1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dedylja [7]
3 years ago
15

The default (preset slide layouts are set up in ____ orientation.

Computers and Technology
1 answer:
Rama09 [41]3 years ago
3 0
The default is normal view orientation.
You might be interested in
At Moore High, 456 students attended the prom. This is 65 more students than
wlad13 [49]

Answer:

B-15%

Explanation:

5 0
3 years ago
Read 2 more answers
What is the defining difference between computer security and information security?
Alekssandra [29.7K]
Computer security is protection from theft or damage to their hardware, software, or information, as well as disruption or misdriection of the services they provide. As information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of information.
4 0
3 years ago
def getCharacterForward(char, key): """ Given a character char, and an integer key, the function shifts char forward `key` steps
zhenek [66]

Answer:

  1. def getCharacterForward(char, key):  
  2.    charList = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
  3.    if(len(char) > 1):
  4.        return None  
  5.    elif(not isinstance(key, int)):
  6.        return -1
  7.    else:
  8.        index = charList.find(char)
  9.        if(index + key <= 25):
  10.            return charList[index + key]
  11.        else:
  12.            return charList[(index + key)% 26]
  13. print(getCharacterForward("C", 4))
  14. print(getCharacterForward("X", 4))

Explanation:

Firstly, define a charList that includes all uppercase alphabets (Line 2). We presume this program will only handle uppercase characters.

Follow the question requirement and define necessary input validation such as checking if the char is a single character (Line 4). We can do the validation by checking if the length of the char is more than 1, if so, this is not a single character and should return None (Line 5). Next, validate the key by using isinstance function to see if this is an integer. If this is not an integer return -1 (Line 6 - 7).

Otherwise, the program will proceed to find the index of char in the charList using find method (Line 9). Next, we can add the key to index and use the result value to get forwarded character from the charList and return it as output (Line 11).

However, we need to deal a situation that the char is found at close end of the charList and the forward key steps will be out of range of alphabet list. For example the char is X and the key is 4, the four steps forward will result in out of range error. To handle this situation, we can move the last two forward steps from the starting point of the charList. So X move forward 4 will become B. We can implement this logic by having index + key modulus by 26 (Line 13).  

We can test the function will passing two sample set of arguments (Line 15 - 16) and we shall get the output as follows:

G

B

8 0
3 years ago
Which printout will result from the snippet of code?
Anna35 [415]

Answer:

These are the supplies in the list:  

[‘pencil’, ‘notebook’, ‘backpack’, ‘pen’, ‘calculator’]

Explanation:

The line return (\n) character will be in the output (so there will be a change of line), but it will NOT be visible as it would have been interpreted as a special character.

So the output will be on 2 different lines, with no \n visible.

If the command would have been: print('These are the supplies in the list:\n', supplies), with single quotes (') instead of double quotes (") then then \n would have been printed but not interpreted as a special character.  At least in most computer language.  Since we don't know of which language the question refers to, we can't be sure at 100%.

7 0
3 years ago
To begin designing a relational database, one must define the _____ by defining each table and the fields in it. primary key phy
Ugo [173]

Answer:

To begin designing a relational database, one must define the Logical structure

Explanation:

Primary key: It is a unique key which uniquely identifies each record in a table. So this does not purely defines the relationship of the table during the beginning of the design.

Foreign key: It is a key which is closely connected to the primary key. The value of the column will accept values only if the values exists in the base table.

Physical structure: This is not going to be related to the relationship of the structure since the storage management is done by Operating system.

Only the logical structure clearly defines the relationship in the database. It will have information about the list of tables and fields. It will also mark the relationship between one table and another.

8 0
4 years ago
Other questions:
  • Nathan, a civil engineer in a construction company, is one of the best performers in the organization. He is assigned challengin
    9·1 answer
  • Suppose two hosts, A and B, are separated by 15,000 kilometers and are connected by a direct link of R = 5 Mbps. Suppose the pro
    11·1 answer
  • Which of the following is NOT a view which can be chosen for a presentation?
    15·1 answer
  • Pls help is very urgent and I will mark u as brainliest plsssss​
    11·2 answers
  • You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
    12·1 answer
  • The information that’s displayed in a datalist control is defined by _____.
    10·1 answer
  • Write a program that computes the minimum, maximum, average and standard deviation of the population over time for a borough (en
    6·1 answer
  • When a new word processing software program is released, companies that might use it must consider not only the cost of buying i
    13·1 answer
  • Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect
    14·1 answer
  • Select the correct answer from the drop-down menu.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!