1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
3 years ago
13

An icon in a document preset that looks like the play button on a YT video, what type of document is the preset meant to be used

for?
Film and Video

Print

Custom

Web
Computers and Technology
2 answers:
zloy xaker [14]3 years ago
8 0
The answer is film and video
Anvisha [2.4K]3 years ago
4 0

Answer:

Film and Video is the preset meant to be used for

Explanation:

An icon can be any picture even any type of application can have our own image as an icon. But though the software allows us to keep any picture as an icon, it is recommended to keep the icon so that it depicts what actually the software is.

As given in the question the icon in YT player tells us that, the application has a capability to play video format content which can be viewed both offline and online. Most of the video software has “play” symbol as the icon.

You might be interested in
What is the output for the following program?
Lelu [443]

Answer:

Output:

15

20

25

Explanation:

In first iteration value of num is 10. Condition is checked 10 is less than 21 so value of num is incremented by 5 and value 15 is printed than again condition is checked 15<21 so value of num is incremented again and 20 is printed. Again condition is checked 20<21. So 25 is printed. Then 4th time when condition is checked vakue of num is 25 and while loop condition becomes false because 25 is not less than 21 and program is terminated here.

6 0
3 years ago
To plan a pizza party, one may want to order enough pizza for everyone. Use the slicesPerPizza, slicesPerGuest, and totalGuests
attashe74 [19]

Answer:

import java.util.Scanner;

public class num6 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter number of guest");

   int totalGuest = in.nextInt();

       System.out.println("Enter number of slices per guest");

   int slicesPerGuest = in.nextInt();

       System.out.println("How many Slices are on a pizza");

   int slicesPerPizza = in.nextInt(); // Assume each pizza has 5 slices

   double pizzasNeeded;

       //Calculating the pizza Needed

    int totalslicesNeeded  = totalGuest * slicesPerGuest;

    pizzasNeeded = totalslicesNeeded/slicesPerPizza;

       System.out.println(pizzasNeeded);

   }

}

Explanation:

In this program User is required to enter values for the variables totalGuest, slicesPerGuest  and slicesPerPizza

First calculate the totalSlices needed by totalGuest * slicesPerGuest;

The calculate number of pizzas needed by totalslicesNeeded/slicesPerPizza;

4 0
3 years ago
Write a Java program that reads an 8-bit binary number from the keyboard as a string and then converts it into decimal. For exam
cestrela7 [59]

Answer:

public class Brainly

{

 public static void main(String[] args)

 {

   BinaryConverter conv = new BinaryConverter();

   String binStr = "01001101";

   System.out.print(binStr + " in decimal is "+conv.BinToDec(binStr));

 }

}

public class BinaryConverter

{

 public int BinToDec(String binStr)

 {

   int d = 0;

   while(binStr.length() > 0)

   {

     d = (d << 1) + ((binStr.charAt(0) == '1') ? 1: 0);

     binStr = binStr.substring(1);

   }

   return d;

 }

}

Explanation:

The program "eats" the string from left to right, and builds up the integer representation in variable "d" on the go. While there are digits left, it shifts the previous result to the left and sets the least signficant bit to 1 only if the corresponding string character is a 1.

5 0
3 years ago
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
3 years ago
When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor, technicians must?
Neporo4naja [7]

When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor. Technicians must recover 80% of the nameplate charge.

Compressor is a mechanical device used in many industries which has the function of increasing gas pressure by reducing its volume. The air compressor is a specific type of gas compressor.

Compressors can be characterized in a number of different ways, but are usually divided into types based on the functional method used to produce compressed air or gas. The following are common compressor types. Types covered include:

  • Pistons
  • Diaphragm
  • Helical Screw
  • Slide propeller
  • Scrolling
  • Rotary Lobe
  • Centrifugal
  • Axial

How to use an air compressor

  1. Position the Air Compressor
  2. Check the Oil Level
  3. Check the Drain Valve
  4. Set the PSI
  5. Prepare the Air Tank
  6. Connect the Air Hose
  7. Connect the Desired Tool
  8. Remove Excess Moisture

You can learn more about compressor here brainly.com/question/26581412

#SPJ4

7 0
1 year ago
Other questions:
  • Uses of keyboard as a input device
    13·2 answers
  • "Which NET command is used on a Windows PC to establish a connection to a shared directory on a remote server?"
    11·1 answer
  • The first idea for a communications network was called
    14·2 answers
  • Which quality allows programmers to modify a program as and when required
    11·2 answers
  • The ____ is a tool in versions of microsoft office starting with office 2007 that consists of tabs, which contain groups of rela
    7·1 answer
  • According to the video, what is used to create computer programs?
    12·2 answers
  • The internet in this Packet Tracer network is overly simplified and does not represent the structure and form of the real intern
    11·1 answer
  • How do I create a powershell script to make a Windows user account that is a non-admin user
    7·1 answer
  • Has replaced the need for landline telephones in many instance​
    10·1 answer
  • you want to implement a protocol on your network that allows computers to find the ip address of a host from a logical name. whi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!