Which function would you use to make sure all names are prepared for a mailing label?

Answers

Answer 1

Answer:

Proper Function

Explanation:

I just took the quiz on engenuity.

Answer 2

Answer:

Proper on edge

Explanation:


Related Questions

The purpose of the merge and center command is to _____.

Answers

The merge and centre command is one of the most common tools used in formatting tables in a word-processing software. In addition, its primary purpose is to "merge cells into one cell and center the text in that cell." in order for the spreadsheet in a report to become more presentable.

help me please, thanks :)
will mark brainliest btw

Answers

benifits Ease of Access to Information. The World Wide Web, abbreviated as www has made the world a social village. Saves Time. Ease of Mobility. Better Communication Means. Cost Efficiency.  Innovation In Many Fields. Improved Banking Better Learning Techniques.

risks Theft or manipulation of sensitive or private information, such as financial or health records.

Virulent computer viruses that can destroy data, damage hardware, cripple systems and disrupt a business' operations.

Computer fraud.

Repl.it Assignment 4.1.2 (Guess the Number)
Please help me
I will give brainliest and a like

Answers

Like 4 .1.2 -31 or 21

What is a goal for a good programmer?

a. writing efficient code

b. force the computer to multitask

c. to increase the memory in a computer

d. name applications

Answers

Answer:

A. Writing efficient code.

Hope this helps!

How do you answer a question on here

Answers

Didn’t you just make a question right now?
You click on a question you know the answer for, and click the blue button that says Answer

what is ICT gadget, examples,types,uses, functions, important​

Answers

Communication and information technologies include devices such as computers, which help people to communicate with others and access information.

What does ICT stand for?

This abbreviation refers to information and communication technologies, which is a very popular term nowadays.

What are some examples?Television.Computers.Smartphones.Tablets.Among others.

How are they classified?

They can be classified based on their invention date (older/newer), their purpose (education, entertainment, etc,) or how accesible they are.

What are they use for?Access information such as searching about astronomy on internet.Communicating with others such as videocalls or text messages.

Why are they important?

They help people stay informed and communicated. Moreover, they have shaped modern world.

Learn more about technologies in: https://brainly.com/question/9171028

Adnan merges the shapes he added to mimic the bridge structure. The modification is shown below.


Which tab did Adnan use to merge the shapes?

Which Merge Shapes option did Adnan use?

Which property of the shapes did Adnan modify?

Answers

Answer:

✔ Drawing Tools

✔ Combine

✔ Shape Outline

Explanation:

Answer:

1) Drawing Tools

2) Combine

3) Shape Outline

Explanation:

Which is the best reason for why it is important to keep personal information private online?
to prevent becoming the target of a scam
to ensure strangers do not approach them
to prevent others from using it dishonestly
to stop people from following them online

Answers

Answer:

A. To prevent becoming the target of a scam

Explanation:

The more person information you put out on the internet, the easier it is for people to steal it and use it for malicious purposes.

Answer:

To prevent others from using it dishonestly.

Explanation:

Keeping private information to yourself is always a safe approach. Giving out your private information could result in false behavior on your account.

Which term describes the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable?

fault-tolerance

file tolerance

fault-line

file protection

Answers

Answer:

the answer is fault tolerance

Explanation:

Answer:

fault-tolerance

Explanation:

On Edge, fault-tolerance is described as the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable.

I hope this helped!

Good luck <3

1
Match the following document file types with the suitable descriptions.
Document file type
Description
(a) TXT file
• (i) It can be edited by Microsoft Word 2010.
(b) PDF file
(ii) It can be opened in OpenOffice.org Writer.
(c) DOCX file
• (iii) It can be shared on the Internet easily.
(d) Google document
(iv) It can be opened by most word processors.
(e) ODT file
. (v) Its content and layout cannot be edited by
an ordinary word
processor.​

Answers

Answer:

a-i b-II c-III d-iv e-v

Subtract B8 from the sum of cells
C1 through C10

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

To subtract B8 from the sum of cells  C1 through C10, you need to perform the following steps.

click on empty cell or C11. In C11 write the formula, =sum(C1:C10) this formula calculates the sum of cells  C1 through C10, and store result in C11. Now click on cell C12.      Write formula  in C12 i.e. =C11-B8 this formula subtract B8 from the sum of cells  C1 through C10 and store result in C12

If you schedule a message to be delivered at 6 p.m., but you log out of your computer at 5 p.m., what will happen to the message?

It will be delivered at 6 p.m. as scheduled.
It will be delivered when you log back in.
It will be delivered at 5 p.m. when you log out.
It will not be delivered at all and will be canceled.

Answers

Answer:

B

Explanation:

It will be delivered when you log back in.

what is part of computer

Answers

Answer:

CPU, GPU, SSD or HDD, Cooler for CPU, RAM, and power supply.


If i missed something please let me know

Answer:

The parts of a computer are listed below;

MonitorCPU (computer processing unit)KeyboardMouseSpeaker.

_____ is(are) often used in reports to quickly represent data and help the readers understand the data.

WordArt
Shapes
Charts
Photos

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option of this question to fill in the blank is Charts.

Charts are often used in reports to quickly represent data and help the readers understand the data.

There are different types of charts, for example, pie chart, line bar graph/chart, etc. Charts to used to present data for the visual representation of data.

Why other options are not correct.

WordArt: WordArt is a pre-build style in word processing applications. For example, if you want to show a stylish word "Welcome" then you can use WordArt, WordArt can be used to represent data as like Charts.

Shapes: Shapes do not represent data, shapes are used to draw shapes/drawing such as square, rectangle, line etc.

Photos: Photos do not represent data visually, however, you can take photos of charts, but the photo itself does not represent data.

A second class lever needs less effort to lift a heavy load. Give reasons​

Answers

Explanation:

1. Using a lever makers it easier to move a load and so you use less effort.

2. Second class lever:- The load is between the fulcrum and the effort

These types of lever always acts as a force and magnifier and it's mechanical advantages is greater than one

What type of file is MyFile.exe?

Answers

The file type is excel

Answer: executable

Explanation:

What are the problems with security when working on a Web Page?

Answers

Answer:

Hackers are sometimes able to exploit vulnerabilities in applications to insert malicious code.

Explanation:

Answer:

Depending if you have a virus already on your computer then your security risk on opening a new web page may be high

If not the security risk would be low

but to sum it up It really depends what your default search engine is

rn i use DuckDuckGo and i posted a Screen shot (if ur using chrome this extension can be added) and google (not saying its bad) but it has a risk for you security.

I really hope this helps

High Hopes^^

Barry-

The human brain can store both temporary and permanent bits of information. Which type of memory in the computer is similar to the temporary storage in your brain?

BIOS
PRM
RAM
ROM

Answers

Answer:

RAM

Explanation:

"RAM" refers to Random-Access Memory. Just like the human brain, this stores your computer files temporarily. It is considered to be a "volatile memory" which means that information can only be stored when there's power. So, when your computer shuts down, the information is lost. This is similar to the human brain, especially when it comes to learning. When a person learns new things, some of the information he read before may be forgotten.

_____ are pictures that you can click on to tell your computer what to do.

icons
menus
applications
FATs

Answers

Answer:icons

Explanation:The reason it is icons is because icons can become pictures

Answer:

Icons

Explanation:

can create pictures by grouping together.

What is the unity Programming Language?

Answers

Answer:

Unity is an engine you can use different programming languages to help create ur game, such as

python, rust, JavaScript, and C#

Please help me ASAP first answer gets brainliest

Answers

Answer:

okay but where is problem bro

Explanation:

Use of the internet to access programs and data on computers that’s are owned and managed by the other using large data centers.

Answers

Answer:

I just wanna learn how to code

Explanation:

Select the correct navigational path to hide a worksheet.
Click the ____ tab on the ribbon to the Cells gallery.
Select ___ and use that drop-down menu to select ____.
Then Hide sheet.

Answers

Answer:

Home, Format, Hide & Unhide.

Explanation:

A person with a low number of white blood cells could have difficulty in fighting infections and A decrease in the number of lymphoid stem cells could result in a decrease in red blood cell.

What is nucleotide?

It is the sub units and buIlding blocks of DNA. It is made up of a five-sided sugar, phosphate group and then a nitrogen base.

These groups make the backbone of the DNA helix. If you look at a DNA helix, they make the side of the ladder or the side portion. They connect to a nitrogen base which make the steps of the ladder.  The type of sugar that is used in a DNA helix is called deoxyribose.

Nitrogen bases are the molecules that make up the steps of the ladders. There are four different nitrogen bases, namely; Guanine, Thymine,Adenine and Cytosine.

Pyrimidines are compounds that make a single 6-sided ring. Examples of pyrimidines are Cytosine and Thymine. Purines on the other hand make 5-sided and 6-sided rings.

Therefore, A person with a low number of white blood cells could have difficulty in fighting infections and A decrease in the number of lymphoid stem cells could result in a decrease in red blood cell.

Learn more about white blood cells on:

https://brainly.com/question/19202269

#SPJ5

What is the computer’s natural language?

hierarchical
symbolic
binary
hexadecimal

Answers

Answer:

binary computer natural language

Answer:

C)Binary

Explanation:

Edge 2021

The language of 1's and 0's

Analyzing Uses for PDFs
A PDF file would most likely be used for which situation?
O You need to e-mail more than one file to a friend.
O You want someone to make a lot of edits to a file.
You need to send a file to someone who does not have Word.
O You want to save and print several copies of a file.

Answers

Answer:

You need to send a file to someone who does not have Word

Explanation:

In this case the answer is You need to send a file to someone who does not have Word.

But we use PDF to send files without changing its format.

Answer:

You need to send a file to someone who does not have Word

Explanation:

Type the correct answer in the box. Spell all words correctly.

Which type of fair use category allows you to imitate another person’s well-known work in a comical way?

The fair use category of............... allows you to imitate another person’s well-known work in a comical way.

Answers

Answer:

parody (use under-case for PLATO)

Explanation:

Why is the len ( ) function useful when using a loop to iterate through a stack?
The len ( ) function will print the elements of the stack.
The len ( ) function will run with each iteration, printing the element number each time.
The len ( ) function will tell the program the number of elements in the stack.
The len ( ) function will remove the duplicate elements in the stack.

Answers

The len ( ) function will run with each iteration, printing the element number each time.

The len ( ) function useful when using a loop to iterate through a stack because the len ( ) function will tell the program the number of elements in the stack.

What is len ( ) function?

The len ( ) function is the function which gives back the number of characters as a output in a given text string. The len function gives back the zero when the string is empty with no text in it.

Let suppose a word "HELLO" is written on the string. Then the len function count the characters of this word and  gives back the result as 5.

This function is helpful when using a loop to iterate through a stack as there it describes the number of elements in the stack.

Thus, the len ( ) function useful when using a loop to iterate through a stack because the len ( ) function will tell the program the number of elements in the stack.

Learn more about the len ( ) function here;

https://brainly.com/question/17054161

#SPJ2

The ______ ratio defines a display's width relative to its height.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to fill in the blank.

The correct answer is:

The aspect ratio defines a display's width relative to its height.

An aspect ratio is a proportional relationship between the width and height of the image. It describes the image's shape in terms of width and height.

The aspect ratio can be written in the formula of width to height.

For example; if the display or image has an aspect ratio of 2:4, then it means that the display height is 2 times of width.

Another example of a square image or display is 1:1 that means that the aspect ratio is the same (width and height are the same)

The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, then the IP address is sent to the web (host) server. What is the final step in the DNS process? The client sends a request to the DNS server. The DNS server translates the IP address back to the URL. The process starts over at the beginning. The web server sends the information back to the web browser.

Answers

Answer:

The web server sends the information back to the web browser.

Explanation:

The DNS look up is the process that happens when we type a URL into the browser gets converted into an IP address that's used to locate the website's servers. Then when this query reaches a final server, it is returned back to the computer with the data that we need.

So the final step in the DNS process is the web server sends the information back to the browser.

I hope this answer helps.

Why do IT professionals have strict legal and ethical standards?

A. The credentials they hold to perform their job.
B. The oath they took when they began their career.
C. The pressure put on them to behave a certain way.
D. The strategic role they play in an organization.

Answers

Answer:

The answer is B: The oath they took when they began their career.

Explanation:

Other Questions
please help due in 30 minutes!!!!!!! pleeeeeeeese help Bob had 612qt of paint. He used 323qt to paint a roomHow much paint does Bob have left?Enter your answer in the box as a mixed number in simplest form. Have you ever given up eating certain food or drinks for a cause? If so, explain. If not, would you? Why or why not? A contractor purchases ceramic tile to remodel a kitchen floor. Each tile costs $4.00, and the adhesive and grouting material needed for the whole job costs $15.82. The contractor is charged a total of $655.82, how many ceramic tiles did the contractor purchase? How can two objects of different masses have the same temperature but different amounts of thermal energy? how much will a 200kg hippo accelerate if we push it with a force of 800 N(newtons) Estimate a 15% tip on a dinner bill of $62.35 by first rounding the bill amount to the nearest ten dollars. anyone know the answer to all of these, i Beg of you to help me !! Who where the primary leaders in New England colonies Im in the 2nd column, 4th row, and Im a metal. Who am I? 2. Im a very lonely nonmetal. Who am I? 3. Im the only metal who is a liquid at room temperature. Who am I? 4. Im named after the person who created the 1st Periodic Table. Who am I? 5. I have 92 protons. pls help asap Which people would make up a flight crew? (Select all that apply.)O captainflight engineerO avionic mechanicO co-pilot 11. The property of mineral that can be observed directly is theA SizeB. ColorC. StreakD. Texture Cheryl is curious how different amounts of sunlight will impact the growth of her tomatoes. She exposed some of her tomatoes to varying amounts of sunlight (in hours per day) and recorded the change in their circumferences (in centimeters) after a week. Her data is summarized in the table below. what is meteorplz tell 04.PMAWhich was an impact of the Magna Carta on the government of the United States?natural rightssocial contractlimited governmentseparation of powers What is moral engagement ? What are the characteristics of ineffective notes? Check all that apply.They are illegible and hard to read,They cannot be used as a reference,They include headings and formatting.They contain symbols and abbreviations.They contain too little information.They contain too much information,They summarize key information. PLEASE HELP please help due in 20min! Complete the statement below using the correct term.All digital devices use software programs to function. Software create these programs. Questions for the Opening Vignette Why is it important for IRS and for U.S. state governments to use data warehousing and business intelligence (BI) tools in managing state revenues? What were the challenges the state of Maryland was facing with regard to tax fraud? What was the solution they adopted? Do you agree with their approach? Why? What were the results that they obtained? Did the investment in BI and data warehousing pay off? What other problems and challenges do you think federal and state governments are having that can benefit from BI and data warehousing? What We Can Learn from