1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
14

Mario wants to make his document accessible to technology users. He first needs to access the Accessibility Checker. He can do t

his by clicking the _tab. Next, he needs to click the _option. Then, he needs to click the _ icon.
Computers and Technology
1 answer:
Vlada [557]3 years ago
8 0

Answer: see guidelines in explanation

Explanation:

For Mario to make his document accessible to technology assistants, he needs to do the following;

-Access the accessibility checker by clicking the FileHomeReview tab

-Click the InfoNewOpen option

-Click the Check for IssuesManageDocumentProtect, the document icon

-Then, click Check accessibility option, the accessibility pane will open.

-He needs to read the information about errors, warning, tips and steps to take to make his document accessible to other users.

You might be interested in
Can i edit my name on this app?
Lerok [7]
Yes just go to your profile and push on edit and you should be able to edit what ever you want name picture everything
5 0
3 years ago
4.2 lesson practice last one plzs help
yan [13]

The numbers 5, 7, 9, and 11 are the output.

I hope this helps!

7 0
3 years ago
Read 2 more answers
Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
Volgvan

Question:

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.

Answer:

Written in Python

listlent = int(input("Length of List: "))

mylist = []

mylist.append(listlent)

for i in range(listlent):

    num = int(input(": "))

    mylist.append(num)

<em>    </em>

evens = 0

odds = 0

for i in range(1,listlent+1):

    if mylist[i]%2==0:

         evens=evens+1

    else:

         odds=odds+1

       

if(evens == 0 and odds != 0):

    print("All Odds")

elif(evens != 0 and odds == 0):

    print("All Even")

else:

    print("Neither")

Explanation:

This prompts user for length of the list

listlent = int(input("Length of List: "))

This initializes an empty list

mylist = []

The following iteration reads the list items from the user

<em>mylist.append(listlent)</em>

<em>for i in range(listlent):</em>

<em>     num = int(input(": "))</em>

<em>     mylist.append(num)</em>

   

The next two lines initialize even and odd to 0, respectively

<em>evens = 0</em>

<em>odds = 0</em>

<em />

The following iteration if a list item is even or odd

<em>for i in range(1,listlent+1):</em>

<em>     if mylist[i]%2==0:</em>

<em>          evens=evens+1</em>

<em>     else:</em>

<em>          odds=odds+1</em>

This checks and prints if all list items is odd        

<em>if(evens == 0 and odds != 0):</em>

<em>     print("All Odds")</em>

This checks and prints if all list items is even        

<em>elif(evens != 0 and odds == 0):</em>

<em>     print("All Even")</em>

This checks and prints if all list items is neither even nor odd

<em>else:</em>

<em>     print("Neither")</em>

4 0
3 years ago
In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
fenix001 [56]

Answer:

 Network administrator use the open system interconnection model to isolate the network problem as, the network administrator can easily find the problem in the system.

Network administrator regularly depicts issues by the layer number and in many cases the network problem required the network administrator to isolate the issue in which layer the maximum number of issue occurred.

By using the OSI layer, we can easily add protocols to its higher to lower layers without any type of interruption.

3 0
3 years ago
What are 7 good facts on Computer Viruses?
tia_tia [17]
<u><em>Viruses,A tiny program that hacks a computer </em></u>
<u><em>Steals information and personal data.It can disable your laptop.Viruses can be found in malicious sites.Criminals share these viruses to steal data from others.With a firewall,Hackers will be detected.</em></u>
<u><em> </em></u>

<u><em>The general consensus is that there are no good viruses.</em></u>



4 0
3 years ago
Other questions:
  • What would be some long- term goals.
    11·1 answer
  • The utilization of a subset of the performance equation as a performance metric is a pitfall. To illustrate this, assume the fol
    13·1 answer
  • True or false? when intel places a sticker on computers showing their chip is inside, they are demonstrating their visible value
    7·1 answer
  • BOTH INTERNATIONAL &amp; INLAND Which procedure(s) shall be used to determine risk of collision?
    14·1 answer
  • (Statistics) Write a program that includes two functions named calcavg() and variance(). The calcavg() function should calculate
    10·1 answer
  • . Business-to-business integration (B2Bi) is vital for efficient and accurate flow of data across internal ISs and external busi
    11·1 answer
  • What can you do to manually exclude an individual from a recipient list?
    6·1 answer
  • Which of the following are valid variable names? Select 2 options.
    14·1 answer
  • Which of the following is a type of input device?
    5·1 answer
  • Name any three areas of of application of excel.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!