1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
9

The illustrations group contains all but a _______​

Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
6 0

Answer:

Shapes button

Chart button

Photo button

Pictures button

Explanation:

In Microsoft Word, the illustration group has all the following options apart from the photo button. It can be found in the Insert tab of the Word document. The illustrations group is where you make several adjustments to your Word document by inserting online and offline pictures and clip art, shapes, charts, and screen shots.

You might be interested in
Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summar
maw [93]

Answer:

Explanation below

Explanation:

Network organisations are those that is of a legal entity or independent company or a subsidiary business unit. These organisations can be an internal business unit acting as separate profit centres or a stable company that has outsourced its work.

Synthesis:

According to the articles "The top 3 network management challenges" and also "Problem Management in the Networking Environment" is that managerial issues like the problem diagnosis method itself can engage various stakeholders whose deeds need to be coordinated as well as tracked to confirm that the cost of study itself does turn into an issue along with that resolutions to problems are really discovered. An association expects its network to be  reliable, secure, flexible, expandable and cost-effective.

Relation:

Network security has had to adapt increasingly quickly, in order to keep up with the new ways that users and back-end systems work. Networks are growing not just in complexity, but also in size. As more and more functions converge onto data networks, the number of devices attached to the network grows, and therefore the number of switching and routing nodes in the network must also grow.Organizations need to attach more and more of their operations onto the data network – remote locations need connections into central sites; even locations with no staff need network links for surveillance cameras and/or environmental monitoring, and/or control of automated devices. An effective problem management is needed to handle the issues.

An effective problem management requires the integration of a number of different process groups and the ability to effect change in both the infrastructure and organizational behavior. Implementing a problem management strategy that achieves these goals needs careful planning and long-term commitment. Using external supplier relationships to make sure that the support required for both identifying problems and supporting the resolution is in place is also an integral part of the overall solution.

References: http://www.analytictech.com/mb021/virtual.htm

https://www.accyotta.com/assets/uploads/docs/Allied_-_AMF.pdf

7 0
3 years ago
Write function d2x() that takes as input a nonnegative integer n (in the standard decimal representation) and an integer x betwe
Rufina [12.5K]

Answer:

The function in Python is as follows:

def d2x(d, x):

   if d > 1 and x>1 and x<=9:

       output = ""

       while (d > 0):

           output+= str(d % x)

           d = int(d / x)

       output = output[::-1]

       return output

   else:

       return "Number/Base is out of range"

Explanation:

This defines the function

def d2x(d, x):

This checks if base and range are within range i.e. d must be positive and x between 2 and 9 (inclusive)

   if d >= 1 and x>1 and x<=9:

This initializes the output string

       output = ""

This loop is repeated until d is 0

       while (d > 0):

This gets the remainder of d/x and saves the result in output

           output+= str(d % x)

This gets the quotient of d/x

           d = int(d / x) ----- The loop ends here

This reverses the output string

       output = output[::-1]

This returns the output string

       return output

The else statement if d or x is out of range

<em>    else:</em>

<em>        return "Number/Base is out of range"</em>

<em />

4 0
3 years ago
Human centered technology often recommends a0 to computer designers and manufacturers, telling them how to make systems and the
IceJOKER [234]

Human centered technology often recommends best practices to computer designers and manufacturers, ...............

Human-Computer Interaction is a study that particularly focuses more on the design of computer technology and the interaction between humans and computers. Since the 1980s when HCI surfaced, it has become a crucial tool in popularizing the idea that the interaction between a user and a computer should resemble a human-to-human, open-ended dialogue. When HCI is done well, a human-centered approach powers the creation of products that resonates more deeply with a certain audience. This will ultimately drive engagement and growth.

6 0
3 years ago
Read 2 more answers
6. A rental car agency classifies the vehicles it rents into four categories: compact, midsize, full-size, and sport utility. Th
Tju [1.3M]

Answer:

there are no possibilities

Explanation:

A class / subclass relatonship is not going to be possible here.

This is because we have these four caegories namely

1. compact,

2. midsize,

3. full-size, and

4. sport utility

These four categories have no real unique relationship or attributes with an entity type. A minimum of a supertype has atleast one subtype as well as following the total specialization situation.

7 0
2 years ago
What must you be careful of when retrieving messages/data from mobile devices in public?
pochemuha

We must be careful of when retrieving messages/data from mobile devices in public because of Bluebugging.    It is a form of attack through the use of Bluetooth.  It is more than just Bluesnarling and Bluejacking.  It goes beyond, allowing the thieves to take control of a device.

7 0
3 years ago
Other questions:
  • Your boss calls you from his home to use the vpn connection you configured for him on his laptop. he has traditionally depended
    6·1 answer
  • An effectively distributed resume will get an interview
    12·2 answers
  • I need help to find out what is wrong with this program and my variable, "exponent" comes out as 0 in the output instead of the
    14·1 answer
  • Software that instructs the computer how to run applications and controls the display/keyboard is know as the
    8·1 answer
  • 7. The penalties for a first-time DUI charge include a fine of __________. A. up to $500 for a BAL of .08 to .15 B. $500-$1,000
    5·1 answer
  • Blank spaces or unseen control characters in a data file are referred to as
    5·2 answers
  • When Liam went to print his presentation, the boot process established the connection to the printer, sent the presentation to t
    12·1 answer
  • 4. Together, what do the divisions of the DHSMV do? A. Make sure lines are long B. Use more money than other government organiza
    14·1 answer
  • . A store offers a deposit of 6% on the cash price of $462. The deposit amount is?​
    6·1 answer
  • Identify the correct characteristics of Python tuples. Check all that apply.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!