defining e variable that holds total array count value

for (int i = 0; i < e; i++)//use for loop to call swap method  

swap(i, getMinimum(i, e));//calling the swap method

}

public static void main(String[] args)//defining main method  

{

initelements();//calling initelements method

disp();//calling disp method

System.out.println("elements is sorted: " + isSorted());//calling is isSorted method with the message

System.out.println();//for space

selectionSort();//calling selectionSort method

System.out.println("No of swaps :" + tS);//print totalswap value with the message

disp();//calling disp method

System.out.println("elements is sorted: " + isSorted());//calling is isSorted method with the message

System.out.println();//for space

}

}

Output:

Please find the attached file.

Explanation:

In this code inside the Main class, 5 static methods "initelements, isSorted, swap, disp, getMinimum and selectionSort" is declared, in which the first method holds random values in arrays, in second array it sorts its values, in the third method it swap the array, in the disp method it shows array values.

In the "getMinimum and selectionSort"  it sorts array values and inside the main method, it calls all methods and prints their values.

1. What is a Network?

A.an arrangement of intersecting horizontal and vertical lines.

B.a group or system of interconnected people or things.

C.files on a computer

D.a device drive used to carry information




Answers

B. a group or system of interconnected people or things

A way to categorize information and point you to where to find that information is called
a. An index c. A table of contents
b. A glossary d. Both A and C

Please select the best answer from the choices provided
A
B
C
D

Answers

I think the answer is D

Answer:

D

Explanation:

Identify six specific skills that a computer software engineer is expected to demonstrate.

Answers

1.) Team work

2.) Disciple

3.). Creativity

4.) Attension To Deatil

5.) Time Mangament

Explanation:

Answer:

A computer programmer needs to demonstrate that they are:

1. A team player

2. Able to meet deadlines

3. Able to solve problems logically and efficiently

4. Able to create programs that fulfill their intended purpose

5. Able to be flexible (do many different types of jobs)

6. Able to adapt to new changes and be able to learn new skills

Explanation:

Computer programmers are tasked with creating software that works effectively with the given hardware and the people using it, and to do that, they have to be very skilled in many areas.

4. What is the difference between head tag and heading tag?​

Answers

Answer 515be559d883f8eab00011e5
head is the tag at the top of your page containing your meta-tags, styles, scripts and title. headings are the h1, h2, h3 etc tags that allow you to size your text. a is an anker usable in the url for navigating to other pages or as in-page navigation.

One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
A: capital gains on the investment will be taxed at a lower rate.
B: fees will not be charged by brokers for selling the investment.
C: money earned on the investment will be considered tax-free.
D: profits on the investment can be averaged over the length of time the investment
is held.

Answers

Answer:

A, Capital gains on the investment will be taxed at a lower rate.

Explanation:

omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!

1) The Output of a computer can be seen on
b) Mouse
a) Monitor
c) Keyboard​

Answers

Answer:

Explanation:

Option B monitor is the correct answer

Answer:

ans is a

hello

myself swapna

A student is writing a research paper about the poetry of the Harlem Renaissance. Which style guidelines will the
student most likely follow when writing about this topic?
-American Chemical Society (ACS)
-Modern Language Association (MLA)
-Council of Science Editors (CSE)
-American Psychological Association (APA)

Answers

Answer:

b

Explanation:

lesssss gooo CLOUWT

The style guidelines that the student is most likely to follow when writing about the poetry of the Harlem Renaissance is Modern Language Association (MLA). The MLA style is commonly used for writing in the humanities, including literature, language, and cultural studies.

What is Modern Language Association (MLA)?

The Modern Language Association (MLA) is a professional organization for scholars of language and literature. It is mainly focused on the study and teaching of languages and literature, particularly in the United States.

The MLA publishes several academic journals, including the flagship journal PMLA (Publications of the Modern Language Association of America), and produces a well-known academic writing style guide called the MLA Handbook for Writers of Research Papers.

This handbook provides guidelines for how to format academic papers and how to properly cite sources in research writing.

To know more about Modern Language Association (MLA):

https://brainly.com/question/2031731

#SPJ2

What is a network?
A. The software only that connects electronic devices so they can
communicate with each other

B. The hardware only that connects electronic devices so they can
communicate with each other

C. The hardware and software that prevents electronic devices from
communicating with each other

D. The hardware and software connecting electronic devices so they
can communicate with each other

Answers

Answer:  For a network to exist, both the hardware and software of a computer must be able to communicate with other computers, so the answer is D.

The hardware and software connecting electronic devices so they can communicate with each other.

What is Network?

An interconnected system of nodes that can send, receive, and exchange data, voice, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are two examples of nodes in a network. Endpoint users frequently use computer networks to exchange resources and communicate.

They frequently appear everywhere, including in buildings like homes, offices, and government agencies. Computer networks can be used to share information and get around geographical restrictions.

Several protocols and algorithms are used by network devices to define the precise transmission and reception of data by endpoints. For instance.

Therefore, The hardware and software connecting electronic devices so they can communicate with each other.

To learn more about Network, refer to the link:

https://brainly.com/question/15002514

#SPJ7

Other Questions
someone help me if you can :) if my 10 what year would it be when im 100 years old Which factors would historical criticism most likely take into account? Check all that apply.beliefs that were common during the period the text was writtenthe suspenseful tone of the textwhether the text is popular with todays readersmajor political events that occurred when the text was writtenthe original audience for the text Your itinerary contains a grid map of New York, with each unit on the grid representing 0.25 miles. If the Rockefeller Center is located at (2,1) and Central Park is located at (7,6), what is the direct distance (not walking distance, which would have to account for bridges and roadways) between the two landmarks in miles? Round your answer to two decimal places, if necessary. What period in history reenergized Europeansand prepared them for exploration? Hi! Whats one way that you study? Just wondering Que instrumentos de laboratorio usaron luis y Juan?Luis y Juan queran hacer una investigacin sobre la rapidez de disolucin de una pastilla efervescente en el cido actico a temperatura caliente. Para esto, tenan que triturar la pastilla y luego utilizar solamente 15 gramos de la sustancia. Tenan que medir 50 ml de cido actico y colocar el mismo en un recipiente donde se pueda calentar sustancias, pero que el vapor generado se libere rpido. Al agregar ambas sustancias al recipiente de vidrio, lo comenzaron a calentar. Una vez se iba calentando, agitaron las sustancias poco a poco y con mucho cuidado, tomaron los cambios en temperatura de cada 2 minutos. Al finalizar el experimento, ellos compartieron sus resultados con sus compaeros de clase. What types of organisms do alcohol fermentation ? Summarize this process, Given f(x)=-x+2f(x)=x+2, find f(-1)f(1) How many solutions does the equation below have?2(4x - 1) = -80 2 What are some rights Lincoln restricted during the civil war? State the angle relationship and state the measure of each angle indicated that makes lines u and vparallelThank you smmmmm I will mark you btw !i posted this again bc these r my last questions and hopefully someone sees this to help me! use these words to complete: meager, agony, wage, contempt, essential, impulse, outrageous, penury How did the government help the railroads connect the West Coast with therest of the country?A. They allowed the railroads to pay their workers more money.B. They raised their taxes so they made more money.C. They brought in slave labor from the American South.D. They cavethem lots of land to build the tracks on. (-5) + 6= ___________How would the numer line model be different if you wanted to find (-5) + (-6)? in sentence 13 (reproduced below), the writer wants to include a piece of relevant evidence that will help convince the reader to accept the techniques used by warren buffet as credible. fortunately, there are techniques, like those used by warren buffett (born in omaha, nebraska, in1930) when he makes his financial decisions that can minimize the risks of confirmation bias. which of the following versions of the underlined portion of sentence 13 best accomplishes this goal? Aright triangle has leg lengths of 7 centimeters and 24 centimeters.What is the length of the triangle's hypotenuse? Resting metabolism includes your basal metabolism.TrueFalse Which table represents a linear function? A soccor team last 30% of its games suppose the team won 14 games how many games did the team play