When one is typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.
Computer data storage can be regarded complex system, immediately a data is saved then; The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers, The hardware will record this saved numbers inside the computer. These numbers are then organized and transferred to temporary storage which be manipulated by programs, or software.Therefore, data are been stored as 1s and 0s in the computer.
Learn more at:https://brainly.com/question/21571591?referrer=searchResults
Which options are available in the Conditional Formatting dialog box?
Answer:
all but b are correct.
Explanation:
which are types of gradients to choose from when working in photoshop
Answer:
can anyone help me in computer
There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).
How might colour blindness be utilised in Photoshop?Click See Proof Setup Color Blindness Protanopia-type/Color Blindness Deuteranopia-type to use it. Now, you can toggle it on and off simply using the Ctrl+Y key on a PC or the +Y key on a Mac.
To help with design, there are certain tools that imitate colour blindness. Change the document's colour mode to RGB (this mode provides the most accurate proofs for colour blindness) Select either Protanopia-type or Deuteranopia-type under View > Proof Setting > Color Blindness.
Therefore, There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).
To know more about Photoshop visit:-
brainly.com/question/30808560
#SPJ2
what is the difference between internal and external css?
Answer:
Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file.
External CSS is that we can write in a separate file than the HTML code i.e the HTML file is separate like(index.html) the CSS file is separate like(style.css).
Explanation:
Order the steps to creating a new rule to handle meeting request responses in Outlook
Answer:
posting this. your photo order is correct.
Explanation:
Preset headers and footers cannot have additional information add to the areas.
Group of answer choices
True
False
the answer to the question is true
Draw a flow chart showing the conversion of temperature from farenheit to degree celsius
I hope this answers help you
what is the url of the website that would allow you to change your password, adjust quotas, and check a list of known computer problems on campus?
Answer:
Go to your schools website and look for the change password, ETC area I would guess it would be a "Help" tab
Explanation:
You did not explain what Campus your on however you can find this yourself pretty easy.
how to install windows 11 on unsupported processor
Answer: You can't, if you anyway bypass the system, your device will run on risk.
Suggestion: Use any Linux distro similar windows 11. Like - Ubuntu/ Linux Mint/ ElementaryOs.
(Suggestion is only for if you can't run windows 10 or the pre installed Operating System in your machine.)
boolean logic deals with statements having one of _____ values.
Answer:
2 values
Explanation:
boolean statements can only be True or False
Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?
Answer:
Left-click each message, and move it to the Trash folder.
Right-click the Deleted Items folder, and click Empty Folder.
Click the Folder tab, and click the Empty Folder in Clean Up group.
Right-click the Deleted Items folder, and click Mark All as Read.
PLEASE HELP PLEAAASSSSSEEEE!
When search engines republish content, it refers to _____.
a leaking data exhaust
an active data exhaust
an active digital footprint
a passive digital footprint
Answer:
a passive digital footprint
Explanation:
When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.
Answer:
D. a passive digital footprint.
Explanation: got it right
What component uses thermal paste to attach the heat sink?
Answer:
Thermal compound is the answer
where is the scroll bar located inside a web browser?
The Scroll Bar is the narrow space in your browser window just to the right of the content area.
Hey is anyone else getting this? Don't mind the answer.
Answer:
Getting what? I don't get what you mean.
What is the two’s compliment of -95,-122,-111,-57
Answer:
-95 0101 1111
-122= 0111 1010
-111= 0110 1111
-57 = 0011 1001
Explanation:
two's Compliment of
- 95 = 0101 1111
-122= 0111 1010
-111= 0110 1111
-57 = 0011 1001
You are trying to sell a new product to a store owner. Which method of presentation
is likely the most effective?
A. a chart showing how sales will go up if they use this product
B. quotes from other store owners on success of this product
C. a free trial option to use the product for six months, no questions asked
D. all of the above
(10pts)
Is 1/5 a rational number, interger, whole number, and natural
Answer:
1/5 is a rational number.
Explanation:
Natural numbers are the numbers you use to count with (1, 2, 3, etc.). Nobody uses fractions while counting whole objects unless they think they're funny and want to stall, so 1/5 wouldn't be a rational number.
Whole numbers are the exact same as natural numbers, but with the addition of the number 0 (think about it, no one starts from zero when counting).
Integers include whole numbers as well as their opposites (for example, the opposite of 4 is –4).
As a basic rule of thumb, if the number includes a fraction or a decimal point of any kind, it would be a rational number.
You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) located on the second hard disk. Your Windows desktop system has system protection enabled on the both drives. You need to configure system protection on this system to maximize overall protection. What should you do
Answer:
You can go to the windows group policy settings and turn the security mode to thw highest or just installing a AV system that has a good reputation.
Hope this help please give the brainliest award would be much appreciated.
What is word in computer?
Answer:
In computing, a word is the natural unit of data used by a particular processor design. A word is a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor.
This the answer you wanted? (brainliest?)
what is output if the user types 13 click all that apply ABCD
Answer:
AD?
Explanation:
Answer:
A C D
Explanation:
youre welcome :)
one Q what will be the answer?
Answer: a computer system that has one function within a large system
Explanation:
the key word here is EMBEDDED which means WITHIN SOMETHING ELSE
A document used to convince a panel of potential funders to help a product, programor service become reality.
Answer:
Concept paper
Explanation:
how can an attacker execute malware through a script?
Answer:
An attacker can attach a script to a program that you download which then infects your computer.
what information most likely presents a security risk on your personal
An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.
A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.
Some of the social characteristics and details of an individual that are shared on social media websites include the following:
Date of birth.Occupation.Religion.Gender (sex).Location.Friends.However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.
In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.
Read more: https://brainly.com/question/21765376
is a technique for breaking a problem down into smaller, less complex parts.
A- Pattern recognition
B- Decomposition
Answer:
B) decomposition
Explanation:
I got it right on the test
You have just received a new laptop that you will use on your company network and at home. The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine. When you take your laptop home, you cannot connect to devices on your home network or to the internet.
Required:
What could have been the reason for that?
Answer:
The network address can be the reason. You need to modify it so you can have access.
what is the problem here
Answer:
I think ...............
Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)
Answer:
can you explain more please I didn't understand
Imagine that over the past few weeks, you have experienced an abundance of pop-up ads
appearing when you are using the Internet. You'll also noticed that your computer is
working more slowly than usual.
In a 200 - 300 word essay, diagnose the problem with your computer and explain what can be done to remedy the issue. In your essay, use information from the lesson to justify your
diagnosis and solution.
I
Answer:
Look below
Explanation:
You open the computer that you recently purchased and it is running slower than usual and your experiencing popups
What most people would think is that a virus has infected their computer. This can be diagnosed via a free online (REPUTABLE) tool such as Malwarebytes. If the tool detects a virus it can remove it and this will 99% of the time fix the problem.
Now after you have solved the problem there is another thing to learn, viruses don't just catch computers like a real virus so its User Error either by the owner of the computer or someone with access, If you are the only one who uses the computer you should learn some online safety such as not visiting websites people wouldn't consider reputable and don't run sketchy files (EXE, JAR, etc) don't download anything from a source you don't trust.
If it was a family member or friend's fault explain internet safety to them and how sometimes a simple mistake of not double-checking the website can lead to a virus. One time I was installing java on a friend's computer and just clicked the first link (an ad) not Javas website and it ended up in me getting in some trouble.
However, if you have solved the virus issue and your computer is still being slow you should check if Windows has been damaged, you can do this via Command Prompt a program that comes with your Windows Machine. Just type "sfc /verifyonly" and it will find if your windows files have been damaged.
-END
256 words
Pls mark me Brainliest i worked hard on this. Your assignment asks for information on the lesson however i used some complicated solutions to make up for that so your teacher/professor thinks your smart
Can someone check my answers?
I got 4 for c and 17 for d
Answer:
both are correct
Explanation: