list five function key
list two alphabet key
byEmmanuel okorie​

Answers

Answer 1

Explanation:

Function keys:F1,F2,F3,F4

Alphabetic keys H,A


Related Questions

describe the uses of computer in different fileds? please help me ​

Answers

Answer:

Computers are used to perform several industrial tasks. They are used to design products, control manufacturing processes, control inventory, manage projects, and so on. Computers are used to control and manage different manufacturing systems and continuous running of the industry.

Discuss how 3D modeling enhances animation.

Answers

Answer:

3d modeling enhances animation in many ways.

Explanation:

The first and most obvious way is shadows. When 3d modeling your able to cast more detail shadows then compared to 2d.

this sensor is used for burglar alarms
A. temperature
b. humidity
c. movement
d. PH​

Answers

Answer:

C

Explanation:

Have a great summer :)

Drag each tile to the correct box.
Albert has some software on his system. Help him identify the software based on its functions.

database software
word processor
spreadsheet software
multimedia software
can be used to create tables with embedded calculations
arrowRight
can be used to edit .doc files
arrowRight
can be used to store data in ordered form
arrowRight
can play .mpg and .mp3 files
arrowRight

Answers

Answer:

1. Spreadsheet software.

2. Word processor.

3. Database software.

4. Multimedia software.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, the various type of softwares used on computers to perform specific functions include the following;

1. Spreadsheet software: it can be used to create tables with embedded calculations. A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

2. Word processor: it can be used to format or edit .doc files. Some examples of word processors are Notepad, Microsoft Word, Sublime text, etc.

3. Database software: it can be used to store data in ordered form. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security. These records are stored and communicated to other data user when required or needed.

4. Multimedia software: it can play .mpg and .mp3 files. A multimedia software refers to a software that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc.

A financial company wants to store their data in Amazon S3 but at the same time, they want to store their frequently accessed data locally on their on-premises server. This is due to the fact that they do not have the option to extend their on-premises storage, which is why they are looking for a durable and scalable storage service to use in AWS.

Answers

Answer:

The answer is "Use the Amazon Storage Gateway - Cached Volumes".

Explanation:

In the Cached Volume Gateway mode, the main information is saved in the Amazon S3 and your often accessed data is kept in a lag cache locally. In just about any mode, users could use AWS Backup, which would be saved in AWS as an Amazon EBS snapshot, in time and copy the volumes. Its cached volumes allow the store of primary information in Amazon S3 over the standard Small System Independent Mechanism.

- Items in a ______ are enclosed in square brackets​

Answers

Answer:

list.

Explanation:

Items in a list are enclosed in square brackets​

Need an answer as soon as possible please!


The lesson discusses ten "best practices" for digital recordings. Identify three of them and explain why they are important for ensuring a quality product.


(For a Digital Media Course)

Answers

Solution :

Digital recording may be defined as the preservation of an audio or some visual signals like the series of a binary numbers which can be stored on a magnetic tape or on an optical disc or some other digital storage media.

Some of the best practices for doing digital recording are :

1. We should always take permission from those who are being recorded. It is not right to shoot others without their permission. It is against the right to privacy.

2. We should record audio at about 44.1 kHz/16 bit in an uncompressed wave format.

3. A High quality MP3 (192 kbps or higher) is often accepted due to the limitations of a recorder or for a storage space.

The MP3 recordings are considered as the best option for certain recorders  and when the storage space is severely limited. It produces a good quality recording.

What can always be seen in the Styles gallery?

O built-in styles with samples

O the original formatting of the document

O changes that have been made to the document's text

O examples of the last five formats used

Please help ASAP

Answers

Examples of the last five formats used

Answer:

examples of the last five formats used

please mark me as brainliest i dont have 1 yet :/

Five uses of the start button

Answers

Starting something

Possibly turning it off

Making something work

Fixing the Start Button

Beginning something

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

In the digital media process, what is one of the differences between the plan/design stage and the create/develop stage?

A) Scripts, storyboards, and flowcharts are created in the plan/design stage, and utilized in the create/develop stage.

B) Scripts, storyboards, and flowcharts are involved with the plan/design stage, but not with the create/develop stage.

C) Scripts, storyboards, and flowcharts are involved with the create/develop stage, but not with the plan/design stage.

D) Scripts, storyboards, and flowcharts are created in the create/develop stage, and utilized in the plan/design stage.

Answers

Answer:

Scripts, storyboards, and flowcharts are created in the plan/design stage, and utilized in the create/develop stage. A

Answer:

A.) Scripts, storyboards, and flowcharts are created in the plan/design stage, but utilized in the create/develop stage.

Fill in the blanks
A dash is a human-readable description in the source code of a computer program
Python has dash standard data types
A dash contains items separated by commas and enclosed within square brackets
A dash consists of key-value pairs
dash cannot be changed and use parentheses

Answers

Answer:

1. Comment

2. Five (5).

3. Line.

4. Tuple; that

Explanation:

1. A comment is a human-readable description in the source code of a computer program. Thus, it's an annotation or description in the source code of a software program that is readable by humans.

2. Python has five (5) standard data types, these includes; number, string, list, dictionary and tuple.

3. A line contains items separated by commas and enclosed within square brackets i.e [ ]. Thus, it's simply an ordered collection of one or multiple data items.

4. A tuple consists of key-value pairs

that cannot be changed and use parentheses. For example, Newtuple = ("strawberry", "apple", "mango", "banana", "orange").

Choose the word that matches each definition. 1. IP Address 2. Server 3. Port Each term is only used once._____________ a number used within a computer to identify a specific process ____________ a numerical reference to a particular device in a network ___________ a computer that handles requests and returns data to other computers in a network

Answers

Answer:

  Port      a number used within a computer to identify a specific process.

   IP Address     a numerical reference to a particular device in a network.

   Server           a computer that handles requests and returns data to other computers in a network.

Explanation:

A port number is a number used to uniquely identify a particular process, application or program on a computer. From the networking parlance, it is a logical address that uniquely identifies a process, protocol or application communicating with other process, protocol or application over a network. For example;

i. a file transfer protocol (FTP) could use a port number of 20 or 21.

ii. a simple mail transfer protocol (SMTP) could use a port number of 25

Internet Protocol (IP) address is a numerical reference or label assigned to a particular device in a network which helps to uniquely identify the device on the network. IP addresses (version 4) are expressed as a group of four numbers separated by a dot. For example, an IP address may look like this: 192.168.0.90

A server is a computer that receives requests from other computers, processes these requests and returns some data to the other computers  in a network. In reality, these servers and the computers they serve can actually be some applications or programs. Servers provide resources, data, services or programs to other computers over a network.

Answer:

IP address: an Internet Protocol (IP) address is a numerical reference to a particular device in a network

port: a number used within a computer to identify a specific process

server: a computer that handles requests and returns data to other computers in a network

Explanation:

edge 2022

17. Which computer is the most powerful?​

Answers

Answer:

here is ur answer

Explanation:

Fugaku

the japaness supercomputer , fugaku is the world most powerfull computer!

V. ASSESSMENT (Time Frame:
(Learning Activity Sheets for Enrichment, Remediation, or Assessment to be given
Direction: Choose the letter of the correct answer. Use another
1. These are materials or substances such as minerals, fore
used for economic gain.
A. Natural resources
C. Non renewable
B. Renewable resources
D. Minerals
2. In which way can we protect our environment?
A. Littering
C. recycling
B. Polluting
D. contaminating
3. Which of these is the primary cause of land pollution?
A. Improper garbage disposal C. Recycling mate
B. Planting of trees
D. Waste segrega
4. Your community is rich in metallic materials. Which of
conserve such precious mineral deposits?​

Answers

Answer:

1. A. Natural resources

2. C. Recycling

3. A. Improper garbage disposal

4. C. Formulate laws and ordinances to regulate the mining of minerals

Explanation:

Question; Obtained from a similar posted question

1. These are materials or substances such as minerals, forest, water, and fertile land that occur in nature and can be used for economic gain

4. Options

A. Use all of them to earn money

B. Put up tunnels to harvest all metallic minerals

C. Formulate laws and ordinances to regulate the mining of minerals

D. Use dynamite to clear out the area and reveal the mineral deposits

1. A. natural resources

The materials that come from nature and can be found in an area owned by a person and are economically valuable are known as A. natural resources

2. C. recycling

The environment is protected by reducing the consumption of the vital resources that ensure sustainability through the use of C. recycling already produced items as raw materials to produce new items rather than making use of raw materials naturally present in the environment

3. A. improper garbage disposal

Land pollution which is the introduction of potentially harmful, and unsightly materials on the surface soil or under the surface, is caused primarily by A. improper garbage disposal

4. C. Formulate laws and ordinances to regulate the mining of minerals

The metallic materials, which are mineral resources are located under the ground and are extracted from different locations in an area, therefore, they are mined at different times by different methods

To ensure that the precious mineral deposits are conserved, they require laws and ordinance for the regulation of mineral mining

Therefore; the correct option is;

C. Formulate laws and ordinances to regulate the mining of minerals

The content an craigalist is mainly monitered by?
A) users
B)government
C)employer
D)no one

Answers

D)no one

..........................................

Which of these is not a nonverbal cue?

main idea
posture
volume
eye contact

Answers

Answer:

volume and not the remaining ones

What are the steps for creating a bookmark? 1. Place the insertion point where the bookmark should appear. 2. Click the tab. 3. In the group, click Bookmark. 4. When a dialog box opens, name the bookmark, and click . 5. To see bookmarks within the document, go to Backstage view and click Options. 6. In , select Show Bookmarks to have them appear as a locked cursor within the document.

Answers

Answer:

2. Insert

3. Links

4. Add

6. Advanced

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

On the other hand, a webpage is the individual HTML document (single page) that makes up a website with a unique uniform resource locator (URL).

A bookmark can be defined as a placeholder or saved shortcut for a webpage and for future reference. Thus, it avails an end user the ability to quickly access a bookmarked webpage by automatically directing the web browser to the webpage.

Basically, the steps for creating a bookmark are;

1. The insertion point of the webpage should be placed at the point where the bookmark should appear.

2. Click the "INSERT" tab.

3. In the "LINKS" group, click "Bookmark"

4. When a dialog box opens, the bookmark should be named with a specific title, and then click "ADD"

5. To see bookmarks within the HTML document, you should go to Backstage view and click on "Options"

6. In ADVANCED, select Show Bookmarks to have them appear as a locked cursor within the HTML document.

An input value has to be greater than 18 and less than 65 if a driving license is to be approved for issue. What type of input checking is appropriate?

Answers

Answer:

You should use an "if" statement to check whether the number is greater than 18 or less than 65.

Explanation:

You usually use "if" statements whenever you want to compare a number to another. Keep in mind that "if" statements are not only used for comparison!

n
Which of the following is not a goal of a persuasive speaking?
a. to motivate to action
b.
to change attitudes, beliefs, or values
to strengthen or weaken attitudes, beliefs, or values
d. to define, demonstrate, or instruct
C.

Answers

Answer: D. to define, demonstrate, or instruct.

Explanation:

Persuasive speaking is the form of speaking that we usually engage in. It is used to convince people. As individuals, we usually engage in persuasive speaking. We argue about different things and try to convince the other person to agree with us.

Th goals of persuasive speaking is to motivate to action, to change attitudes, beliefs, or values and to strengthen or weaken attitudes, beliefs, or values.

It should be noted that the goal of persuasive speaking isn't to to define, demonstrate, or instruct. Therefore, the correct option is D.

Answer:

Simple Answer: D

Can anyone help me with a mental ability work plzz

Answers

choose the correct option:

1) using

2) is

3) use

4) to eat

5) use

SAFe recommends separating deployment from release. What can help with this practice? 1 A staging environment that emulates testing 2 Manually test Features and non-functional requirements 3 Deploying to staging every 4 to 8 weeks 4 Hide all new functionality under feature toggles

Answers

Answer:

hide all new functionality under feature toggles

Explanation:

The best way to accomplish this would be to hide all new functionality under feature toggles. This would allow you to implement the new features without actually releasing them. They would be hidden so that the developers can quickly activate individual new features as they wish. This helps with individually stress testing each feature to make sure that they are working perfectly before release. Once a feature has been thoroughly tested and works as intended without any bugs then it can be added as a release feature.

SAFe (Scaled Agile Framework) does recommend separating deployment from release to achieve more effective and controlled software delivery.

A staging environment that emulates testing: Having a separate staging environment that closely mimics the production environment helps in testing the deployment before releasing it to end-users. This allows for comprehensive testing of the software in an environment that closely resembles the production setup.

Before releasing the software to production, it is important to conduct thorough testing of individual features and non-functional requirements. This ensures that the deployed features are functioning as expected and meet the desired quality standards.

Frequent deployment to the staging environment, ideally every 4 to 8 weeks, allows for continuous integration and testing of new features.

Learn more about Scaled Agile Framework on:

https://brainly.com/question/28126520

#SPJ6

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken?
A. Quarantine Vivian's computer.
B. Disable System Restore.
C. Perform a scan using anti-malware software.
D. Back up Vivian's critical files and perform a clean install of Windows.

Answers

Answer: D

Explanation: Using anti malware software is a good method but you can never be 100% sure it's gone and the software may not detect it, better to start off clean.

The answer is D hope it helps

This uses toner or ink while printing on paper or such a surface​

Answers

Answer:Laser Jet printer or ink jet printer

Explanation: I have used both types of printers

How Many types of application Software are there?​

Answers

Answer:

there are 2 types of application software

define client and.server​

Answers

Answer:

Client-server model is a model is a distributed application structure that partitions

tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.

Choose the issue that is occurring from the drop-down menu. During the , development teams transform the requirements into a software application design. During the , the software design is implemented by developers in code. In the , software is evaluated for quality. Any issues with the software are logged as to be resolved by developers. Software that is maintained by developers is said to be .

Answers

Answer: See explanation

Explanation:

During the, (software design phase), developmentt teams transform the requirements into a software application design.

During the (software development phase), the software design is implemented by developers in code.

In the (software evaluation phase), software is evaluated for quality.

Any issues with the software are logged as (bugs) to be resolved by developers.

Software that is maintained by developers is said to be (supported).

Answer:

1) 2

2) 1

3) 2

4) 2

5) 3

Explanation: just did it

what is a web page and a website​

Answers

Answer:

:)

Explanation:

┬─┬ノ( º _ ºノ) ♪ ♬ ヾ(´︶`♡)ノ ♬ ♪

place the features or components under the correct location. powerpoint start screen or power point user interface: online templates, dialog box launchers, thumbnail pane, slide pane, themes search field, recent files

Answers

Answer:

PP start screen: Recent Files, Online templates, Themes search field

Pp user interface: Side Pane, Thumbnail pane, Dialog box launches.

Explanation: Edg 2021

Answer:

Answer:

PP start screen: Recent Files, Online templates, Themes search field

Pp user interface: Side Pane, Thumbnail pane, Dialog box launches.

Explanation:

Edg 2021 just took test. Good Luck, Keep Going!!

2) The CPU is made from a silicon
a) Steel
b) Chip
c) pendrive​

Answers

Answer:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory. The width of the address bus (that is, the number of wires) determines how many unique memory locations can be addressed.

Explanation:

Other Questions
Read the excerpt below and answer the question. So some of the cheefe of the company, perceiveing the mariners to faare the suffislencle of the shipe, as appeared by their mutterings, they entred into serious consulltation with the mr and other officers of the ship, to consider in time of the danger, and rather to returne then to cast them selves into a desperate and inevitable perill. If the word mutterings were replaced with the word conversations, how would the meaning of the excerpt change? It would change the tone of the excerpt. It would change how the sailors voiced their concerns. It would change the effect of the actions that followed. It would change the way the captain dealt with the sailors. Someone who can help me please thank you? 1. Find the value of xA. 7B. 4C. 5D. 6 What is the sum of the first 22 terms of -18+-15+-12+-9+ A John Hopkins study showed that the states with the strictest graduated licensing requirements have a 20% decrease in teen fatalities for 16 year olddrivers.A TrueB. False Tatiana is playing a video game. She earns 25 points when she completes Level 1. Each time she completes a level, she earns three times as many points as the previous level.How many points will Tatiana earn when she completes Level 7? Evaluate the statistics expression:39C1 PLEASE HELP i have less than 20 mins left Could anyone help with this question? Margaery, who is constantly obsessing about her neighbors new things, is plagued with bad dreams. Which of the Four Noble Truths is she experiencing? Narrate, a journey you have ever made reasons why transpiration is important in plant Mira looks at her fitness monitor and sees that she has run 30% of her miles thisweek. If her goal is to run 30 miles this week, how many miles has she runalready? (Provide number only) NO LINKS Write a C++ program to accept a 5 digit integer and to validate the input based on the following rules. Rules 1) The input number is divisible by 2. 2) The sum of the first two digits is less than last two digits. if the input number satisfies all the rules, the system prints valid and invalid, otherwise, Example 1: Enter a value: 11222 Output: Input number is valid Example 2: Enter a value: 1234 Output: Input number is invalid What is the purpose of the maintenance phase her recovery Please answer both ASAP Will Mark brainliest Read the lines from "Because I Could Not Stop for Death."And I had put awayMy labor and my leisure too,For His Civility What is the purpose of the words labor and leisure?They are aspects of life that frustrate the speaker.They are elements of life that the speaker wants to show Death.They are aspects of life that the speaker is leaving.They are elements of life that the speaker will not miss. Question 9 Multiple Choice Worth 1 points)(02.05 MC)Given f(x) and g(x) = k-f(x), use the graph to determine the value of k. As an estimation we are told 3 is 4.Convert 33 to euros. what is the vertices of hexagon