4. Which event is used to move from one textbox to another through enter
a) Key Click b) Key Enter c) Key Down d) Key Select

Answers

Answer 1

Answer:

key enter

Explanation:

May this help you l think


Related Questions

If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was integrated?​

Answers

To enhance the ICT (Information Communication Technology) used by teachers, I will modify how the ICT was integrated.

The modification of how ICT is integrated will change the culture that places teaching over technology.  Then, teachers will be taught how to use ICT to:

improve learning so that teachers become learning facilitatorsmotivate learners by fostering learning autonomy, making students less dependent on the teacherengage the learners by creating collaborative learningdiminish content learning so that students learn to think, create, and communicate effectivelymake learning a lifetime culture enhance the learning environment so that teachers become collaborators and co-learners with students.

Thus, I will enhance the ICT used by teachers by modifying its integration to achieve better results for both teachers and learners.

Learn more about the importance of ICT here: https://brainly.com/question/13724249

the base on which the number n=(34)? is written if it has a value of n= (22)10​

Answers

If I'm understanding the question correctly, you are looking for an integer b (b ≠ 0, b ≠ 1) such that

[tex]34_b = 22_{10}[/tex]

In other words, you're solving for b such that

b ¹ + 4×b ⁰ = 22

or

3b + 4 = 22

Solving this is trivial:

3b + 4 = 22

3b = 18

b = 6

So we have

34₆ = 22₁₀

What is a computer system

Answers

Answer:

A computer along with additional hardware and software together is called a computer system. A computer system primarily comprises a central processing unit (CPU), memory, input/output devices and storage devices. All these components function together as a single unit to deliver the desired output.

Explanation:

pls mark brainliest

PYTHON PROGRAMMING: At one college, the tuition for a full-time student is $8,000 per semester.
It has been announced that the tuition will increase by 3 percent each year for the next 5 years. Write a program with a loop that displays the projected semester tuition amount for the next 5 years. The program should print out the result in the form:
In 1 year, the tuition will be $8002.3.
In 2 years, the tuition will be $8103.2.In 3 years, …
In 4 years, …
In 5 years, …
(If, for example, the tuition would cost 8002.3 dollars in one year, etc.)
HERE'S WHAT I TRIED (wont show indentations here):
Semester_Fee = 8000.0
for x in range(1, 6):
Semester_Fee = Semester_Fee + (Semester_Fee *(3/(100*1.0)))
print("In",x,"year, the tuition will be" ,'$', Semester_Fee, end='.n')
BUT HERE'S WHAT IT SHOWED ME:
Expected Result:
In·1·year,·the·tuition·will·be·$8240.0.
In·2·years,·the·tuition·will·be·$8487.2.
In·3·years,·the·tuition·will·be·$8741.816.
In·4·years,·the·tuition·will·be·$9004.07048.
In·5·years,·the·tuition·will·be·$9274.192594400001.
Your Code's Actual Result:
In·1·year,·the·tuition·will·be·$·8240.0.
In·2·year,·the·tuition·will·be·$·8487.2.
In·3·year,·the·tuition·will·be·$·8741.816.
In·4·year,·the·tuition·will·be·$·9004.07048.
In·5·year,·the·tuition·will·be·$·9274.1925944.

Answers

Answer:

Try :

Semester_Fee = 8000.0

for x in range(1, 6):

   import decimal

   Semester_Fee = Semester_Fee + Semester_Fee *(3/(100*1.0))

   if x==1:

       print("In",x,"year, the tuition will be" ,'$', Semester_Fee, end='.')

   else:

       print("In",x,"years, the tuition will be" ,'$', Semester_Fee, end='.')

Say you have a long string and you want to collect all of the letters within it without storing duplicates. What would be the most appropriate type to store the letters in?
a. a set
b. a list
c. the original string
d. a dictionary

Answers

A set because sets do not allow duplicated elements

1110011*110011 binary multiplication

Answers

122113420121

Explanation:

Answer:

110110101001

Explanation:

You have to multiply them normally and then add then in a binary manner..

Remember these are binary numbers ( 1+1=0,

1+0=1, 0+0=0)

Write steps to Delete data from ‘Datagridview’

Answers

Explanation:

private void btnDelete_Click(object sender, EventArgs e)

{

if (this.dataGridView1.SelectedRows.Count > 0)

{

dataGridView1.Rows.RemoveAt(this.dataGridView1.SelectedRows[0].Index);

}

}

Arrays are commonly used to store data items. Arrays can be managed in ways that fill, iterate over, add to, and delete items from the array. Why is it useful to store multiple pieces of information?

Answers

Answer:

mark me brainlist

Explanation:

Kirk (2019) states that the topic of color can be a minefield. The judgement involved with selecting the right amount of color for a particular application can be daunting. With regards to visualizations, there are different levers that can be adjusted to create the desired effects (Kirk, 2019). The levers are associated with the HSL (Hue, Saturation, Lightness) color cylinder. Select and elaborate on one of the following:

a. Color Hue Spectrum
b. Color Saturation Spectrum
c. Color Lightness Spectrum

Answers

Answer:

Explanation:

Answer:

Explanation:

Answer:

a

Explanation:

a. Color Hue Spectrum

what is the best low end pc recording software​

Answers

Explanation:

democreator

D3DGear

nvidia shadow play etc

DemoCreator. WonderShare DemoCreator application is a great application that is used to create video tutorials and other sessions effectively. FBX Game Recorder. Dxtory. D3DGear. NVIDIA ShadowPlay.

HOPE SO IT HELPS YOU

You want to remind users of the acceptable usage policy that applies to all computer systems in your organization, so you decide to display a message after the user logs in. The full path and filename to the file you would edit is

Answers

It should always be changed to show one message informing customers of the approved user policy which applies to every one computer network within our organization.The "motd" was its filename of a modified version of such a file that displays any messages after logging in.The document should be modified when the message is to be displayed before a user logs in.Please find the attached file for the complete solution.

Learn more:

user logs: brainly.com/question/7580165

what is the role of media in our society, and how can we become responsible consumers producers of news and information in the digital age?​

Answers

1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...

3.Obtain permissions when posting videos or 4.images of others on your networks. ...

Scrub your accounts. ...

5.Password diligence. ...

Spread love, not hate.

who is considered as the father of computer science?​

Answers

Charles Babbage is known as father of computer science because he designed the original programmable computer .

I hope it helps and if you want to have good answer follow me, I will be your second sight on your any problems♥️♥️

Differentiate between email and NIPOST System

Answers

Answer: NIPOST System is sending mail physical like photos and letters and many items

Email is electronic  mail sent through the internet but you can send it anywhere

Explanation:

How to use the AI System ?

Answers

ANSWER:

· New artificial intelligence systems are being developed to help teachers administer more effective testing that could uncover some of these often-hidden conditions. Once they can be properly identified, educators can tap into the resources available for a learning disability. Students can use AI to give reliable feedback.

By Using the following schema, answer the following SQL queries and commands: Product(P_code.P_name, P_price, P_on_hand,vend_code) Vender(vend_code, vend_fname, vend_areacode, vend_phone) 1- find the venders names who sell products in TN-5 area and their names include "dan". 2- find the code, name and vender code of product that has price between 1500S and 2500S and the product that has price between 48005 and 5600S. 3- Find the name, and code of venders who had 5 microwaves that has price less than 3500S. 4- Find the phone numbers of venders who sell Televisions. 5- Delete the records of venders who their first name is 'smith'

Answers

Explanation:

answer me pls i need sol bbbd

Which is needed for the specific task of inserting a chart into a report?
O The Controls tab
O The Insert Image command
O The Existing Fields command
O The Property Sheet​

Answers

To add charts in Access to reports, click the “Create” tab in the Ribbon. Then click the “Report Design” button in the “Reports” button group. Unlike other report controls, the chart control uses its own data source to show its data. Therefore, you can insert it into a blank, unassociated report, if desired

3. Which property is used to select full Row of data grid view
a) Select Mode b) Mode Selection c) Selection Mode d) Mode Select

Answers

Answer:

I think a is correct answer.

Consider a world named ‘Square World’. In this world a person can move only up,
down, left, right squares and only one square at a time. The squares are numbered. In
square number 3, there is our hero Yellow. His dream girl Pinky is in square number
16. There are bombs in the red squares and if someone goes there, he/she will be
busted! Yellow wants to see Pinky as quickly as possible and starts his journey from
square 3. Help him to find the shortest route. Which search technique will you use to
help Yellow? Demonstrate your idea by showing your simulation step by steps.

Answers

Answer:

Explanation:

It is hard , please any one help me.

Solve this question

Why is computer important in modern life?​

Answers

Answer

because in modern day life people need to use alot of their work and school stuff on computers

Write a method named lastIndexOf that accepts an array of integers and an * integer value as its parameters and returns the last index at which the * value occurs in the array. The method should return -1 if the value is not * found.

Answers

Answer:

The method is as follows:

public static int lastIndexOf(int [] numbers, int num){

    int lastIndex = numbers[0];

    for(int i =0; i<numbers.length;i+=num){

        lastIndex = numbers[i];

    }

    return lastIndex;

}

Explanation:

This defines the method

public static int lastIndexOf(int [] numbers, int num){

This initializes the lastIndex to the first element of the array

    int lastIndex = numbers[0];

This iterates through every "num" element of the array

    for(int i =0; i<numbers.length;i+=num){

This gets the current index... until the last

        lastIndex = numbers[i];     }

This returns the last

    return lastIndex; }

Alexis received an email message from an unknown sender that included an attachment.

If she opens the attachment, what kind of malicious software might be activated, and what are the consequences?


Opening the attachment would release a worm, which would infect her system with a virus.


Opening the attachment would release a worm, which would infect her system with spyware.


Opening the attachment would release an active worm, which would infect her system with adware.


Opening the attachment would release a passive worm, which would infect her system with adware.

Answers

Answer:

Opening the attachment would release a worm, which would infect her system with a virus.

Answer:  B. Opening the attachment would release a worm, which would infect her system with a virus.

In securing the client/server environment of an information system, a principal disadvantage of using a single level sign-on
password is the danger of creating a(n)
A
administrative bottleneck
B
trap door entry point
С
lock-out of valid users
D
Single point of failure

Answers

Answer:

C

Explanation:

Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the maximum number of hosts possible on each subnet.

Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?

Answers

The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.In this method, the subnetting separates the IP address between host and network addresses.The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address [tex]\bold{= 172.149.254.0 /24}[/tex]

Subnet numbers [tex]\bold{= 13}[/tex]

Calculating the borrow bits:

[tex]\to \bold{= ceil(\log_{2} 13) = 4 \ bits}[/tex]

a)

Calculating the dotted decimal value for the subnet mask:

[tex]\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\[/tex]

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

what are the programs in a computer​

Answers

Answer:

Computer skills examples

Operating systems  

Office suites  

Presentation software

Spreadsheets  

Accounting software

Explanation:

A program is a set of ordered operations for a computer to do in computing. The program in the modern computer described by John von Neumann in 1945 has a one-at-a-time series of instructions that the computer follows. Typically, the application is saved in a computer-accessible storage location.

How can an IS managers keep up with the endless demand for more software to support new information systems​

Answers

An IS manager can keep up with the endless demand for more software to support new information systems by thinking outside the box.

To think outside the box, the IS manager should try the following strategies:

Use predetermined application components that are operating on low-code or no-code platforms.Use better software-testing practices and tools that spread programming into small sprints.Engage in shift-left testing, which enables software-testing to be done at every phase of the development process.Involve product managers and business users at the beginning of software development, making them to drive innovation that satisfies their requirements.Finally, the IS manager can utilize AI and Machine Learning to speed up the development of required software, thereby enhancing its qualities and capabilities with reduced time and costs.

Thus, the IS manager must realize that there are always solutions to every software problem outside the mainstream box.

Learn more about information systems here: https://brainly.com/question/1521627

What’s cloud-based LinkedIn automation?

Answers

Answer:

Cloud based LinkedIn automation includes tools and software that run through the cloud-system and are not detectable by LinkedIn. Cloud based LinkedIn automation tools are becoming the favorite among B2B marketers and sales professionals as they are giving the desired outcomes without any effort.

Peter has discovered that the junior administrator has done something to corrupt the firewall rules on one of the Linux machines. He decides to delete all of the rules and recreate them from scratch. What is the first command that Peter should run

Answers

Answer:

the first step Peter must take is to configure the default policies for each of the built-in chains to ACCEPT.

He can do this by running the following:

$     sudo iptables -P INPUT ACCEPT

$     sudo iptables -P FORWARD ACCEPT

$     sudo iptables -P OUTPUT ACCEPT

Explanation:

If he doesn't do this, he stands the risk of being locked out of the server through the SSH.

Having done the above, he can proceed to run the following commands:

$     sudo iptables -t nat -F

$     sudo iptables -t mangle -F

$     sudo iptables -F

$     sudo iptables -X

The above will effectively flush (-F), and delete all non-default chains (-X).

Cheers

What is indirect program memory addressing? Explain the working of the following instructions?

a) JMP AX
b) JMP LIST[DX]
c) JMP NEAR PTR[DI+3]

Answers

Indirect main memory addressing is described as the method in which the variable's address is stored in a mind register and also a command is utilized to point towards the memory registers which hold the register. Instruction is used to direct towards a register that displays the results of the variables. The register, in turn, refers to that variable's address in simplistic words. As just a result, it is indeed considered a passive program, memory address.

The instructions operate as follows:

a)

JMP AX :

The JMP instruction is being used to execute an unconditional jump.AX is indeed the label's name. JMP AX codes are being used to transfer control of the flow program to the AX label.

b)

JMP LIST:

The JMP command can be used to execute an unconditional jump, JMP LIST[DX] is the label's name.  The JMP LIST[DX] program is being used to transfer control of its flow programs to the specified section. It is the segment to which the flow control is transmitted.

c)

JMP NEAR PTR[DI+3]: 

Unconditional jumps could be done with the JMP command as you'll see, the label is JMP NEAR PTR[DI+3]. It's being used to transmit flow control to a particular section, throughout this case [DI+3]. The close keyword indicates that perhaps the code segment would be in the line of code being nearby.

Learn more:

brainly.com/question/20320915

Which website allows you to host your podcast for at a cost that includes your domain name? (Correct answer only)

A. Podbean
B. Blogger
C. WordPress
D. HostGator
E. Buzzsprout

Answers

Answer:

D I think it

Explanation:

Answer:

I think it is HostGator

Explanation:

I took the test and I put Podbean and it was wrong.

Other Questions
In what step of the pause strategy do you check your reading comprehension? I. Chn p n ng.1. Whos .? A. that B. his C. her2. May I . out? A. open B. go C. close3. How many booksyou have? A.do B. does C. are4. ..the weather today? A. what B. hows C. where5. Linda.two dogs. A. haveB. do C. has6. My room is.big.Its small. A. no B. notC. too7. Whatsname?Its Thang long school. A. it B. your C. its8. Shes my friend , A. sure B.too C. do Which method of birth control works by delivering a daily dose of estrogen and/or progesterone in order to prevent ovulation and changes in the lining of the uterus to prepare for implantation? Which of the following describes the most likely way in which two water molecules will interact?A. A covalent bond will form between the hydrogen of one water molecule and the oxygen of the other water molecule.B. An ionic bond will form between the oxygens in each water molecule.C. A metallic bond will form between the hydrogens in each water molecule.D. A hydrogen bond will form between the hydrogen atom of one water molecule and the oxygen atom of the other water molecule. (100 points) Select the correct answer.Danny's 7 friends contributed an equal amount of money to buy him a birthday present. The present cost $84. How much money did each friend contribute?A. 12B. 36C. 48D. 84 Please help 15 points! And brainlist! Hurry I need help right now! What was the first part of American societythat was attacked because of the Red ScareII?A. the movie industryB. the automobile industryC. the steel workers association Please answer this question The sample survey showed that 72% of Internet users said the Internet has generally strengthened their relationship with family and friends. Develop a 95% confidence interval for the proportion of respondents who say the Internet has strengthened their relationship with family and friends. For each characteristic of mineral extraction, decide whether it applies to strip mining, subsurface mining, or both types of mining.Generates acid drainage Overburden is removed from mining siteUsed to extract coal Used to extract resources that are Near the surface One of the most dangerous Occupations in the United States Safety requires good ventilation systems Used to extract resources that are deep underground Destroys large areas of wildlife habitat The people depicted in both welcome to all and worlds highest standard of living are standing in lines.use details from the visual texts to make inferences about how their experiences are different Churches usually teach their members rules and often codify these rules into formal commandments to be followed. Given this, churches can be considered a. dramaturgists. b. part of the media. c. total institutions. d. agents of socialization. what is the meaning of turtle If a force of 1250 N acts on an area of 25 metres squared, what will be the pressure acting on the surface? Show your working as well. Amanda has 1 3/4yds of red ribbon and 7/8yds of greenribbon. What is the total amount of ribbon thatAmanda has? (write answer as a fraction) What social change did the American Revolution bring about regarding gender roles? What is a stap you can take toward committing to a career path?A Take some career assessmentsB. Check for positions in your area, )Keep your options OpenO D. Find out how popularitis HELPPPPPP PLEASE AND THANK YOU D: Sometimes, reality is crazycrazier than anything a novelist or avant-garde filmmaker or even just a really imaginative kid would be able to invent. Often, trivia gets to the point whereit boggles the mindand you find it downright unbelievable.There's no way a spy agency used cats as spies, you might think.Nope! Boston wasn't nearly wiped off the map by molasses. That's all fiction! Which business method was spread along with Islamic culture? A Traveling by caravan B Speaking Arabic C Building market places or C using standard weights.