With ____ editing, you drag a selected item to a new location and drop it there. a. drag and drop b. cut and copy c. move and copy d. place and format

Answers

Answer 1

Answer:

a. drag and drop

Explanation:

Option A answers the question.

The operation as described in the question is a sequence of drag operation immediately followed by a drop operation.

And this operation can be achieved with the help of a pointing device (specifically, the mouse)

Morever, reading through the question, you'll find the answer as shown below:

"........ you drag ........ and drop ....."


Related Questions

This standard library function returns a random floating-point number in the range of 0.0 up to 1.0 (but not including 1.0).
a. random.b. randint.c. random_integer.d. uniform.

Answers

Answer:

The answer would be A: Random

Explanation:

The random() function returns a generated random number (a pseudorandom number)

Transfer data across two different networks

Answers

this isn't a question. that is a STATMENT. please, ask a question instead of stating things on this site.

In a user interface, a screen is best understood as
A.a console


b.a variable


c.an input


d. an element

Answers

Answer:

d. an element

Explanation:

User Interface design is simply the designs that are used to model a product like an application.

In a user interface, a screen is best understood as an element.

pleas help with this

pleas help with this

Answers

Answer:

points = dict(Harris=24, Butler=11, Embiid=31, Simmons=15, Reddick=9, Scott=8, Ennis=7, Marjanovic=4, Bolden=1, McConnell=2)

total_points = 0

highest_scorer = ""

highest_score = 0

for player, score in points.items():

 print(player + ": " + str(score) + " points")

 total_points += score

 if score > highest_score:

   highest_score = score

   highest_scorer = player

print("Total points: " + str(total_points))

print("Highest scorer: " + highest_scorer + " (" + str(highest_score) + " points)")

You are about to deploy a new server that will contain sensitive data about your clients. You want to test the server to look for problems that might allow an attacker to gain unauthorized access to the server. This testing should not attempt to exploit weaknesses, only report them. What type of test should you perform?

Answers

Answer:

Vulnerability Scan

Explanation:

Write first 20 decimal dijits in the base 3

Answers

Answer:

first 20 decimal dijits in the base 3

Explanation:

i wrote what you said

Which of the following best describes the ribbon?

Answers

In computer science, a ribbon refers to a graphical user interface (GUI) element used in software applications to provide access to various functions and features.

What is the Ribbon?

The ribbon is typically a horizontal strip located at the top of the application window and contains tabs and groups of commands organized by functionality.

Users can click on a tab to display a group of related commands, and then select the desired command to perform a specific task. The ribbon was introduced in Microsoft Office 2007 and has since been adopted by many other software applications as a modern and user-friendly interface for organizing and accessing program features.

Read more about graphics here:

https://brainly.com/question/18068928

#SPJ1

Which button in the Sort & Filter gallery of the Data tab would alphabetize from A to Z quickly?

Answers

Answer:

the answer is B (AZ down arrow)

Explanation:

Page
U what is a common language that computers use
to talk with one another on- a network?
a. client b. Adapter
c. protocol d. operating
System​

Answers

I think it’s protocol
The computers use a set of protocols. Therefore, the answer is C. Protocol. I hope this helps.

What do those codes do???

What do those codes do???

Answers

Explanation:

Essentially,

<label for="fname"> First Name: </label>

Creates a label under "fname". The text that will be displayed is First Name.

<input type="text" id="fname" name="fname"

The input type is searching for text, which will be the user's entered name. After collecting the name, it then stores it into "fname".

Example:

First Name:

[enter name]

The same concept goes towards the botton email section as well.

Hope this helps! ^-^

-Isa

A motor takes a current of 27.5 amperes per leaf on a 440-volt, three-phase circuit. The power factor is 0.80. What is the load in watts? Round the answer to the nearer whole watt.

Answers

The load in watts for the motor is 16766 watts

To calculate the load in watts for the given motor, you can use the following formula:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

In this case:
Voltage (V) = 440 volts
Current (I) = 27.5 amperes per phase
Power Factor (PF) = 0.80
√3 represents the square root of 3, which is approximately 1.732

Now, plug in the values:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

Load (W) = 440 × 27.5 × 0.80 × 1.732

Load (W) = 16765.7 watts

Rounded to the nearest whole watt, the load is approximately 16766 watts.

Know more about the motor here :

https://brainly.com/question/29713010

#SPJ11

What is your biggest concern when it comes to purchasing a used phone or laptop?

Answers

Answer:

quality

Explanation:

if i know about the phone or laptop quality and quantity then i can know which is important if i buy.

i can give you example by laptop. For example i want to get buy laptop. i should know about the quantity and quality. then if i choose quantity i can buy so many laptops if they are more than 3 laptops and i get it in low price. then i take it and i try to open the laptops for some other thing to do but they cant opened so it means it has lowest quality.

and if i choose the quality. may be i can't buy more than 1 laptops but the qulaity of the laptops is high so when i open the laptop it opened

Note

quality is the superiority or the quality level of a things.

quantity is the abundance or the quantity level of a thing

1. Star Topology : Advantages 2. Bus Topology : ****************************** Advantages Tree Topology : Disadvantages Disadvantages EEEEE​

Answers

Star Topology (Advantages):

Easy to install and manage.Fault detection and troubleshooting is simplified.Individual devices can be added or removed without disrupting the entire network.

Bus Topology (Advantages):

Simple and cost-effective to implement.Requires less cabling than other topologies.Easy to extend the network by adding new devices.Suitable for small networks with low to moderate data traffic.Failure of one device does not affect the entire network.

Tree Topology (Disadvantages):

Highly dependent on the central root node; failure of the root node can bring down the entire network.Complex to set up and maintain.Requires more cabling than other topologies, leading to higher costs.Scalability is limited by the number of levels in the hierarchy.

Read more about Tree Topology here:

https://brainly.com/question/15066629

#SPJ1

PBL projects are graded using what it tells you what you are doing very well and where you may need improvements

Answers

Answer: a rubric

Explanation:

A rubric is a scoring tool that explicitly describes the instructor's performance expectations for an assignment or piece of work

Esquema de reglas css

Answers

The CSS rules schema is a set of guidelines and syntax used to write CSS code for styling HTML documents, including selectors, declarations, and values. It helps ensure consistency and readability in code.

Why is  CSS rules schema important?

CSS rules schema is important because it provides a systematic and structured approach to designing and formatting web pages. It helps developers maintain consistency in their styling, which is important for usability and user experience.

A consistent and well-organized CSS rules schema can also make it easier to maintain and update a website, as changes can be made quickly and efficiently. Note as well that, it can improve the accessibility and search engine optimization (SEO) of a website by ensuring that the HTML is properly formatted and organized.

Learn more about CSS Rules Schema:
https://brainly.com/question/17584518
#SPJ1

1. ERICUS Company sells Ghacem cement at 30.0 Ghana Cedis per bag. The company however gives discount of 15% for customers that buy 100 or more bags, and 0% for customers that buy less than 100 bags. Write a pseudocode.

Answers

See Comment for complete question

Answer:

Input Bags

Discount = 0%

If Bags >= 100 Then

Discount = 15%

End If

Print Discount

Stop

Explanation:

This gets the number of bags bought

Input Bags

This initializes the discount to 0%

Discount = 0%

If the bags of cement bought is 100 or above

If Bags >= 100 Then

This discount becomes 15%

Discount = 15%

This ends the if statment

End If

This prints the discount percentage

Print Discount

This ends the pseudocode

Stop

Select the examples of common Arts, A/V Technology, and Communication employers. Check all that apply.
publications
o telecommunications companies
O high schools
the government
O movie studios
car companies
O television networks

Answers

Following are the calculation to the given question:

The air traffic control computer that air traffic controllers are using to track airplanes is known as common art. The software system is used to automate the air traffic controller's job by meaningfully correlating all various radar and person inputs.Audio/Video Technologies is concerned with the presentation of audio, video, or data to people in a range of locations such as board rooms, hotels, conference centers, classrooms, theme parks, stadiums, or museums. It enables communication workers to use their ideas and talents just in the workplace.Employee communications are frequently characterized as the information exchange and thoughts between being an organization's management and staff, or vise - versa.

Therefore, the final choices are " publications, telecommunications companies,movie studios, and television networks".

Learn more:

brainly.com/question/18649296

Answer:

1,2,5, and 7

Explanation: I just did this instruction assignment

During an investigation, a security manager receives notification from local authorities that company proprietary data was found on a former employees home computer. The former employee's corporate workstation has since been repurposed, and the data on the hard drive has been overwritten. Which of the following would BEST provide the security manager with enough details to
determine when the data was removed from the company network?
A. Properly configured hosts with security logging
B. Properly configured endpoint security tool with darting
C. Properly configured SIEM with retention policies
D. Properly configured USB blocker with encryption

Answers

The option that would best provide the security manager with enough details to determine when the data was removed from the company network is Properly configured SIEM (Security Information and Event Management) with retention policies.The correct answer is option C.

A properly configured SIEM collects and analyzes security event logs from various sources within the network, such as firewalls, intrusion detection systems, and servers. It provides a centralized view of security events and allows for the correlation of events across multiple systems.

By having retention policies in place, the SIEM would retain security event logs for a specific period of time. This would enable the security manager to review the logs and identify any suspicious activities or indicators of data exfiltration.

In the given scenario, the security manager can examine the SIEM logs to determine if there were any unusual or unauthorized activities associated with the former employee's account.

They can identify if the employee accessed the company network or transferred data during a specific timeframe. This information can help narrow down when the data was removed from the network.

It is important to note that properly configuring the SIEM and setting appropriate retention policies is crucial for effective incident response and investigation.

Without proper configuration and retention policies, the SIEM may not have the necessary data or the ability to correlate events accurately, limiting the security manager's ability to determine when the data was removed.

Therefore,The correct answer is option C.

For more such questions data,click on

https://brainly.com/question/29621691

#SPJ8

Which statement, executed once at the start of main(), enables a program to generate a different sequence of pseudo-random numbers from rand() each time the program is run?

Answers

Answer:

(b) srand(time(0))

Explanation:

Given

See attachment for options

Required

Which would generate different set of random numbers

To do this, we analyze each of the options - one at a time.

(a) srand()

The above is an invalid usage of srand() because srand() requires an argument for it to function e.g. srand(2)

(b) srand(time(0))

The above is valid, and it will return different pseudo random numbers each time the statement is executed because time(0) lets srand() seed to the current time.

(c) srand(100)

The above is a valid usage of srand(), however rand() will generate same set of numbers because srand() has been seeded to only 100.

(d) time(srand())

The above is also an invalid usage of srand().

Which statement, executed once at the start of main(), enables a program to generate a different sequence

Place the steps in order to link and place text into the document outline, effectively creating a master document.
Click Insert
Click Show Document.
Click Open.
Select the document file.
Click Outline view.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is asked about placing or linking text in an outline view and what would be the correct steps of placing text in an outline view.

The correct order to link and place text into the document outline, effectively creating a master document is given below:

Click Outline viewClick Show DocumentClick InsertSelect the document fileClick open

Answer:

Click Outline view

Click Show Document

Click Insert

Select the document file

Click open

Explanation:

Write a complete Python program that opens a file called 'myfile', reads the entire contents of the file into a string s, determines the number of words in myfile and prints that number on a line, then prints out all words in myfile in alphabetical order, each word on a separate line.

Answers

Answer:

myfile = open("myfile","r").readlines();

myfile_altered = "".join(myfile.split("\n"))

length = len(myfile_altered)

myfile_sort = " ".join(myfile).split(" ")

myfile.sort()

print(length)

print(myfile)

Explanation:

I read the file and split the text by a space, and just sorted the list using `.sort()`

Should work (didnt test it). If it doesn't, just comment on this answer and I will debug it.

b. Read in the data from the hours.csv file and call it “hours”. Make a histogram of the variable hours_studying. (Include the code to generate the histogram and the histogram itself in your lab report.) Comment on the symmetry or skew of the histogram.
c. Use the t.test() function that your used in lab to test the hypotheses to answer the question if this sample indicates a significant change in the number of hours spent studying. (Include your
R code and the output from t.test() in your lab report.)
i. What is the value of the test statistic?
ii. What is the p-value?
iii. Are the results significant at the α = 0. 05 level?
d. Write a conclusion for this test in APA format (as illustrated in lecture and lab).

Answers

After performing a one-sample t-test, it was determined that the test statistic held a value of t = 6.3775 (d.f.=63). The p-value calculated to be 1.128e-08, a figure insignificantly beneath the critical level of 0.05.

How to explain the Statistics

This establishes that the resulting data holds significance, as confirmed by the α=0.05 criterion given that the p-value is inferior toward the stated limit.

The average weekly study time for the students in question resulted in M = 14.18 hours; this signifies statistical variance when contrasted with sigma distribution variable values equating to SD = 5.10 (t(63) = 6.38, p < .001, 95% CI [12.95, 16.39]). Consequently, the null hypothesis cannot be sustained and must therefore be rejected.

Learn more about statistic on

https://brainly.com/question/15525560

#SPJ1

Write a C++ program that creates a word-search puzzle game where the user should find the hidden
words in a square array of letters. Your program should first read from the user their choice for the
game: a) easy, b) medium, c) hard, d) exit the game. If the user selects easy, then the 6x6 puzzle,
shown in Figure 1, will be generated and displayed to the user. If the user selects medium, then the
14 x 14 puzzle shown in Figure 2 should be generated and displayed and lastly, if the user selects
the hard choice, the program should generate a random puzzle, filling the square array of 20 x 20
using random characters/words.
Then your program should repeatedly read from the user, a word to be searched for in the puzzle,
the row and column number where the word starts from and which orientation to search for. The
words can be searched vertically (top to bottom), horizontally (left to right), diagonally (upper left
to lower right) and diagonally (upper right to lower left). The program should check if the column
and row number given by the user are inside the puzzle (array) boundaries, otherwise should display
an error message and ask the user to enter another position. For each word the user inputs, the
2
program should display whether the word was found or not. The program should stop reading
words when the user will press “X” and then the total number of found words will be displayed to
the user.
The program should repeatedly display the game menu until the user will select to exit the game

Answers

C++ program to create a word-search puzzle game. #include <iostream> #include <cstring> using namespace std; int main() { char input; cout << "Choose.

What is program technology?

Any technology (including, without limitation, any new and practical process, method of manufacture, or composition of matter) or proprietary material developed or first put into use (actively or constructively) by either Party in the course of the Research Program is referred to as "Program Technology."

A 33 board with 8 tiles (each tile has a number from 1 to 8) and a single empty space is provided. The goal is to use the vacant space to arrange the numbers on the tiles so that they match the final arrangement. Four neighboring (left, right, above, and below) tiles can be slid into the available area.

Therefore, C++ programs create a word-search puzzle game. #include <iostream> #include <cstring>

Learn more about the program here:

https://brainly.com/question/11023419

#SPJ1

what is the name of the program or service that lets you view e -mail messeges?​

Answers

The program or service that allows you to view email messages is called an email client.

What is the name of the program?

An email client is a software program or service that enables users to access, manage and view their email messages. It provides user-friendly interface for reading, composing and organizing emails.

Popular examples of email clients include Micro/soft Outlook, Gm/ail, Mo/zilla Thunderbird and Ap/ple Mail. These clients allow users to connect to their email accounts, retrieve messages from email servers and display them in an organized manner for easy viewing and interaction.

Read more about email client

brainly.com/question/24688558

#SPJ1

In the 1940s, computers were programmed using punch cards, or pieces of paper that had holes in them that represented binary code. If a mistake was made using this type of primitive programming, which of the following BEST describes what would need to be done to correct the problem?

A.
The entire program of punch cards had to be re-punched.

B.
The entire program of punch cards had to be loaded again and started over.

C.
The entire program needed to be rewritten and a different set of punch cards were used.

D.
The entire program could be fixed by adding or removing a card for the existing stack of papers.

Answers

Answer:

If a mistake was made using punch cards to program computers in the 1940s, the entire program of punch cards had to be re-punched to correct the problem. This was because punch cards were the primary means of input for the computer, and any changes or corrections to the program had to be physically made by punching new cards or modifying existing ones. Once the program was re-punched correctly, it could be loaded into the computer and executed.

Explanation:

Need an answer in Python

Write a program for. checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Answers

Using the knowledge in computational language in python it is possible to write a code that checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Writting the code:

def conjunction(p, q):

    return p and q

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = conjunction(p, q)

        print(p, q, a)

def exclusive_disjunction(p, q):

    return (p and not q) or (not p and q)

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = exclusive_disjunction(p, q)

        print(p, q, a)

See more about python at brainly.com/question/18502436

#SPJ1

Need an answer in PythonWrite a program for. checking the truth of the statement (X Y Z) = X Y Z for

Question 11 (2.5 points)
A start-up company has hired you to implement an email strategy for its organization.
The company wants all of its employees to have an enterprise-level email client and
is considering Windows Live Essentials. They ask you if there are any limitations
about this email solution. Which of the following is a major limitation?

Answers

Answer:

the dot

Explanation:

the dot is a good day forecast for a bit

The lowest amount you can pay on your credit card each month

Answers

Answer: A credit card minimum payment is often $20 to $35 or 1% to 3% of the card balance, whichever is greater.

Explanation: The minimum payment on a credit card is the lowest amount of money the cardholder can pay each billing cycle to keep the account's status “current” rather than late.

12.2 question 3 please help

Instructions

Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in the dictionary dcn stored with a key of key1 and swap it with the value stored with a key of key2. For example, the following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
swap_values(positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria'}

Answers

Answer:

def swap_values(dcn, key1, key2):

   temp = dcn[key1] # store the value of key1 temporarily

   dcn[key1] = dcn[key2] # set the value of key1 to the value of key2

   dcn[key2] = temp # set the value of key2 to the temporary value

positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}

print("Initial dictionary: ")

print(positions)

swap_values(positions, "C", "PF")

print("Modified dictionary: ")

print(positions)

Explanation:

how much electricity is in the human brain? ​

Answers

Answer:

On average, at any given moment, your brain's electricity is outputting roughly 0.085 Watts of power.

Explanation:

Answer:

roughly 0.085 Watts of power.

Explanation:

Other Questions
A strawberry has about 1 million cells, but an entire strawberry planthas many more cells. When you grow to an adult, your body will haveabout 40 trillion cells! Do you expect that all of the cells in amulticellular organism will be similar or different? Give reasons foryour answer.Type your answer here. Evaluate whether each of the following statements is True or False. In general, if a firm, or a project, is in its the maturity phase of the life cycle, it starts generating positive cash flows from financing activities. Answer: True A firm in the growth stage tends to expand its accounts receivable and inventories faster than its current operating liabilities, and as a result, the firms cash flows from operation are normally less than its net income. Answer: True 1) Liver cells are responsible for the detoxification of the blood from chemicals. Which organelle would be found in higher concentrations in cells of the liver to aid in the detoxification process? H2 + Cl2 -> 2HCIIf 255 grams of H2 reacts with 357 grams ofCl2, how many grams of HCI are formed? Can someone please answer these for me Im very confused. I need the answers by 20 minutes in a certain town ,50% of the households own a celullar phone,40% own a pager, and 20% own both a cellular phone and a pager. what is the probability that a randomly chosen household own either a cellular phone or a pager? The Fantastic Ice Cream Shoppe sold 9,600 servings of ice cream during June for $2 per serving. The shop purchases the ice cream in large tubs from the BlueBell Ice Cream Company. Each tub costs the shop $9 and has enough ice cream to fill 20 ice cream cones. The shop purchases the ice cream cones for $0.10 each from a local warehouse club. Located in an outdoor mall, the rent for the shop space is $1,700 per month. The shop expenses $260 a month for the depreciation of the shop's furniture and equipment. During June, the shop incurred an additional $2,400 of other operating expenses (75% of these were fixed costs). Read the Grament Requirement 1. Prepare The Fantastic Ice Cream Shoppe's June income statement using a traditional format. The Fantastic Ice Cream Shoppe Income Statement For the Month Ended June 30 Less Less: Requirement 2. Prepare The Fantastic Ice Cream Shoppe's June income statement using a contribution margin format CAT DU Requirement 2. Prepare The Fantastic Ice Cream Shoppe's June income statement using a contribution margin format. ad The Fantastic Ice Cream Shoppe Contribution Margin Income Statement atic For the Month Ended June 30 cy Less: Less: which of the following is true concerning the capitalization rate? A structure that has a similar function in separate species but differs in anatomy and ancestry is called a(n) structure. The population of a city increases by 0. 9% per year. If this year's population is 261,000, what will next year's population be, to the nearest individual? a child shows no interest in contact with her mother following a separation. this child does not specifically resist the mothers' efforts, but she will not seek much contact. she shows no preference for her mother over a stranger. which attachment style describes this child? group of answer choices securely attached insecure/avoidant secure/resistant insecure/disorganized Germanium has atomic number Z = 32. How many electrons does it need to lose to acquire the noble gas configuration? Descibe the setting of Elie Wiesel's Night in the first chapter. can someone answer i need an answer quickly A cup sits on a table. Due to its position, the potential energy of the cup is 3.00 joules. Ignoring frictional effects, if the cup falls off the table, how much kinetic energy will it have when it is halfway to the floor? a) 3.00 J b) 1.50 J c) 0.00 J d) cannot be determined without knowing the mass and the height of the cups Using the Rational Roots Theorem which of the values shown are potential roots of ) = 32-132-3x + 457 Select all that apply. +1/3 +5 +5/3 +9 +1 +15 +3 +45 Find the positive values of p for which the series converges. (Enter your answer using interval notation.) Sigma^infinity_n = 2 1/n(In n)^p Find the positive values of p for which the series converges. (Enter your answer using interval notation.) Sigma^Infinity_n = 1 n/(2 + n^2)^p Find the sum of the series. Sigma^Infinity_n=2 In(1 - 1/n^2) Use synthetic division to divide x^3 + 8x^2 + 16x + 9 by x + 3 The quotient is: The remainder is: Quick question: did I do this correctly? A client's bun test results are significantly elevated. when reviewing the client's history, which finding is consistent with bun elevation other than renal compromise?