The keyboard shortcut to hide a row is _______.

Ctrl+2
Ctrl+1
Ctrl+0
Ctrl+9

Answers

Answer 1

Answer:

Ctrl+9

Explanation:

Answer 2

Answer:

ctrl+9

Explanation:

hope it helps..................


Related Questions

Name the function for output in python.

Answers

Answer:

We use the print() function to output data to the standard output device (screen). We can also output data to a file, but this will be discussed later. An example of its use is given below.

Answer:print()

Explanation:As said above. Print is what we use in python (:

Selma writes the following four answers in her Computer Science examination.
State which computer terms she is describing.
“It is a signal. When the signal is received it tells the operating system that an event has occurred.”
Selma is describing

Answers

Answer:

Interrupts.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

The four (4) input-output (I/O) software layers includes the following;

I. User level software: it provides user programs with a simple user interface to perform input and output functions.

II. Device drivers: it controls the input-output (I/O) devices that are connected to a computer system through a wired or wireless connection.

III. Device-independent OS software: it allows for uniform interfacing and buffering for device drivers.

IV. Interrupt drivers (handlers): it is responsible for handling interruptions that occur while using a software on a computer system.

An interrupt is a signal from a program or device connected to a computer and it's typically designed to instruct the operating system (OS) that an event has occurred and requires an attention such as stopping its current activities or processes.

In conclusion, the computer term that Selma is describing is interrupts.

Answer:

Interrupts

Explanation:

Dr Martin Luther King and his followers go to Selma, Alabama to attempt to achieve, through non-violent protest, equal voting rights and abilities for black people. In 1964, Dr. Martin Luther King Jr. of the Southern Christian Leadership Conference (SCLC) accepts his Nobel Peace Prize.

To prevent certain columns from being displayed when printing a worksheet, _______ the columns.

erase
hide
highlight
remove

Answers

Hide I believe!!!!!!
To prevent certain columns from being displayed when printing a worksheet, HIDE the columns.

a diagram of a flow chart to find the average of 10 numbers​

Answers

Answer:

Kindly check attached picture

Explanation:

Flowchart gives a graphical representation of a steps taken towers the execution of a program.

In the flowchart attached, A variable was initialized and set to 0 ; then a for loop was used to iterate integers 1 up to 10, for each number. It is added to the initialized variable sum until all the 10 integer numbers are added. The the average is obtained by dividing by 10.

function of Napier bone any five​

Answers

Answer:

calculation of product

Napier's bones , also called Napier's

rods, are numbered rods which can be

used to perform multiplication of any

number by a number 2-9.

help,any question answer​

Answers

Answer:

true

false

true

true

Explanation:

I took the paper

help me pls i beg whoever types first ill mark them brainliest

Answers

Answer:

The answer is "Line 1,4,and 9".

Explanation:

Following are the complete code to the given question:

print ("What is your favourite football team? ")#print message

team = input()#define variable that use input method to input value

#this is the IF statement, If they enter Manchester City

if team == "Manchester City":#use if to check string value

#respond like this

   print ("Manchester City is a great team! ")#print message

#alternatively, respond like this

else: #defining else block

   print("I don't mind "+ team +", but Manchester City is better !")#print message

   #don't forget concatenation!

output:

Please find the code with the output in the attached file.

Please find attached file that will explains errors.

A chart is used to represent ______ data in pictorial form
Computer question
From the chapter ms excel pls answer!!

Answers

Answer:Pictorial form is also called a pictogram

What are water proof cameras?( write in detail)

Answers

Cameras where it’s focused enough to see under water and water resistant which water won’t get inside the camera and mess it up and end up burning you :)

Answer:

Underwater photography is the process of taking photographs while under water. It is usually done while scuba diving, but can be done while diving on surface supply, snorkeling, swimming, from a submersible or remotely operated underwater vehicle, or from automated cameras lowered from the surface.

Underwater photography can also be categorised as an art form and a method for recording data. Successful underwater imaging is usually done with specialized equipment and techniques. However, it offers exciting and rare photographic opportunities. Animals such as fish and marine mammals are common subjects, but photographers also pursue shipwrecks, submerged cave systems, underwater "landscapes", invertebrates, seaweeds, geological features, and portraits of fellow divers

Some cameras are made for use underwater, including modern waterproof digital cameras. The first amphibious camera was the Calypso, reintroduced as the Nikonos in 1963. The Nikonos range was designed specifically for use underwater. Nikon ended the Nikonos series in 2001[1] and its use has declined, as has that of other 35mm film systems. Sea and Sea USA made the Motor Marine III, an amphibious range-finder camera for 35mm film.[2][3]

Olympus TG-3 camera and its underwater housing front view

A waterproof camera and waterproof light source setup for professional underwater photography

GoPro Hero5 action camera in underwater housing

Seaview SVII Camera using three dome ports for all round view

Cameras made for dry work can also work underwater, protected by add-on housings, which are made for point and shoot cameras, compact cameras with full exposure controls, and single lens reflex cameras (SLRs). Most such housings are specific to the camera. Materials range from relatively inexpensive plastic to high-priced aluminum. Housings allow many options: users can choose housings specific to their everyday "land" cameras and use any lens. Underwater photographers generally use wide-angle lenses or macro lenses, both of which allow close focus and therefore a shorter distance to the subject, which reduces the loss of clarity to scattering. Digital media can hold many more shots than standard film (which rarely has more than 36 frames per roll). This gives digital cameras an advantage, since it is impractical to change film underwater. Other comparisons between digital and film photography also apply, and the use of film under water has declined, as it has on land.

Explanation:

explain why the computer is powerful working tool???​

Answers

Answer:

here ya go

Explanation:

A computer is a powerful tool because it is able to perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, and accuracy; store huge amounts of data and information; and communicate with other computers.

who was dobri dobrev?​

Answers

Answer:

Dobri Dimitrov Dobrev, better known as Grandpa Dobri, Elder Dobri or The Saint of Bailovo, was a Bulgarian ascetic who walked over 20 kilometres each day to sit or stand in front of the Cathedral of Alexander Nevsky in Sofia to collect money for charitable causes.

Answer:

He was bulgarian ascetic who walked over 20 kilometres each day to sit or stand in front of the Cathedral of Alexander Nevsky in Sofia to collect money for charitable causes. Elder Dobry has been raising money for decades to restore churches throughout Bulgaria.Dobrev donated all the money he collected to charities, orphanages, churches, and monasteries. 

the series of instructions that tells the hardware how to perform​

Answers

Answer:

A Program

Explanation:

Hardwares may be referred to as physical components of a computer system or machine. Hardware components may include processing unit of a machine or equipment. These Hardwares work with according to certain embedded instruction in other to function properly and according to the designers specification. These series of instruction written in other to control the function of the hardware is called the PROGRAM. Hence, the series of instruction which controls the function of the hardware is Called the PROGRAM.

write an algorithm to find perimeter of circle​

Answers

It is usually called the circumference of a circle, not a perimeter.

For a circle with radius r, the formula for the circumference C is

=2

Answer:

Explanation:

Algorithm:

step 1 : Start

step 2 : Read r

step 3 : POC = 2*22/7 *r                   POC = perimeter of circle

step 4 : display POC

step 5 : Stop

A customer in a store is purchasing five items. Write a program that asks for the price of each item, and then displays the subtotal of the sale, the amount of sales tax, and the total. Assume the sales tax is 7 percent. Display all results, properly labeled, as numbers with two digits after the decimal point.

Answers

Answer:

Program approach:-

Using the header file.Using the standard namespace I/O.Define the main function.Display the enter price of 5 terms.

Explanation:

Program:-

//header file

#include<iostream>

#include<iomanip>

//using namespace

using namespace std;

//main function

int main(){

       const double SALES_TAX=0.07;

       double subTotal=0,total=0,taxAmount = 0,x;

       

       cout<<"Enter price of 5 items"<<endl;

       for(int j=0;j<5;j++){

               cin>>x;

               subTotal += x;

       }

       taxAmount = subTotal * SALES_TAX;

       total = taxAmount + subTotal;

       cout<<fixed<<setprecision(2)<<endl;

       cout<<"Sub total: "<<subTotal<<endl;

       cout<<"Sales Tax: "<<taxAmount<<endl;

       cout<<"Total: "<<total<<endl;

       

       

}

what is the basic unit of measuring storage capacity of computer?​

Answers

Answer:

All data are stored on 1s and 0s computers (bits). We explain how much data we store using conditions such as kilobytes and megabytes.

Explanation:

Storage devices

All are stored in 1s and 0s on a computer. One of only 1 0 is called 'bit' in a computer. It takes 8 1s and 0s if we save a character in a computer, so we could say it needs 8 bits to store a character.

Computer and memory storage is frequently measured in megabytes and gigabytes (GB). A medium-sized novel includes approximately 1 MB of information. One MB is 1024 kilobytes, not a million bytes, or 1,048,576 bytes (1024x1024).

Similarly 1 GB is 1.024 MB (1024x1024x1024) bytes, or 1.073.741.824 bytes.

How to turn on my switch control bc it wont let me turn on when i keep on pressing it

Answers

Answer:

try triple clicking on the home button and see if it works, if it doesnt try restarting your ipad and try again.

Explanation:

Software specific to user’s needs is referred to as

Answers

Answer:

Application software

Explanation:

Application software may be explained as computer programs which are designed to performs specific functions or task or a certain business, educational or social problem. Application softwares are designed to serve end users according to purpose or need. Hence, they are different from system softwares which are required to aid operation of the computer. Application softwares may include ; spreadsheet programs like Microsoft Excel, Chrome browser, Safari, Slack, Gaming softwares and so on.

A top investment bank is in the process of building a new Forex trading platform. To ensure high availability and scalability, you designed the trading platform to use an Elastic Load Balancer in front of an Auto Scaling group of On-Demand EC2 instances across multiple Availability Zones. For its database tier, you chose to use a single Amazon Aurora instance to take advantage of its distributed, fault-tolerant, and self-healing storage system. In the event of system failure on the primary database instance, what happens to Amazon Aurora during the failove

Answers

Answer:

Following are the solution to the given question:

Explanation:

Initially, Aurora will try and establish a new DB instance in the same AZ as the previous example. When Aurora can do it, he will try to create a new DB instance in another AZ.

Aurora will try and construct a new DB instance in the same disponibility zone as the original example if there is not an Amazon Aurora Replica (i.e. single instance) that does not execute Aurora Serverless. The replacement of the original example was better managed and may not work if there is, for example, an issue that impacts broadly the entire Access Service.

Carlos, a network technician, replaces a failed switch with a new switch. Carlos informs the users on the subnet served by the switch that they can reconnect to the network. One user calls to report that she is still unable to access any resources on the network. Carlos checks the indicator light for the switch port to which that user is connected. The LED light is not lit. What action should Carlos take next to resolve this problem

Answers

Answer:

Explanation:

If the indicated network switch port has no glowing green LED then that switch port is either off or failing. This can sometimes happen even with newly replaced switches. In this case Carlos should first check to make sure that the switch port is properly installed. If so, then he should switch the port for a new one. If the LED light turns on and is still not green, then it may be an error with a faulty cable, and in this case Carlos should replace the cable with a new one, which should solve the issue.

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other, but you are having trouble configuring Internet access. What is the likely cause of the problem

Answers

Answer: Private addresses cannot directly communicate to hosts outside the local subnet.

Explanation:

Automatic Private IP Addressing (APIPA) allows assigning an IP address by a computer system automatically when there's no availability of a Dynamic Host Configuration Protocol (DHCP) server to perform the function.

Since after the configuration of the APIPA, all systems are able to communicate with each other, but there's trouble configuring Internet access, then private addresses cannot directly communicate to hosts outside the local subnet.

Which method for adding paragraph spaces is the most efficient?
adjusting the Space After setting
adding paragraph breaks where you want spaces
adjusting the Paste Options to match the destination formatting
adding tab stops at the start of each paragraph

Answers

Answer:

adjusting the Space After setting

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated.
What should you do?
A. Tell the user to wait until you are scheduled to be in that location.
B. Escalate the call to another technician or your supervisor.
C. Drive to the other location as soon as possible and update the driver.
D. Establish a Remote Desktop connection and update the driver.

Answers

Answer:

The answer is "Option D".

Explanation:

It is a desktop platform that helps a "client" computer can join from a remote location to a "host" computer. Clients can then manage and then use apps and files anywhere on network protocols.

This technology enables users to link from the remote location to a specific machine as if they were sitting beside it. Once this connection is established, users can carry out a variety of tasks as if they actually use the computer directly.

Bluetooth headphones does or do not use wireless data transmission

Answers

Answer:

To put it simply: no, using Bluetooth won't affect your cellular data in any way. Bluetooth works using short-range radio waves, not an internet connection. This means that Bluetooth will work anywhere you have two compatible devices — you don't need any sort of data plan, or even a cellular connection.

some does some does not

Use the drop-down menus to complete statements about options for inserting video files.
V is a point of interest in a video clip that can trigger animations or provide a location that a user
can jump to quickly.
The Embed Code command will link an online video to a presentation and requires
to work.
Recording mouse actions and audio is done by using the
command.

Answers

Answer:

1 book mark

2 internet connection

3 inset screen

Explanation:

because

_________________________ are people, places, and materials, either printed or non-printed, that can provide answers to inquiries.

Answers

Answer:

Information/knowledge resources

Explanation:

The process of looking for answers to questions that will lead to improved knowledge about a subject is known as an inquiry. The theories of enquiry includes abduction, induction, and deduction

An inquiry can provide the reasoning behind observation by making use of the theories of inquiry and sources that provide answers (information) about the (interrelated) events of the inquiry

Therefore, information and knowledge resources are the people, materials, and places, which can be in the printed, verbal, appearance form that have the capacity to proffer answers to inquiries

A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?
A. MAC filtering
B. 802.1X
C. WPA2
D. EAP-FAST

Answers

Answer:

C

Explanation:

WPA2 builds on its predecessor, WPA, and is specifically designed to meet the most demanding enterprise security needs. ... Furthermore, because WPA2 is backwards- compatible with WPA, organizations that have already implemented the WPA standard can migrate to WPA2 at their own pace.

QUESTION 10
Twenty first century learning environments promote:
O A. effective learning
B. continuous learning
O c. positive human relationships
OD. all of the above
O E. integration of formal and informal learning​

Answers

Answer:

D

Experts say 21st century learning must take place in contexts that “promote interaction and a sense of community [that] enable formal and informal learning.”i Thus, this paper will address the relationship of physical spaces and technological systems to learning, but more importantly, it will also consider how those

Explanation:

MARK ME AS BRAINLIEST

FOLLOW ME

CARRY ON LEARNING

100 %SURE

Answer is OD all the above

State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.​

Answers

Answer:

Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible  they include all information from previous revisions and updates.

Explanation:

For what purpose do the hackers create the zombies army?

A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks

Answers

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

what is spyware and what is it function?​

Answers

Explanation:

Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.

Other Questions
Write the equation of the linea) Slope = -2Y intercept=5b) Slope = 0.5Passes through (0,1) Water from a fire hose knocks over a wooden shed. Compared with the pressure withinthe water, the pressure exerted against the shed isa) less.b) the same.c) more.d) nonexistent Solve for X in the triangle. Round your answer to the nearest tenth A dilation has center (0,0). Find the image of the point B (7/4,-3/4) for the scale factor 1/4. What is the scale factor of Triangle XYZ to Triangle UVW? A.10 B.5 C.1/5 D. 1/10This da last question forAPEXPlease help!! Periwinkle Manufacturing Company has the following budgeted costs for 10,000 units: Variable Costs Fixed CostsManufacturing $200,000 $75,000 Selling & Administrative 100,000 25,000Total $300,000 $100,000What is the initial selling price needed to obtain a target profit of $200,000 using the variable cost markup method?A. $30.B. $55.C. $60.D. $50. explanation about Cardinal number Carolyn relation cardinals Read the paragraph.Even though my life is very busy, I spend as much time as I can with my family. I often ask my dad, who is an excellent athlete to play soccer with me. I also enjoy taking walks, baking desserts, and playing cards with my mom. However, nothing is better than watching movies with my loyal cat, Max.How should the second sentence of this paragraph be written so that it correctly uses commas?I often, ask my dad, who is an excellent athlete to play soccer with me.I often ask my dad, who is an excellent, athlete to play soccer with me.I often ask my dad, who is an excellent athlete, to play soccer with me.I often ask my dad, who is an excellent athlete to play, soccer with me. 1. The set of ordered pairs {(-2, 4), (0,3), (4,11), (7. - 1)}| defined y as a function of x. Which of the followingoutput of the function when its input is 4?A) -1B)-2C) 0D) 11 Rearrange the formula to make x the subject.y = 4x + 3 Which transformation reflects a figure across the y-axis Which one of the following statements concerning vitamin B12 is correct?A\ it is present in plant products. B\ its deficiency is most often caused by a lack of the vitamin in the diet. C\ it requires a specific glycoprotein for its absorption.D\ it is involved in the transfer of amino groups. E\ the cofactor from is vitamin B12 itself. Following it's defeat in World War I, the Ottoman Empire: A. began a campaign of genocide against Armenian communities that did not support the war.B. adopted a communist form of government because of pressure from the Russian Bolsheviks.C. allowed ethnic groups in its territory to create new countries based on self-determination.D. gave up control of its African and Middle Eastern territories to the European Allies. Triangle ABC is translated to create triangle DFG, as shown below.2y + 12 cm212y - 3) cm312x + 10) cm12x + 12 cmGIn these triangles, side AB is congruent to side DF, and side BC is congruent to side FG. Determine the values of xandyShow your work Lori has 12 1/2 pounds of flour. She needs 1 3/4 pounds of flourfor each batch of cookies. How many batches can Lori make? A-21B.1-1The midpoint of AB = ([?],[ ]) What is the basic relationship between scarcity and choice? A) Absolute Advantage B) Free Enterprise C) Strategic Industry D) Planned Economy what is a 36% markup to $150 dallors Which statement best describes a command economy?Government intervention in economic choices is strictly forbidden.The government determines economic choices and makes most decisions.The decisions made by producers and consumers drive all economic choices.Producers and consumers make some economic choices while the government makes others. PLEASE HELP ASAP!!Q: Use the graph of f below. Assume the entire function is graphed below. Find where f(x)