1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Greeley [361]
3 years ago
11

Adobe Indesign project 4 museum indesign file. The instructions are 70 pages long I cant sit still long enough to read them

Computers and Technology
1 answer:
Alchen [17]3 years ago
4 0

Answer:

? Read on to learn about the possible reasons and resolutions. ... Check whether you have the latest update installed for InDesign. ... InDesign cannot open the file when your system does not have enough memory ... Copy page elements into a new document.

Explanation:

You might be interested in
With the help of technology students will benefit greatly from studying by themselves at home. Do you agree or disagree with the
cestrela7 [59]
I disagree because when kids are home alone, and you think they are studying they might not be and they will be playing games on the computer.
6 0
3 years ago
Read 2 more answers
Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather
soldi70 [24.7K]

Answer:

Group

Explanation:

A folder assigned to a single user can only be accessed by a single person, to get many users access a folder windows administrator shares a folder to a workgroup. using the simple steps below.

Login as the admin of the system, Right-click on the folder you want to give permission on, after clicking on properties, click on security, add user or group after clicking the edit. and your folder is shared to a group and all users in the group have access to it.

6 0
3 years ago
Which one of these components is a part of the central processing unit (cpu)of a computer
katovenus [111]

Answer:

Control Unit

Explanation:

4 0
3 years ago
The proxy statement issued by a corporation is a requirement of: a. The Securities & Exchange Commission (SEC) b. The Financ
8090 [49]

Answer:

The answer is "Option a".

Explanation:

A proxy statement is a file, that provides security and exchange in data commission, that is a powerful tool for holders, as it tells employees, that together with the instructions to do, and other choices, which could be listed as follows are wrong:

  • In option b, It is used in accounting guidelines, that's why it is wrong.
  • In option c, It requires, that's why it is incorrect.
  • In option d, It is wrong because it doesn't committee.
8 0
3 years ago
Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enou
Savatey [412]

Answer:

The solution in Python is as follows:

class myClass:

    def doubleUp(self,doubleList):

         doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]

       

newlist =  []

n = int(input("Number of elements: "))

for i in range(n):

    num = int(input(": "))

    newlist.append(num)

   

list = myClass()

list.doubleUp(newlist)

print(newlist)

Explanation:

Start by creating a class

The solution in Python is as follows:

class myClass:

Then define the method doubleUp

    def doubleUp(self,doubleList):

The duplicates is done here

         doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]

The program main begins here

This defines an empty list        

newlist =  []

This prompts user for number of elements

n = int(input("Number of elements: "))

The following iteration get the elements of the list

<em>for i in range(n):</em>

<em>     num = int(input(": "))</em>

<em>     newlist.append(num)</em>

   

This defines the instance of the class

list = myClass()

This calls the method

list.doubleUp(newlist)

Lastly, this prints the duplicate list

print(newlist)

6 0
3 years ago
Other questions:
  • A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
    15·2 answers
  • Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
    7·1 answer
  • A merge is _____.
    5·2 answers
  • What best describes deflation?
    9·2 answers
  • Describe two circumstances where access services might get implemented by organizations please.​
    9·1 answer
  • Choose the term that best completes each sentence.
    6·2 answers
  • Imma say something random...
    13·2 answers
  • For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.
    5·1 answer
  • Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original stri
    15·1 answer
  • A(n) Blank______ database management system allows users to create, read, update, and delete data in a relational database. Mult
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!