How did Avery and Garth most likely create their
diagrams?

O Avery used SmartArt and added a shape, whereas
Garth used four shapes.

O Avery used four shapes, whereas Garth used
SmartArt and added a shape.

O Both Avery and Garth used SmartArt and added a
shape.

O Both Avery and Garth used four shapes.

Help!!!

Answers

Answer 1
Avery used smartart and added shake

Related Questions

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

2) The CPU is made from a silicon
a) Steel
b) Chip
c) pendrive​

Answers

Answer:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory. The width of the address bus (that is, the number of wires) determines how many unique memory locations can be addressed.

Explanation:

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken?
A. Quarantine Vivian's computer.
B. Disable System Restore.
C. Perform a scan using anti-malware software.
D. Back up Vivian's critical files and perform a clean install of Windows.

Answers

Answer: D

Explanation: Using anti malware software is a good method but you can never be 100% sure it's gone and the software may not detect it, better to start off clean.

The answer is D hope it helps

Fill in the blanks
A dash is a human-readable description in the source code of a computer program
Python has dash standard data types
A dash contains items separated by commas and enclosed within square brackets
A dash consists of key-value pairs
dash cannot be changed and use parentheses

Answers

Answer:

1. Comment

2. Five (5).

3. Line.

4. Tuple; that

Explanation:

1. A comment is a human-readable description in the source code of a computer program. Thus, it's an annotation or description in the source code of a software program that is readable by humans.

2. Python has five (5) standard data types, these includes; number, string, list, dictionary and tuple.

3. A line contains items separated by commas and enclosed within square brackets i.e [ ]. Thus, it's simply an ordered collection of one or multiple data items.

4. A tuple consists of key-value pairs

that cannot be changed and use parentheses. For example, Newtuple = ("strawberry", "apple", "mango", "banana", "orange").

What can always be seen in the Styles gallery?

O built-in styles with samples

O the original formatting of the document

O changes that have been made to the document's text

O examples of the last five formats used

Please help ASAP

Answers

Examples of the last five formats used

Answer:

examples of the last five formats used

please mark me as brainliest i dont have 1 yet :/

A financial company wants to store their data in Amazon S3 but at the same time, they want to store their frequently accessed data locally on their on-premises server. This is due to the fact that they do not have the option to extend their on-premises storage, which is why they are looking for a durable and scalable storage service to use in AWS.

Answers

Answer:

The answer is "Use the Amazon Storage Gateway - Cached Volumes".

Explanation:

In the Cached Volume Gateway mode, the main information is saved in the Amazon S3 and your often accessed data is kept in a lag cache locally. In just about any mode, users could use AWS Backup, which would be saved in AWS as an Amazon EBS snapshot, in time and copy the volumes. Its cached volumes allow the store of primary information in Amazon S3 over the standard Small System Independent Mechanism.

Discuss how 3D modeling enhances animation.

Answers

Answer:

3d modeling enhances animation in many ways.

Explanation:

The first and most obvious way is shadows. When 3d modeling your able to cast more detail shadows then compared to 2d.

Choose the word that matches each definition. 1. IP Address 2. Server 3. Port Each term is only used once._____________ a number used within a computer to identify a specific process ____________ a numerical reference to a particular device in a network ___________ a computer that handles requests and returns data to other computers in a network

Answers

Answer:

  Port      a number used within a computer to identify a specific process.

   IP Address     a numerical reference to a particular device in a network.

   Server           a computer that handles requests and returns data to other computers in a network.

Explanation:

A port number is a number used to uniquely identify a particular process, application or program on a computer. From the networking parlance, it is a logical address that uniquely identifies a process, protocol or application communicating with other process, protocol or application over a network. For example;

i. a file transfer protocol (FTP) could use a port number of 20 or 21.

ii. a simple mail transfer protocol (SMTP) could use a port number of 25

Internet Protocol (IP) address is a numerical reference or label assigned to a particular device in a network which helps to uniquely identify the device on the network. IP addresses (version 4) are expressed as a group of four numbers separated by a dot. For example, an IP address may look like this: 192.168.0.90

A server is a computer that receives requests from other computers, processes these requests and returns some data to the other computers  in a network. In reality, these servers and the computers they serve can actually be some applications or programs. Servers provide resources, data, services or programs to other computers over a network.

Answer:

IP address: an Internet Protocol (IP) address is a numerical reference to a particular device in a network

port: a number used within a computer to identify a specific process

server: a computer that handles requests and returns data to other computers in a network

Explanation:

edge 2022

Five uses of the start button

Answers

Starting something

Possibly turning it off

Making something work

Fixing the Start Button

Beginning something

What is the organizational management practices on planning during a pandemic like corona virus.

Answers

Answer:

wear a mask use hand sanitizer dont get in contact with anyone between 6 feet

Explanation:

n
Which of the following is not a goal of a persuasive speaking?
a. to motivate to action
b.
to change attitudes, beliefs, or values
to strengthen or weaken attitudes, beliefs, or values
d. to define, demonstrate, or instruct
C.

Answers

Answer: D. to define, demonstrate, or instruct.

Explanation:

Persuasive speaking is the form of speaking that we usually engage in. It is used to convince people. As individuals, we usually engage in persuasive speaking. We argue about different things and try to convince the other person to agree with us.

Th goals of persuasive speaking is to motivate to action, to change attitudes, beliefs, or values and to strengthen or weaken attitudes, beliefs, or values.

It should be noted that the goal of persuasive speaking isn't to to define, demonstrate, or instruct. Therefore, the correct option is D.

Answer:

Simple Answer: D

SAFe recommends separating deployment from release. What can help with this practice? 1 A staging environment that emulates testing 2 Manually test Features and non-functional requirements 3 Deploying to staging every 4 to 8 weeks 4 Hide all new functionality under feature toggles

Answers

Answer:

hide all new functionality under feature toggles

Explanation:

The best way to accomplish this would be to hide all new functionality under feature toggles. This would allow you to implement the new features without actually releasing them. They would be hidden so that the developers can quickly activate individual new features as they wish. This helps with individually stress testing each feature to make sure that they are working perfectly before release. Once a feature has been thoroughly tested and works as intended without any bugs then it can be added as a release feature.

SAFe (Scaled Agile Framework) does recommend separating deployment from release to achieve more effective and controlled software delivery.

A staging environment that emulates testing: Having a separate staging environment that closely mimics the production environment helps in testing the deployment before releasing it to end-users. This allows for comprehensive testing of the software in an environment that closely resembles the production setup.

Before releasing the software to production, it is important to conduct thorough testing of individual features and non-functional requirements. This ensures that the deployed features are functioning as expected and meet the desired quality standards.

Frequent deployment to the staging environment, ideally every 4 to 8 weeks, allows for continuous integration and testing of new features.

Learn more about Scaled Agile Framework on:

https://brainly.com/question/28126520

#SPJ6

Which is an example of a table style option?

O banded columns
O shading
O borders
O pen color

Taking the unit test please help ASAP

Answers

Answer:

a. banded columns

Explanation:

A table style is a collection of attributes that are used to format tables. With table styles, formatting such as borders, row strokes and column strokes can be applied to the table.

There are six options in the table style option in Microsoft word. They are;

i. Banded rows: shows banded rows in which odd rows are formatted differently from even rows.

ii. Banded columns: shows banded columns in which odd columns are formatted differently from even columns.

iii. First column: shows special formatting for the first column of the table.

iv. Last column: shows special formatting for the last column of the table.

v. Header row: shows special formatting for the first row of the table.

vi. Total row: shows special formatting for the last row of the table.

To show these options;

i. First insert a table in the document

ii. Click anywhere on the table and a 'Table tools' option will appear at the top of the menu bar.

iii. Click on the 'design tab' of the 'Table tools' and the table style option ribbon will appear at the top left of the page. A figure showing this has been attached to this response.

17. Which computer is the most powerful?​

Answers

Answer:

here is ur answer

Explanation:

Fugaku

the japaness supercomputer , fugaku is the world most powerfull computer!

A programmer notices the following two procedures in a library. The procedures do similar, but not identical,
things.

Procedure square (n) returns the value n2

Procedure cube (n) returns the value n3

Which of the following procedures is a generalization of the procedures described above?
A. Procedure Add (n, m), which returns the value n + m
B. Procedure Fourth (n), which returns the value n4
C. Procedure Polynomial(n), which returns the value n3 +n2
D. Procedure Power (n, m), which returns the value nm

Answers

Answer:

D. Procedure Power (n, m), which returns the value n^m

Explanation:

Given

[tex]square(n) \to n^2[/tex]

[tex]cube(n) \to n^3[/tex]

Required

The generalization

The given functions are power functions which returns the power of n to a certain value.

The power sequence follows:

[tex]fourth(n) \to n^4[/tex]

[tex]fifth(n) \to n^5[/tex]

[tex]sixth(n) \to n^6[/tex]

------

-----

--

[tex]power(n,m) \to n^m[/tex]

Hence, (d) is correct

The content an craigalist is mainly monitered by?
A) users
B)government
C)employer
D)no one

Answers

D)no one

..........................................

How Many types of application Software are there?​

Answers

Answer:

there are 2 types of application software

what is a web page and a website​

Answers

Answer:

:)

Explanation:

┬─┬ノ( º _ ºノ) ♪ ♬ ヾ(´︶`♡)ノ ♬ ♪

Drag each tile to the correct box.
Albert has some software on his system. Help him identify the software based on its functions.

database software
word processor
spreadsheet software
multimedia software
can be used to create tables with embedded calculations
arrowRight
can be used to edit .doc files
arrowRight
can be used to store data in ordered form
arrowRight
can play .mpg and .mp3 files
arrowRight

Answers

Answer:

1. Spreadsheet software.

2. Word processor.

3. Database software.

4. Multimedia software.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, the various type of softwares used on computers to perform specific functions include the following;

1. Spreadsheet software: it can be used to create tables with embedded calculations. A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

2. Word processor: it can be used to format or edit .doc files. Some examples of word processors are Notepad, Microsoft Word, Sublime text, etc.

3. Database software: it can be used to store data in ordered form. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security. These records are stored and communicated to other data user when required or needed.

4. Multimedia software: it can play .mpg and .mp3 files. A multimedia software refers to a software that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc.

Which function below will allow you to change to a different screen?

changeScreen( )

changePage( )

setPage( )

setScreen( )

Answers

Answer:

Option D

Explanation:

The Set Screen command is used to change the screen to any screen you wish. Screen is notified by its ID

The set screen command is used for some user -event and in such cases set screen is added by click event handler.  

The ID to which the screen is to be changed is selected.

Hence, option D is correct

Which of these is not a nonverbal cue?

main idea
posture
volume
eye contact

Answers

Answer:

volume and not the remaining ones

what is it important to test cabless?​

Answers

Answer:

to avoid larger problems ovr time like having to replace a whole line after it has been installed in case it happens that there may be faults you may know whether it was caused by a manufacturer error or installation error

What are the steps for creating a bookmark? 1. Place the insertion point where the bookmark should appear. 2. Click the tab. 3. In the group, click Bookmark. 4. When a dialog box opens, name the bookmark, and click . 5. To see bookmarks within the document, go to Backstage view and click Options. 6. In , select Show Bookmarks to have them appear as a locked cursor within the document.

Answers

Answer:

2. Insert

3. Links

4. Add

6. Advanced

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

On the other hand, a webpage is the individual HTML document (single page) that makes up a website with a unique uniform resource locator (URL).

A bookmark can be defined as a placeholder or saved shortcut for a webpage and for future reference. Thus, it avails an end user the ability to quickly access a bookmarked webpage by automatically directing the web browser to the webpage.

Basically, the steps for creating a bookmark are;

1. The insertion point of the webpage should be placed at the point where the bookmark should appear.

2. Click the "INSERT" tab.

3. In the "LINKS" group, click "Bookmark"

4. When a dialog box opens, the bookmark should be named with a specific title, and then click "ADD"

5. To see bookmarks within the HTML document, you should go to Backstage view and click on "Options"

6. In ADVANCED, select Show Bookmarks to have them appear as a locked cursor within the HTML document.

- Items in a ______ are enclosed in square brackets​

Answers

Answer:

list.

Explanation:

Items in a list are enclosed in square brackets​

what is a fixed expense
everfi

Answers

Answer:

A fixed expense is an expense that has a constant total expense value (the total amount of the fixed expense) that remains the same (does not change) when there is a change in the number being managed, manufactured, or sold

Examples of fixed  expense includes; depreciation of assets, salaries of workers, payment for rental lease, and some utility payment, such as road users toll fees payment at a toll gate

Explanation:

Evaluate:
(3.7 x 10-2) (1.2 x 103)​

Answers

Answer:

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 44.4[/tex]

Explanation:

Given

[tex](3.7 * 10^{-2}) (1.2 * 10^3)[/tex]

Required

Evaluate

[tex](3.7 * 10^{-2}) (1.2 * 10^3)[/tex]

Remove bracket

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 3.7 * 10^{-2}*1.2 * 10^3[/tex]

Rewrite as:

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 3.7 *1.2* 10^{-2} * 10^3[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10^{-2} * 10^3[/tex]

Apply law of indices

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10^{-2+3}[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10^1[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 44.4[/tex]

Can anyone help me with a mental ability work plzz

Answers

choose the correct option:

1) using

2) is

3) use

4) to eat

5) use

How are sensors and microprocessors used to control a central heating system which uses an oil burner as the source of heat

Answers

Answer:

sensors are used to measure physical quantities such as temperature, light, pressure, sound, and humidity. They send signals to the processor . a security alarm system may have an infrared sensor which sends a signal when the beam is broken.

Explanation:

im just smart lol

define client and.server​

Answers

Answer:

Client-server model is a model is a distributed application structure that partitions

tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.

Can someone help me with Edhesive 8.3 lesson practice question number 5? I can’t figure it out

Answers

Answer:

3

Explanation:

Other Questions
HELPPP ME PLEASE WILL MARK BRAINLIEST IF YOU GIVE ME THE CORRECT ANSWER ___ has a definite shape and do not easily take shape of their container In the outsiders the sentence. I fought but the hand at the back of my neck was strong. Page 56. The author uses conflicts to create this within the grasslands and desert, the major factors determining type of vegetation are in order to switch from paper to digital medical records the hospital bought in several individuals to introduce and implement the tools needed to organize the files . These individuals would best be described as SO you hopefully selected that an Allele is a form of a gene. BUT what is this really...A. an allele is a protein that causes hair no hair in the guinea pigB. an allele is a length of DNA with a specific sequence of nitrogen bases that make a protein that results in Hair or No Hair on the guinea pig BRAINLIEST IF CORRECT You choose a movie at random from a list containing 8 comedy movies, 5 science fiction movies, and 7 adventure movies. What is the theoretical probability that the movie is not a comedy? Select all that apply.0.6050%252 fifths353 fifths60% 3Select the correct answer.If you lived under an economic system in which the government controlled all aspects of production, which economic system would this be?A. traditional economyB. market economyC. planned economyD. mixed economy The organ that controls your internal clock is called... Classify the polynomial 8x^3 +6x^2 -3x +1 according to its degree and number of terms.?Plz fast Suppose that 2 J of work is needed to stretch a spring from its natural length of 28 cm to a length of 43 cm. (a) How much work is needed to stretch the spring from 33 cm to 35 cm 3.1 Define the term "human rights abuse and give ONE example of such an abuse which angles are supplementary to each other ? Prime Computers is a company that sells computers and software. The company has a website that allows customers to post comments about the computers and software it sells. Why is it important for this company to encourage customer feedback Find the value of x. ABC is a triangle right angled at A and D is a point on BC such that AD BC. Show that AD2 = BD x DC. please answer fast URGENT They are in the restaurant What was a major difference between Deng Xiaoping's and Mao Zedong'spolicies as the leaders of the People's Republic of China?A. Deng Xiaoping banned all forms of Western media, while MaoZedong encouraged Westernization in China.B. Deng Xiaoping hoped to destroy Chinese traditions, while MaoZedong defended traditional Chinese culture.C. Deng Xiaoping promoted free market policies, while Mao Zedongopposed noncommunist economic systems.D. Deng Xiaoping called for open elections in China, while MaoZedong was a dictator with absolute power. What is the area of the shaded region? 2 cm 2cm4cm 4cm Read the second half of the speech by Lyndon B. Johnson and answer the following question.As I rode the George Washington Memorial Parkway back to the White House only yesterday afternoon, I saw nature at its purest. And I thought of the honor roll of names--a good many of you are sitting here in the front row today--that made this possible. And as I thought of you who had helped and stood up against private greed for public good, I looked at those dogwoods that had turned red, and the maple trees that were scarlet and gold. In a pattern of brown and yellow, God's finery was at its finest. And not one single foot of it was marred by a single, unsightly, man-made construction or obstruction--no advertising signs, no old, dilapidated trucks, no junkyards. Well, doctors could prescribe no better medicine for me, and that is what I said to my surgeon as we drove along.This bill does not represent everything that we wanted. It does not represent what we need. It does not represent what the national interest requires. But it is a first step, and there will be other steps. For though we must crawl before we walk, we are going to walk.I remember the fierce resolve of a man that I admired greatly, a great leader of a great people, Franklin D. Roosevelt. He fought a pitched battle in 1936 with private interests whose target was private gain. And I shall long remember the words that I believe he echoed at Madison Square Garden, when he declared to the Nation that the forces of selfishness had not only met their match, but these forces had met their master.Well, I have not asked you to come here today to tell you that I have a desire to master anyone. But until the clock strikes the last hour of the time allotted to me as President by vote of all the people of this country, I will never turn away from the duty that my office demands or the vigilance that my oath of office requires.And this administration has no desire to punish or to penalize any private industry, or any private company, or any group, or any organization of complex associations in this Nation. But we are not going to allow them to intrude their own specialized private objective on the larger public trust. Beauty belongs to all the people. And so long as I am President, what has been divinely given to nature will not be taken recklessly away by man.This Congress is to be thanked for the bill that you have given us. I wish it could have been more, but I realize, too, that there are other views to be considered in our system of checks and balances.The grandchildren of those of you in this country that may have mocked and ridiculed us today, someday will point with pride to the public servants who are here in this room, who cast their lot with the people.And unless I miss my guess, history will remember on its honor roll those of you whom the camera brings into focus in this room today, who stood up and were counted when that roll was called that said we are going to preserve at least a part of what God gave us.Thank you very much.The first paragraph of the excerpt uses mainly _______ to persuade the audience.categorical claimsopinions and emotional appealsfacts and logical appealad hominemappeals to ego