Answer:
A, C, and E
A. Unicode allows for automatic translation through the use of standard codes for each character.
C. In almost all circumstances, it is best to have a person translate your content.
E. Components that should be translated include license agreements, notifications, and alternative text for images.
Explanation:
I tried your answer but it was wrong. This was the answer that came up instead.
The statements which are true about translating content are as follows:
Using a translation app or plug-in is often the best choice for those on a budget.In almost all circumstances, it is best to have a person translate your content.Unicode allows for automatic translation through the use of standard codes for each character.Thus, the correct options for this question are A, C, and E.
What do you mean by Content translation?The Content translation may be defined as the methodology of modifying existing contents that are considerably designed in order to attract, engage, and retain a particular audience.
Examples of the content translation may include blog posts, white papers, videos, podcasts, newsletters, social posts, etc. These content translations are generally done in order to make the audience understandable and be satisfied with the information that was earlier written in a very complicated form.
Therefore, the correct options for this question are A, C, and E.
To learn more about translation, refer to the link:
https://brainly.com/question/14480244
#SPJ2
which excel feature prevents you from having to type the same thing over and over?
Answer:
Explanation: Another way by which you can do it, press the Ctrl+1 key on your keyboard, Format cells dialog box will get appear. Go to Alignment tab, Click on Justify in Vertical drop down list, click on ok. This is the way by which you can prevent the text from spilling over in Microsoft Excel 2010 and 2013.
in word 2010, the document information panel has been moved to the ______.
In word 2010, the document information panel has been moved to the File tab.
Microsoft Word is a word-processing program that is used for creating documents.
The steps taken to locate the document information panel is:
Open a new document in Word 2010. Click on the File tab located at the top-left corner of the window. Click on Properties and then click the Show Document PanelIn word 2010, the document information panel has been moved to the File tab.
Find out more at: https://brainly.com/question/17241854
wap to sore two different variable a and b resoectively. Calculate sum
Answer:
Input : x = 10, y = 20;
Output : x = 20, y = 10
Input : x = 200, y = 100
Output : x = 100, y = 200
Explanation:
Pls give ME A BRAINLAIST
please tell me the answer a.1111+1011. b. 10111+11111 c. 1111*1011 d. 1110*1101 perform the binary calculations.pleaseeeeeee
Answer:
c.111*1011
Explanation:
because this is the perform fissionable or the binary calculations
mark me brainliest please
Answer:
[tex]11010[/tex]
Explanation:
Number 1 in the decimal system
[tex]1111^2 = 1510[/tex]
Number 2 in the decimal system
[tex]1011^2 = 1110[/tex]
Their sum
[tex]15 + 11 = 26[/tex]
Result in binary form
[tex]26 {}^{10} = {1101}^{2} [/tex]
how many levels of heading tags are allowed in html?
Answer:
six levels
Explanation:
HTML defines six levels of headings. A heading element implies all the font changes, paragraph breaks before and after, and any white space necessary to render the heading. The heading elements are H1, H2, H3, H4, H5, and H6 with H1 being the highest (or most important) level and H6 the least.
Answer:
six levels
Explanation:
Need help Plz i have only 20 min
Answer:
1. tripod
2.srry i don't know
3. true
4. sorry i don't know
5. prob true
Answer:
Tripod
2. The pixel
3. True
4. Goo_____gle Slides
5. True
Sona wants to start a business in India. Her friend suggest an idea to her is that to start business operations through an outside service provider will help to reduce the burden. In such situation, Sona begins
Explanation:
to try and start her business
Please please help I don’t understand thus
Answer:
I am pretty sure the answer is path.
Explanation:
Each section in the user/juanita/etc thing makes up a path.
The _____________________ search is a very simple algorithm. Sometimes called the ________________________ search, it compares each element with the value being searched for, and stops when either the value is found or the end of the array is encountered. Group of answer choices
Answer:
linear search
sequential
Explanation:
100 POINTSSSSSSS!!
Intellectual property laws were created because _____.
A. people have a right to their own intellectual property
B. people have no value for their own intellectual property
C. people have to get permission to own their intellectual property
D. people have to sacrifice their own intellectual property
Answer:
D
Explanation:
edg 2021
Answer:
A. people have a right to their own intellectual property
Explanation:
sharing resources.
b) What do you say for the picture given?
2) Write the advantages of
computer
networks
5
Answer:
Explanation:
2- Multitasking Multitasking – Multitasking Multitasking is one among the main advantage of computer. ...
Speed – Now computer isn't just a calculating device. ...
Cost/ Stores huge – Amount of knowledge it's a coffee cost solution. ...
Accuracy – ...
Data Security – ...
Task completer – ...
Communication – ...
Productivity –
More items...•
___________ can only be used to create parts that are axisymmetrical.
a.casting
b.turning
c.milling
d.drilling
Explanation:
drilling can only be used to create parts that are axisymmetrical.
When and why would you use a prefab?
Subject video gaming
Answer:
You should also use Prefabs when you want to instantiate GameObjects at runtime that did not exist in your Scene at the start - for example, to make powerups, special effects, projectiles, or NPCs appear at the right moments during gameplay.
Which are potential harmful effects of intellectual property rights? Select 3 options.
-programmers cannot build on copyrighted programs
-inventors have no incentive to create new work
-the flow of information between devices may be slow
-people may be prevented from sharing good ideas
-creativity may be stifled by patents that are not innovative
Answer:
Hi there!
Here is your answer...
Programmers cannot build on copyrighted programsThe flow of information between devices may be slowCreativity may be stifled by patents that are not innovativeExplanation:
Programmers cannot build on copyrighted programs, the flow of information between devices may be slow and creativity may be stifled by patents that are not innovative. The correct options are a, c, and e.
What are intellectual property rights?Intellectual property rights (IPR) are the legal rights granted to the inventor or creator to protect his or her invention or creation for a set period of time.
These legal rights grant the inventor/creator or his assignee the sole right to fully exploit his invention/creation for a specified period of time.
Intellectual property protection is essential for encouraging innovation. Without intellectual property protection, businesses and individuals would not reap the full benefits of their inventions and would devote less time to research and development.
Its negative effects include Programmers cannot build on copyrighted programs, information flow between devices may be slow, and creativity may be stifled by non-innovative patents.
Thus, the correct options are a, c, and e.
For more details regarding intellectual property rights, visit:
https://brainly.com/question/169200
#SPJ2
How does the internet help you to improve your:
mental health
self esteem
Help you stay mentally active
Help you stay in contact with family
Like why is the internet useful and a good thing
Answer:
Help you mentally active
Explanation:
bcoz we can use internet in good ways
What are megapixels?
A. the size of an image captured by a camera
B. giant pixels inside the camera
C. a computer store
D. a video game played in a camera
Answer:
A.
Explanation:
A. It's the total number of pixels in an image obtained by multiplying the dimensions (height times width). For large images, this multiplication can be in the millions (=mega), hence the term mega pixels.
How can I use HTML to express a personal value
Answer: Order list
Explanation:
We can use HTML to express a personal value as a order list of some of our personal feelings.
What is HTML?HTML stands for Hyper Text Markup Language. It is defined as the preferred markup language for texts intended for web browser display. HTML is the name of the language that describes how Web pages are organized. HTML allows authors to publish documents with headings, text, tables, lists, graphics, etc. online. Utilizing hypertext links, you can instantly access internet content by clicking a button.
You must assess the major facets of life, including the environment, job, enjoyment, romance, personal development, money, health, friends, and family, in order to develop a strong personal value system. Consider the significance of each area of your life, and then consider how fulfilled you currently feel in each area.
Thus, we can use HTML to express a personal value as a order list of some of our personal feelings.
To learn more about HTML, refer to the link below:
https://brainly.com/question/24065854
#SPJ2
Please helpp:)
To save your HTML document you should save it as
.html
Or
.txt
Answer:
.html
Explanation:
19. WHICH KEY ALLOWS YOU TO DELETE AND TYPE OVER TEXTS? *
BACKSPAACE
INSERT
CAPS LOCK
NUMBER LOCK
Answer: backspace
Explanation:
when you use the backspace key, the text you have already typed will delete, allowing you to type new text.
y aren't nobody helping me out
AND GIVE ME A GOOD EXPLANATION PLEASE I REALLY NEED THIS I DONT WANT ZERO IT DUE TOMORROW
Explanation:
So choose a software. Let's say you choose some sort of browser. What is required do install it? And then for the second part, you specify the operating system. then you show images, logos and the user interface of the software (like what it looks like).
hope this helps!
(sorry, i wrote a lot more but for some reason it wouldnt let me upload it, i hope this works)
Answer + Explanation:
Software 1: Python
Python is a high - level programming language, in which many programmers use to build apps, databases and programs. This piece of software is free, and it only needs a small capacity of RAM (Random Access Memory), about 2GB. This programming language is one of the best, and it will run on any operating system, whether it be MacOS, Android or even Linux (Chrome OS)!
Software 2: Kodu Game Lab
Kodu Game Lab is a 3D game building environment that was designed for students of all ages to use. Although this software is the best that you could get, you need a huge amount RAM, about 4GB, if you want the program to run smoothly. Also, you cannot run or install this software in any other operating system other that Windows 10+ or possible MacOS.
Software 3: Davinci Resolve
Davinci Resolve is a professional video editor, and while professional video producers or photographers use it, it is not compatible with ChromeOS or Windows. It is only available on MacOS. Also, in addition to that, you need a large amount of VRAM, 10-20GB for the best, 6 - 8K.
Software 4: Unity
Unity is by far the best game maker. This is easily usable to professionals as there are a variety of different tools you can use. However, such a good software doesn't come free. If you want the pro version, your looking at about $150 / £109 every month. Also, you can only operate this software on MacOS and Windows.
Software 5: Maya
This is the best 3D editing software you could install, with a costly price. You are looking at £246 every month. You could insure a car for less than that! Also, this will only run on MacOS, and if you do want to operate this, you want your system to have an AMD64 and 9GB RAM. That is a lot for just one software to run!
Why do reviewers consider the context of a work?
A. To analyze whether or not the public will like the work
B. To pick chart all the content presented in the work
C. To research its original purpose and historical background
D. To take notice of one's physical reaction to a media piece
Answer:
I think the answer is C.
Explanation:
HOW TO CHANGE GRADE IN SKYWARD!!
This is a way to change your grades in skyward to show your parents that you have straight A's!!
Firs go to your gradebook, then tap with two fingers on the grade you want to change then locate where it says the grade and click it until you can delete in, put in the grade you want and BOOM
Answer:
Thank you!
Explanation:
TYTYTY!
what to do if you forgot your locked notes password
Answer:
what you can probably do is go to an Apple store and book an appointment with the Genius Bar and tell them your problem to see if they can help you recover your password.
i hope this helps :D
Help please! i don’t know how to do this.
H2 should be:
-Blue
-Times New Roman or Arial
-Align to the right
2. Strong should be:
-Teal
-32pt
-Boldness of 700
3. P should be:
-All in uppercase
-Overlined
-Word space of 10em
Answer:
Make sure to create and link a css file with the following:
<link rel="stylesheet" href="./styles.css">
In your css file, enter these styles:
h2 {
color: blue;
font-family: 'Times New Roman', Times, serif;
text-align: right;
}
strong {
color: teal;
font-size: 32pt;
font-weight: 700;
}
p {
text-transform: uppercase;
text-decoration: overline;
word-spacing: 10em;
}
Explanation:
In order for the html file to know where your styles are located, you have to link it to the css file with the code given above. In this file, you will enter some css to change the styles of the elements you have created in your html file.
To alter the style of an element, you first have to enter the name of the element itself, its class or its id. In this case, we have used the element itself, meaning that all the same elements in the html file will have the same style. The styles you wish to use are entered in between the curly brackets.
In your specific problem, we are trying to change the h2, strong and p elements, so that is what we have done. For the h2, you wanted it blue, therefore we use the color property to change the color. For the font, we use the font-family and finally we use text-align to align it to the right. The same pretty much applies for the other two elements. Your strong element needs to be teal,32pt and 700 bold. Therefore we use the color, font-size and font-weight properties respectively. And finally for the p element, we will use the text-transform, text-decoration and word-spacing properties respectively.
When you dont know the name of the property you want to change, I suggest googling it. You will definitely find the property name you are looking for. W3schools.com is a good source to use.
How graphic designing
changed in years? Write in 300 words.
Answer:
Graphic design has a rich and varied history. The word “graphic design” didn’t appear on the scene until 1922, when William Dwiggins created the word to describe the art of designing with graphics. In the earliest days of graphic design, professionals drew by hand. However, in the last 60 years graphic design has forged ahead, advancing rapidly since the addition of today’s digital art tools.
Earliest Graphic Design
Even though the term wasn’t yet coined, some of the earliest designs included typography for books and newspapers. One could also argue drawings on cave walls represent a form of ancient graphics.
Fast forward to the 1900s when posters became a form of expression. During the 1940s, graphic design appeared in propaganda posters of the era, such as the “We Can Do It” poster with Rosie the Riveter. Slogans were short, to the point, and added to a graphic that set the tone.
As technology began to change and become available to more people, the entire industry that would become known as graphic design began to emerge.
The 1990s
In 1990, Photoshop 1.0 arrived on the scene. Back then, you could only use Photoshop with Macintosh computers. The birth of this new tool again changed designers’ ability to experiment with new techniques, including overlapping text, faded elements, and digital overlays.
Grunge was also born in the ’90s, which showed up in movie poster designs, book covers, and album covers with dark looking images and simple colour palettes, such as white on black, perhaps with a pop of red. A few grunge typefaces even came about—gritty and raw-looking text.
The 2000s
The 2000s began an entirely new frontier for graphic designers. In addition to tools becoming even more powerful, people were suddenly designing on portable devices, such as smartphones. On top of that, designers began to realize the importance of designing in a way that looked good across all device types.
Movement became more of a focus, with designers looking for ways to make even static logos look like they’re in motion.
One example of a logo that appears to almost be in motion is the AT&T logo of a globe. Because of the mix of blue and white along with the angles of the logo, one can imagine that the image is spinning slowly just as the earth does. They debuted the logo in 2005.
Recent Changes
There isn’t one method that dominates graphic design today, but a mix of design techniques and styles. Trends emerge from year to year—and sometimes month to month. In 2017, the use of cutout text that meshed with strong images allowed designers to create unique looks for websites and logos.
Other trends included flat icons and the addition of videos across marketing channels. Websites need to be mobile responsive more than ever before, so simplicity is the order of the day, along with speeding up overall rendering. Print advertising meshes with mobile devices, bringing a new experience to users that is more immersive.
Evolution of Graphic Design
Where graphic design will go in the future is anyone’s guess, but the user experience is sure to remain at the forefront. Designs will become more personalized and more interactive over time. One example of this type of technology and personalization appears at Walt Disney World in Orlando. As riders stroll past digital posters, a sensor picks up the signal from a magic pass armband, and the guest’s name comes up on the poster, welcoming them.
Regardless of where design goes next, expect to see increasingly more personalized designs that enhance user experience in your daily life.
Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.
No food or drinks near the computers. NO EXCEPTIONS.
Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.
Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.
Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.
Do not change computer settings or backgrounds.
Ask permission before you print.
SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.
If you are the last class of the day, please POWER DOWN all computers and monitors.
Keep your files organized
Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.
Log off
Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.
Each person may only use one computer at a time
Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.
Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.
Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.
.Explanation:
sorry about only 9 rules
why is there so much stuff popping up on my computer task manager
Answer:
Honestly there could be a number of reasons
Explanation:
could be that you have a virus.
could be unfinished tasks
there's really lot of reasons this could be happening.
I suggest if its your browser task manager to reset your browser (via browser settings)
If its the system task manager, i suggest trying to restart the computer and go from there.
depending on the root of your problem, it may work, it may not.
Hope this helps :P
tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?
A DNS attack which would only impact a single user is: DNS poisoning attack.
DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.
In Cybersecurity, there are different types of DNS attacks and these include:
DNS flood attack.DNS tunneling.DNS poisoning attack.DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.
Read more: https://brainly.com/question/17273205
Compare and contrast the advantages and disadvantages of a LAN to a WLAN.
Please someone answer I need the answers urgently.
Answer:
A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. ... A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive.
LAN stands for Local Area Network. WLAN stands for Wireless Local Area Network. ... WLAN connections are completely wireless. LAN network is a collection of computers or other such network devices in a particular location that are connected together by communication elements or network elements.
Easy and Cheap Communication: Data and messages can easily be shared with the other computer connected to the network. Centralized Data: The data of all network users can be stored on a hard disk of the central/server computer. This help users to use any computer in a network to access the required data.
Explanation:
I don't know if it's correct,
so hope it helps
You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network?
a. Use shared secret authentication.
b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE.
c. Configure devices to run in ad hoc mode.
d. Use open authentication with MAC address filtering.
e. INSTALL A RADIUS SERVER AND USE 802.1X authentication.
Answer: Install a RADIUS server and use 802.1x authentication
Explanation:
To configure the wireless network with multiple access points and use WPA2, you should install a RADIUS server and use 802.1X authentication. The correct option is e.
What is configuration?Configuration, in its broadest sense, describes the process of setting up or organizing anything in accordance with a given specification or needs.
Installing a RADIUS server and utilizing 802.1X authentication will enable you to configure the wireless network with numerous access points, WPA2, and other security features.
You can authenticate wireless clients based on their Active Directory credentials by using a RADIUS server and 802.1X authentication.
This will increase the wireless network's security by ensuring that only authorized users can connect to it.
Ad hoc mode, open authentication with MAC address filtering, and shared secret authentication are not advised for securing a wireless network since they offer flimsy protection and are simple to crack.
Thus, the correct option is e.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2