Inserting and deleting text is a basic editing task in word processing.

True or false

Answers

Answer 1
The answer should be true
Answer 2
answer:
true.

hope this helps!

Related Questions

In your opinion which of the following is the most convenient way to create a bootable USB flash drive? Why?

Answers

Answer:

here

Explanation:

Plug the USB drive into your computer’s USB port.

Search for the “cmd” application in the Windows start menu, right-click on the item, and select “Run as administrator” from the context menu. This opens a small window with white text on a black background.

Type the command “diskpart” and confirm your input with the enter key (you’ll also do this after every other entered command). This starts the storage device manager.

Enter the command “list disk” to display all available storage devices.

You can recognize your USB by its storage capacity, and it’s usually listed as “disk 1”. In the system partition, “disk 0” is usually your PC, so a hard drive or solid state drive in your computer.

Based on the assumption that your USB has the label “disk 1”, enter the command “sel disk 1” to select it (or the corresponding “disk 2”, etc.).

Enter then command “clean” to delete all files from the USB.

Enter the command “create partition primary” to create a main partition.

Enter the command “list par” and select the newly created main partition with “sel par 1”.

Activate the partition with the command “active”.

Format the USB with the command “format fs=FAT32 label=“WINDOWSUSB” quick override” (in place of “WINDOWS USB” you can also choose another label, so long as it doesn’t contain any spaces or special characters. The drive will later be displayed under this name if you plug into a running Windows computer). Formatting may take a while. You can track its progress in the percentage bar.

As soon as the process is finished, enter the command “assign” to automatically assign a drive letter (for example “G:”) to your USB.

Enter “exit” to close DiskPart, and then “exit” again to close the command prompt

Which of the following are advantages of automatic updates?

Answers

Answer:

I think maybe b or d

Explanation:

Answer:

It's A, B, and D

Explanation:

Ok for whoever answers this, Ill wager 20 points...
Consider the following procedures.

PROCEDURE math (ans1, ans2)
{
a ← INPUT()
b ← INPUT()
c ← math2(a, b)
e ← a + ans1
f ← b + ans2
g ← math2(e, f)
h ← c + g
DISPLAY(h)
}

PROCEDURE math2 (res1, res2)
{
d ← res1 + res2
RETURN(d)
}
What is displayed as a result of executing the following program, if when prompted, the user enters a = 3 and b = 4?

math(1, 2)

Answers

Answer:

The display will be 17.

Explanation:

Tracing through the program:

At first, math is called and sent 1 and 2 - so 1 is stored to ans1 and 2 is stored to ans2.

If the user inputs 3 for a and 4 for b, the program then calls function math2 and passed values of 3 and 4.

So now inside of math2, 3 is stored to res1 and 4 is stored to res3. Inside of this function, res1 and res2 are added together - so then 7 is stored to d and then returned back to the original function.

So now 7 was stored back to the variable c. Then a and ans1 are added together (3 + 1 = 4) and b and ans2 are added together (4 + 2 = 6). Each of these values are stored back to e and f.

Then those values, e and f (4 and 6) are again sent to math2, which simply adds the values together and returns it back to the function. So 10 is sent back to math and stored to the value of g.

Then c (7) and g (10) are added together and displayed.

1. Is the function void or return
a. void
b. return
2. What is the result of the following expression: int r = 3; r%2 == 0;
a. it evaluates as true
b. it evaluates as false
c. nothing happens

Answers

Answer:

(a) void

(b) Nothing happens

Explanation:

Solving (a): void and return

A function that returns no value is referred to as a void function.

On the other hand, a void can not be return or named return.

So, the function is void

Solving (b):

r = 3

Required

The result of r%2 == 0

Substitute 3 for r in r%2 == 0

3%2 == 0

3%2 is 1.

So, we have:

1 == 0

Hence, the equivalent of r%2 == 0 is 1 == 0.

However, nothing will happen because there is no instruction attached to the statement (i.e. r%2 == 0;)

What is the best way to prove you did your research on a person you contact via email for help or guidance? A. Reference a specific project the person has worked on recently to show you did a deep dive into his/her background B. Tell the person generally how much you respect his/her career; if you're too specific, it will be overboard and you may turn the person off

Answers

Answer: A. Reference a specific project the person has worked on recently to show you did a deep dive into his/her background.

Explanation:

If you were to write an application letter for employment at a company, you would include certain details of the company that you found out whilst researching them so that your chances of being hired are improved.

The logic is the same here. In order to prove that you have researched a person, the proof lies in what you found out during that research. In this scenario, that includes specific projects that the person has worked on of recent.

Andrew likes to purchase his school supplies online. What are two advantages of doing so?


A.
It is possible for his information to be accessed or stolen by a third party.

B.
All his personal information is sent digitally and does not change when transmitted.


C.
Because the information is sent digitally, there are an infinite number of different signals possible.

D.
Because the information is sent quickly, he can receive his order more quickly.

Answers

Answer:

bd

Explanation:

Answer:

The answer is B.All his personal information is sent digitally and does not change when transmitted. And D.Because the information is sent quickly, he can receive his order more quickly.

Explanation:

I took AP EX quiz.

Nathan is working in a graphics program and he can't remember how to select an item. What should Nathan do?

Visit the application's Help files and search for the answer.

Go to the Start menu and select Instructions.

Look in the taskbar for the user’s manual.

Call the customer service number.

Answers

Answer:

The answer is option B : "Go to the Start menu and select Instructions".

Explain the difference between undecidable problems and unreasonable time algorithms. Be specific.

Answers

One for which no algorithm can ever be written to find the solution is an unsolvable problem. An undecidable problem is one for which no algorithm can ever be written that will always provide any input value with a correct true/false option.

An insoluble issue is one for which there is no algorithm that can ever be constructed to locate the solution. Undecidable problems are those for which there is no method that will ever be developed that can consistently return a true/false answer for any input value.

What is time algorithms?

If the value of an algorithm is constrained by a value that is independent of the amount of the input, the algorithm is said to be constant time sometimes written as time. For instance, accessing any individual element in an array requires a constant amount of time because just one operation is required to find it.

We employ a technique known as "Big O notation" to describe how time-consuming a method is. We employ a language called the Big O notation to express how time-consuming an algorithm is.

Therefore, we would argue that the insertion sort's best-case time complexity is O. (n). Linear complexity is another name for O(n) complexity.

Thus, An insoluble issue is one for which there is no algorithm.

For more information about time algorithms, click here:

https://brainly.com/question/14635830

#SPJ6

What is the legal precedence that affects data collection and data preservation as it relates to the digital forensics process

Answers

Answer:

Following are the solution to this question:

Explanation:

Some certain laws affect collection and data preservation procedures. When an electronic crime happens, government employees must be ordered to continue with both the inquiry or permission by their senior government officials. The digital forensic investigator has to comply with the laws of a country as they apply to both the situation so if conducting out such a digital forensic analysis. Many law safeguards that rights of patients who could obstruct their investigator. Its culprit can manipulate or interfere with digital evidence until the inquirer gathers and maintains this. There are many limitations on permit study. 

When its private data is revealed, the Electronic Communications Protection Act (ECPA) has been adopted to protect the privacy rights of its ISPs' consumers. That protects people (suspect/culture) from the investigators by just not acquiring its ISP's information, in many specific regulations are affecting the process of digital forensic data collection and preservation.

if i want a word to be keyed in all capital letters, which is the correct proofreader's mark?

Answers

----
----
---
Three lines under a lowercase letter mean to make it a capital.

2) What are two reasons we analyze algorithms?
a) make decisions about what algorithms to use
b) ease of coding
c) sorting data
d) predict performance

Answers

It’s a making sections about what algorithms to use

Answer:

Make decisions about what algorithms to use

Explanation:

As you are designing a site for a client, you notice that the bulleted lists do not appear when a blog is published. You look in the code and see you have used the proper < li > tag. What else needs to be in the code?


notli

/li

unli

-li

Answers

Answer:

B

Explanation:

Site specific situation wherein you have to write “Shortage Notations?

Answers

Answer:

Shortage Notations and the situation where you have to write down the Shortage Notations is explained below in complete detail with the situation.

Explanation:

Shortage Notations: If a portion of the shipment is missing, record the number of items shipped on the delivery slip and circle it. Then record down the number of articles missing and remark them as "short." The acquiring person is accountable for demanding the carrier to investigate the damaged goods and packaging.

It should be noted that a shortage notation occurs when the products delivered on a ship are incomplete when the ship gets to its destination.

It should be noted that shortage notation simply means when a portion of a shipment is missing, then an individual should record rte number of the items that are shipped on the delivery slip and then circle it.

Then, in such a situation, the owner of the good can then file a shortage claim later. This happens when the packaging isn't intact.

Learn more about shipping on:

https://brainly.com/question/758860

write an article for publication on why every student should be computer literate​

Answers

Answer:bankrupt

Explanation: no money on your card lol i hope you haveing a great day and i want you to know that you got this babe like is life is good then great but if not then it will get better beause you will make it get better

Complete the statement below using the correct term.


One problem with _____
is that often many copies of the same document are made.

Answers

One problem with PRINTER is that often many copies of the same document are made.
printers or a printer !

1. lesa __________
2. didalna _______________
3 .rpeyr etlyr _____________
4. etrpoy _____________
5. rkyo ewn _____________
6. amya loagneu _____________
7. zfeorn___________________
8. msal etopry ________________
9. reyve nda gsni filt ________________________
10. tehreat lopoal ______________________
11. getas htgfir _______________
12. telsa __________________
13. diovc _____________
14. engilaenri _____________
15. atsfdofo ____________
16. rgwo pu i nhew ____________
17. tbulatyir lipcoe _______________
18. smjniae ncpiesrs __________________
19. migna ______________
20. dnaniai rgya

Answers

Penissss...?
Yes or no?

Select the correct answer.
Which output returns the Boolean value FALSE?
A.3
B.2
C.1
D.0

Answers

Answer:

your answer would be D.0

Explanation:

Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the array. 14 36 31 -2 11 -6 Sample Run [14, 36, 31, -2, 11, -6] (In edhesive please)

Answers

Answer:

nums=[14, 36, 31, -2, 11, -6]

print(nums)

Explanation:

I got a 100%

Answer:

In C++:

#include <iostream>

using namespace std;

int main(){

    int nums[6] = {14, 36, 31, -2, 11, -6};

    cout<<"[";

    for(int i = 0;i<6;i++){

    cout<<nums[i];

    if(i != 5){cout<<", ";}

    }

    cout<<"]";

   return 0;

}

Explanation:

This initializes the array

    int nums[6] = {14, 36, 31, -2, 11, -6};

This prints the opening square bracket

    cout<<"[";

This iterates through the array

    for(int i = 0;i<6;i++){

This prints individual elements of the array

    cout<<nums[i];

Until the last index, this line prints comma after individual array elements

    if(i != 5){cout<<", ";}

    }

This prints the closing square bracket

    cout<<"]";

Find the quotient. 2.5 ÷ 5

Answers

Answer:

.5

Explanation:

you just divide 2.5 by 5

2.5 divided by 5 = 0.5

You are 18 years old and need to write an email for the first time to a woman in her 40s( you can tell her age based on when she graduated college via he LinkedIn profile). How do you address her in the email? A. (First name) B. Hi(First name), C. Hi Ms.(Last name), D. Hi Mrs.(Last name) E. None of the above

Answers

E. None of the above

Its not formal to address someone with their first name, but it is also not right to assume if the woman is married or not.

Which of the following does not demonstrate a harmful consequence of increased anonymity on the Internet?
A. Users can avoid targeted discrimination in an online forum.
B.People can create avatars to interact inappropriately with other users in
a forum
C.People can post hate speech in video comments without consequences.
D.People can easily create fake profiles to impersonate others online.

Answers

Answer: A. Users can avoid targeted discrimination in an online forum

Explanation:

Despite the many advantages that comes with social media, it also had it's own disadvantages and one of such is the increase in anonymity on the Internet.

Some of the consequences of the increase in anonymity is that people can make hate speech, create fake profiles to scam others or interact inappropriately, impersonation etc.

Therefore, the correct option will be option A"Users can avoid targeted discrimination in an online forum" as this isn't a harmful consequence of increased anonymity on the Internet.

Help please not trying to fail

Answers

Answer:

B. Everywhere CFCI is not

Example of Not a computer characteristics example

Answers

Answer:

A book

A non electronic

Explanation:

Why should you delete files from your computer?


so that you will have less work to do

because only one hundred files can be saved in a directory

to increase the computer's efficiency

to improve your productivity

Answers

to increase the computer's efficiency

Explanation

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.

hope it helps!

Answer:

To increase the computer's efficiency.

Explanation:

Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.

I hope this helps :)

Good Morning! Please Help Me With This New Question!

In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.

Answers

Answer:

Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.

Explanation:

Match each feature to whether it influences audio or video quality

Answers

Answer:

Video: Frame Rate, Color depth, Resolution

Audio: Sampling Rate, Bit Depth

Explanation:

Every finger has a key it should be resting on when you are not typing
1. False
2. True

Answers

Answer:

true.

Explanation:

your point fingers should always be

your left should rest on F

your right should rest on J

the anwser is true!

Call your function from Example 1 three times with different kinds of arguments: a value, a variable, and an expression. Identify which kind of argument is which.

Answers

Answer:

Example 1:

def function(num):  

   print(num*2)

Example 2:

function(5)

num = 2

function(num)

function(3-1)

Explanation:

Given:

See attachment for complete question

To start with Example (1)

def function(num):  

   print(num*2)

Note that; the above code segment which doubles the parameter, num could have been any other code

In Example (1), the parameter is num

For example (2):

We can call the function using:

#1. A value:

function(5)

In #1, the argument is 5; a value

#2. A Variable

num = 2

function(num)

In #2, the argument is num; a variable

#3. An Expression

function(3-1)

In #3, the argument is 3-1; an expression

Which of the following file formats allows you to share and save documents without a designated application? Ο
Α. HTM
B. PDF
C. JPG
D. MP3​

Answers

Answer:

B. PDF

Explanation:

For online fax service, fax documents are usually in PDF, TIFF or plain text formats.

Answer: PDF

Explanation:

a p e x

why is it important to make sure link is from a trusted source?

Answers

Answer:

So to make sure itś true not false

Explanation:

Answer:

so you know that the information is trusted and correct. Take Wikipedia as a example people can edit any passages thingy's. Or it can cause you to have viruses and stuff

Explanation:

hope this help !!:):

Other Questions
Help me please. This is due at 12 tonight who did Mr. Wellington call to help moon in Alabama Moon I need help with the red answer 6th grade science Rock transformation lesson 3.3Preparing to Model Rock TransformationsThere are seven possible processes. How many processes do you think your rock material will go through?A. All of them. (Any rock material can transform into any other rock material.)B. Only one. (Each rock material can only be transformed once.)C. Some of them. (Each type of rock material can only go through certain processes.)D. Some of them. (Rock material can transform in any way, but my rock might not go through all of the processes.) The area of a square tile is 1.56 square feet. What is the area of a floor covered with 103 tiles? what happen when humpty dumpty fell off the wall PLEASE HELP WHOEVER ANSWERS FIRST WILL GET BRAINLIEST!!What is the equation for this linear function? Enter any answers to two decimal places Hi! I need some help, and this is due really soon! If you could answer any one of these, it would be real swell. Anyone can answer as long as there's an explanation. ( I know these might be easy for you guys but I'm having a lot of trouble) Thank you! Have a nice day :) find the slope of the line going through the point (0,3) and (0,4) Ishaan thinks the distance between Island A and Island B is 7 miles. A car starts from rest and accelerates uniformly at a rate of 2.0 meter per second squared for 4.0 seconds. During this time interval, the car traveled ________ meters. You are adding 6 + 3 2/3 using fraction strips. Explain how you rename thefraction part of the sum. Lauren's fruit salad recipe calls for 15 cups of apples for every 3 cups of grapes. How many cups of grapes are used for each cup of apples? Help me please! Create 7 words or less, summary that accurately portrays all of the rights described in the 4th amendment. Explain why. Two ice skaters approach each other at right angles. Skater A has a mass of 68.2 kg and travels in the x direction at 2.48 m/s. Skater B has a mass of 34.4 kg and is moving in the y direction at 1.18 m/s. They collide and cling together. Find the final speed of the couple. Answer in units of m/s. Nevaeh has read 168 pages of a 210- page book. What percent of the book has Nevaeh not read? 2d character or 3d what u guys pickin? Glenda and Fiero are at a restaurant eating a meal that costs $30. They have a discount coupon that gets them 10% off the cost. If they pay the waiter a tip of 8% of their bill, how much are they spending on dinner including tip? If you were an engineer of an actual roller coaster, what information would you need to know to ensure that your coaster would be safe? Which of these is a trinomial?O A. x + 2y2 - 7B. 5xyC. 2x3 - 7y3D. 2x - 7