1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
5

The Zoom slider will allow users to _____.

Computers and Technology
2 answers:
kari74 [83]3 years ago
8 0
The zoom slider will allow users to see more of the document up close
NeX [460]3 years ago
3 0
The Zoom slider will allow users to change the way the document appears on the screen
You might be interested in
I need this ASAP!
Elanso [62]

Answer:

b

Explanation:

4 0
4 years ago
Read 2 more answers
Write a while statement that prints all even numbers between 1 and 100 to the screen.
Marrrta [24]

Answer:

Following are the while loop in c language.

while(i<100)

   {

if(i%2==0)

{

printf("%d",i);

printf("\n");

}

++i;

 }

Explanation:

Following are the code in c language.

#include<stdio.h> // header file

int main() // main function

{

   int i=1; // variable declaration

   while(i<100) // check the condition between 1 to 100

   {

if(i%2==0) // check that number % 2 ==0

{

printf("%d,",i); // print the number

}

++i;

 }

   return 0;

}

Output:

2,4,6,8,10,12,14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48,50,52,54,56,58,60,62,64,66,68,70,72,74,76,78,80,82,84,86,88,90,92,94,96,98,

 

8 0
3 years ago
Why does Microsoft release new versions of its Windows operating system every few years?
Korolek [52]
A to keep up with advances in computer capabilities
8 0
4 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Given a line of text as input, output the number of characters excluding spaces, periods, or commas. If the input is:
enot [183]

In python 3.8:

print(len([x for x in input("Enter your text: ") if x not in "., "]))

I hope this helps!

3 0
3 years ago
Other questions:
  • In a survey of 7200 T.V. viewers, 40% said they watch network news programs. Find the margin of error for this survey if we want
    6·1 answer
  • How do I do the matrix falling code on command prompt? Need Help?!
    14·1 answer
  • Which of the following is the definition of Internet Protocol Security ( IPSec)? A remote access client/server protocol. It is a
    13·2 answers
  • When you type into a basic search engine like Google, Bing, or Yahoo!, the sites that appear at the top or on the side of the re
    7·1 answer
  • You have a small company and want to keep your cost low, but it is important your employees share data. which network would prov
    13·1 answer
  • Why should programmers use a Post Mortem Review?
    15·1 answer
  • A network technician has created a network consisting of an external internet connection, a DMZ,
    14·1 answer
  • The four compass points can be abbreviated by single-letter strings as "N", "E", "S", and "W". Write a function turn_clockwise t
    15·1 answer
  • 1. what is another name for CPU?
    6·1 answer
  • Rules used by a computer network<br> A network protocol <br> B hierchary protocal<br> C procedure
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!