1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
1 year ago
14

Provide a code example for a shape with no outline. What can you do to ensure this is the

Computers and Technology
1 answer:
nignag [31]1 year ago
6 0

A code example for a shape with no outline or one that its borders has been removed has been given below:

<h3>The Code</h3>

Dim rngShape As InlineShape

For Each rngShape In ActiveDocument.InlineShapes

   With rngShape.Range.Borders

       .OutsideLineStyle = wdLineStyleSingle

       .OutsideColorIndex = wdPink

      .OutsideLineWidth = wdLineWidth300pt

   End With

Next rngShape

Read more about shapes and borders here:

brainly.com/question/14400252

#SPJ1

You might be interested in
What do you call the processing of converting an image to binary?
frutty [35]

Question

What do you call the processing of converting an image to binary?

Answer:

Thresholding Is the Answer!

Explanation:

In thresholding, we convert an image from color or grayscale into a binary image, i.e., one that is simply black and white.

Hope this helps!

6 0
3 years ago
Read 2 more answers
Data is communicated through various input devices true or false​
kipiarov [429]
I would believe this is true if the following are also true.

Input devices are things like keyboards, mouses, buttons, e.c.t.

If that is true then I would believe it to be true due to multiple inputs are being used to communicate.
3 0
3 years ago
Write a program that simulates rolling one die using the following steps: 1. Prompt the user for the number of sides on the die.
Mashcka [7]

Answer:

The program to the given question can be given as:

Program:

//import package.

import java.util.*;                    

//define class.

public class Main                    

{

 public static void main(String ar[])  //define main method.  

 {

Scanner  ob = new Scanner(System.in);     //creating scanner class object.

   Random ran = new Random();                 //creating random class object.

   int roll1,roll2,roll3,number,total=0;          //define variable.

   float avg=0;

   System.out.print("Enter the sides= ");           //print message.

   number = scanner.nextInt();                 //input number by user.

   roll1 = ran.nextInt(number++);         //using random function.

   roll2 = ran.nextInt(number++);

   roll3 = ran.nextInt(number++);

   System.out.print("First roll= ");           //print message

   System.out.println(roll1);               //print value.

   System.out.print("Second roll= ");

   System.out.println(roll2);

   System.out.print("Third roll= ");

   System.out.println(roll3);

   System.out.print("total roll= ");

   total=roll1+roll2+roll3;                            //add all number.

   System.out.println(total);

   System.out.print("Average roll= ");                      

   avg=total/3;                                 //Average of the number.

   System.out.println(avg);

 }

}

Output:

Enter the sides= 4

First roll= 2

Second roll= 3

Third roll= 5

total roll= 10

Average roll= 3.0

Explanation:

In the above program first, we import the package form the user input and random number. In java, there are many packages but we use only the util package because in that package both the class like scanner class and random class are inbuilt. Then we declare the class that name is Main in that class we define the main function. In the main function, we create both class object (scanner class and random class). Then we take input a number from the user and pass into the random function. The random function is used to give a unique number and we pass the number into the random function that is increasing by post-increment operator i.e (X++). Then we print all the rolls and total by add all the roll and at the last, we print an average of it.

7 0
3 years ago
Question 2 If you are deploying applications in your Pods that need persistent storage, which controller type should you use
Ugo [173]

Answer:

"StatefulSet" is the right response.

Explanation:

StatefulSet seems to be an API teaching load instrument that is used to start managing stateful implementations.

  • Maintains or controls the integration as well as balancing of such a series of Pods but mostly generates a sort of assurance on the placing an order but rather distinctiveness of certain Pods.
  • Like some kind of Implementation, a StatefulSet did maintain pods that have been predicated on the same type of receptacle.
6 0
3 years ago
how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
juin [17]

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
5 0
3 years ago
Other questions:
  • based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
    8·1 answer
  • Each phase of the system development life cycle is accomplished as a discrete, separate step. (1 point) (Points : 1.5) True
    7·1 answer
  • What device copies system files
    14·1 answer
  • Bailey wants to add file protection to a document she has created. She wants to restrict users from changing the content she has
    7·2 answers
  • What is a hobbyist for engineering
    7·1 answer
  • Python: Write a program that asks the user how many Fibonnaci numbers to generate and then generates them.
    10·1 answer
  • Write a script that calculates the common factors between 8 and 24. To find a common factor, you can use the modulo operator (%)
    14·1 answer
  • What is a device that is around the same size as a credit card, containing embedded technologies that can store information and
    10·1 answer
  • Language is PYTHON
    6·1 answer
  • Voice of the customer, Social Media Analytics, churn analysis, survey analysis, and market research analytics are more likely to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!