you have a computer that runs windows 10. you use windows backup and restore to create a backup image. you need to perform a complete restore of the computer. what are the possible ways to begin the restore?

Answers

Answer 1

Select Control Panel > System and Maintenance > Backup and Restore by performing a right-click on the Start button. Select Create a system image in the left pane, and then go through the wizard's instructions.

A system image backup on Windows 10 is a dated feature that enables you to make a "full backup" to a USB drive. In other words, a full backup is a copy of the entire system disk and secondary drives (if appropriate), which includes all of the files and settings necessary for the installation of Windows as well as all apps, settings, and files. You can restore Windows 10 in the event of a hard drive failure by using the System Image Recovery tool from the Recovery Drive.

Learn more about system here-

https://brainly.com/question/14253652

#SPJ4


Related Questions

how do the variacne of x and the varaince of g differ ms hall gave her class a 10 question multiple

Answers

Both formulas have their applications. The first illustrates how a random variable's variance, which is defined similarly, relates to other variables (but with n as denominator). The second method can be used to determine the sample variance directly without first determining the average x.

What variance of x and the variance of g differ ms hall?

In other words, the variance is the second central moment of or the second moment of about the mean = E (X). In general, the mean square error can alternatively be thought of as the second moment of about an R if the constant is used as an approximation of.

Once you've done that, square the numbers and take the average. A set of numbers with a range of one to ten, for instance, would have a mean of 5.5.

Therefore, The average of the squared deviations from the mean is referred to as a variance. Calculate the difference between each data point and the mean to determine the variance.

Learn more about variance here:

https://brainly.com/question/13558857

#SPJ1

In python, an infinite loop usually occurs when the computer accesses an incorrect memory address.a. trueb. false

Answers

Answer:

a. true

Explanation:

assuming that all processor clock speeds are identical, executing a given software algorithm on a multicore processor is always faster than executing the same algorithm on a single-core processor. group of answer choices true false

Answers

It is false that assuming that all processor clock speeds are identical, executing a given software algorithm on a multicore processor is always faster than executing the same algorithm on a single-core processor.

A multi-core processor is an integrated circuit having two or more processing cores attached for increased performance and reduced power consumption. These processors also enable the more efficient multithreading and parallel processing of various jobs. Comparable to adding many distinct CPUs in a computer, a dual-core setup. However, because they are plugged into the same socket, the connection between the two CPUs is faster.

Using multicore processors or microprocessors is one technique to boost processor performance while remaining within the realistic constraints of semiconductor design and manufacturing. Utilizing several cores also ensures secure operation in industries like heat generation.

Imagine it as a road with automobiles on it. Even though every car is a processor, they all travel on the same roads and must abide by the same traffic laws. While having more cars allows for faster movement of goods and people, they also add to congestion and other problems.

To learn more about multicore processors click here:

brainly.com/question/14442448

#SPJ4

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

Answers

Circuit switching uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

What is circuit switching?

Circuit switching is a method of switching in which an end-to-end path is created between two stations in the network before data transmission begins. The circuit switching method has a fixed data rate and both must operate at that fixed rate. Switching is the simplest method of data transmission in which a special physical connection is established between two individual senders and receivers. To establish this particular connection, a group of switches is connected by a physical link.

Advantages of Circuit Switching:

Dedicated transmission channel is established between computers, providing guaranteed data rates. No delay in data flow due to dedicated line.

Disadvantages of Circuit Switching:

It takes a long time to establish a connection.More bandwidth is required to configure dedicated channels.It cannot be used to transmit other data even when the channel is idle because the connection is reserved for switching.

Lean more about circuit switching https://brainly.com/question/29668380

#SPJ4

How does mandatory reporting function in WA?

Answers

If you are, you are required by law to notify the Washington State Department of Social and Health Services right away about any abuse, abandonment, neglect, or financial exploitation of a vulnerable adult.

Mandatory reporters are obligated to file reports when a physical injury or sexual abuse results in serious harm. They have the same option as everyone else to decide whether to disclose any additional severe injury. Mandatory reporting is the legal requirement for certain kinds of persons to notify the appropriate authorities when they suspect child abuse or neglect. All Australian states have mandatory reporting laws that outline the circumstances under which a person, such as a nurse, is obligated by law to report something to the local child protection agency.

Learn more about services here-

https://brainly.com/question/18000293

#SPJ4

data compression encoding systems such as mp3 rely on analysis of the recording to find sounds and remove them from the bit-stream?

Answers

Yes, data compression encoding systems such as MP3 rely on analysis of the recording to identify and remove redundant or unnecessary information from the data stream.

Music and other audio files are frequently stored and transmitted using the lossy audio compression standard MP3. It operates by examining the audio signal to find patterns and traits that can be used to compress the amount of data while maintaining the audio's quality.

Identifying and removing noises that are inaudible to the human ear or that are obscured by stronger sounds is one of the fundamental methods employed by MP3 and other data compression systems. This can include noises that are audibly inaudible to humans, or sounds that are present but at low volume and are overpowered by other sounds.
Predictive coding, which predicts and encodes future samples based on the properties of the audio signal, and lossless compression, which shrinks the amount of the data stream without sacrificing quality, are two further methods employed by data compression systems.

To know more about Encoding kindly visit
https://brainly.com/question/13963375

#SPJ4

the function below takes two string parameters: sentence is a string containing a series of words separated by whitespace and letter is a string containing a single lower case letter. it is supposed to return a string containing one of the words in sentence that contains letter (in either upper case or lower case) while retaining the original capitalization. can you fix it?

Answers

print(extract_word_with_given_letter('hello how are you?', 'w')).

How do function types work?

A function type, also known as an arrow type or perhaps an exponential type, seems to be the type of variable as well as parameter that a function has or may be assigned to, as well as the argument or output form of a higher-order functions that accepts or returns a function.

Briefing:

def extract_word_with_given_letter(sentence, letter):

  words = sentence.split()

  for word in words:

      if letter in word.lower():

          return word

  return ""

Testing the function here.

ignore/remove the code below if not required

print(extract_word_with_given_letter('hello HOW are you?', 'w'))

print(extract_word_with_given_letter('hello how are you?', 'w'))

To know more about function visit:

https://brainly.com/question/13733551

#SPJ4

What does authoritarian mean? ruling authority is granted to individuals by the government ruling by aristocracy requiring acknowledgment of authorship requiring strict obedience to an authority, such as a dictator

Answers

Authoritarian mean requiring strict obedience to an authority, such as a dictator.

What does the word "authoritarian" actually mean?

Authoritarianism is the idea that everyone must submit to the will of the majority without question. Authoritarianism in politics refers to any political system that concentrates power in the hands of a ruler or a small elite that is not legally obligated to answer to the general populace. All three members of the Axis—Nazi Germany, Fascist Italy, and Imperial Japan—had totalitarian or autocratic regimes, and two of the three were succeeded by regimes with democratic constitutions. An alliance of democratic nations and (later) the Soviet Union were known as the Allies.

Political repression and the elimination of possible rivals keep highly concentrated and centralized authority in place under an authoritarian regime.

Learn more about the Authoritarian here: https://brainly.com/question/3710034

#SPJ1

What are types of security requirements?

Answers

Functional requirements, nonfunctional requirements, and derived requirements security requirements are the different categories.

A function is defined by a functional requirement in software engineering and systems engineering, where a function is defined as a definition of behavior's between inputs and outputs.

Functional requirements specify what a system is expected to do and can include computations, technical details, data processing and manipulation, among other functions.

Use cases, which are used to define all the ways the system uses the functional requirements, are known as behavioral requirements. Non-functional requirements (sometimes referred to as "quality requirements") support functional requirements by placing restrictions on the design or execution (such as performance requirements, security, or reliability). Functional requirements are typically expressed as "system must do," whereas non-functional needs are articulated as "system shall be."

Learn more about Functional requirements here:

https://brainly.com/question/14953266

#SPJ4

what technique has been used to protect copyrighted material by inserting digital watermarks into a file?

Answers

Answer:

Steganography

Explanation:

this helps, for example, operating systems, to be given to consumers digitally without the need of a disk and the little slip of paper stating all the legal things nobody reads

Nicole wants to create a database to collect information about videos in her video rental store. She would like to use the database to look up movies by rating, actors, producer, and title. She would also like to retrieve the movies that are in stock. What fields should she have in her database?.

Answers

The fields that Nicole must have in her database is title, producer, actor, rating, and in stock.

What is field?

Field is a set of data in database system with same data type. Field usually referred as a column or attribute but it also can hold another data like pictures, movie clips, etc.

Since, Nicole only want to look up movies by rating, actors, producer, title, and in stock movies. That all can be used as fields in her database with the appropriate data type for each field, also if Nicole want her also put more field for one category like actor 1, actor 2, actor 3, or rating 1, rating 2, rating 3.

Learn more about database here:

brainly.com/question/26096799

#SPJ4

how can technology help u communicate better

Answers

The way that technology can help a person to communicate better is by:

Better InteractionReliability of informationSpeed in information delevery, etc.

What is the ways that tech has helped man?

Unprecedented developments have been brought about by technology in this globe. The days of commuting between locations on camels and horses are long gone. The development of the automobile altered how people thought about transportation.

Technology is a progressive thing because it is unstable. It never stops evolving and moving quickly. Instantaneous communication with anyone, anywhere in the globe, is now a possibility. Globalization has reached its zenith, and no one knows what lies ahead. However, technology has greatly benefited the communication industry in a variety of ways.

Therefore, through the ability to collaborate closely with clients who may even be on the other side of the world, technology has an impact on communication. Using programs like Zoom, Microsoft Teams, and Go ogle Meet, it is feasible to stay in touch with clients while working remotely.

Learn more about technology from

https://brainly.com/question/1150014
#SPJ1

2 - identifiez fill in the blanks activity 2 attempts left late due november 8th 11:59 pm instructions you will hear a series of words. write the word that does not belong in each series.

Answers

Economic sanctions programs are generally administered and enforced by the Office of Foreign Assets Control against nations and specialized categories of people, such as terrorists and drug traffickers.

To achieve aims in foreign policy and national security, sanctions can be either sweeping or selective, using the asset freezing and trade restrictions. Sanctions management has a long history at the Treasury Department. Gallatin, Secretary of the Treasury, oversaw the sanctions against Great Britain for harassing American seamen beginning before the War of 1812. Congress passed a statute during the Civil War that forbade trade with the Confederacy, demanded the loss of products used in such trade, and established a licensing system governed by Treasury-managed rules and regulations.

Learn more about program here-

https://brainly.com/question/14618533

#SPJ4

when a superclass variable refers to a subclass object and a method is called on that object, the proper implementation is determined at execution time. what is the process of determining the correct method to call? late binding. early binding. on-time binding. non-binding.

Answers

An interface provides a default implementation for a collection of methods that can be invoked on an object.

When a method is called on a subclass object that is referenced by a superclass variable, the correct implementation is chosen at execution time. Implementing an interface in Java is done using the implements keyword. An interface is a particular kind of class that only has abstract methods and fully implements an abstraction. If a class doesn't override the interface's default concrete implementations, the class receives them when it implements the interface. In Java SE 8, default methods—public methods with actual implementations that describe how an operation should be carried out—may be declared in an interface.

Learn more about method here-

https://brainly.com/question/18088056

#SPJ4

Which is an example of proprietary operating system?

Answers

Microsoft Windows,Adobe Flash Player, the Java  runtime environment  from Oracle, iTunes, Adobe Photoshop, WinRAR,are some examples of proprietary software.

As a result, it can be inferred from the information provided that Microsoft Windows is an example of proprietary system software. Typically, proprietary OSs or closed source OSs are created, developed, and marketed by a specific firm and are not intended to be modified or customized by consumers. Linux is a free, open-source operating system distributed under the GNU General Public License, while proprietary operating systems are typically run on name-brand vertically integrated switches. Windows is a collection of several proprietary graphical operating system families created and marketed by Microsoft (GPL). Anyone may use the source code and run, examine, edit, and distribute it, as well as sell copies of their modified versions, provided they do so in accordance with the same license.

Learn more about Microsoft Windows here:

https://brainly.com/question/1092651

#SPJ4

which type of lock prevents all types of access to the locked resource? select one: a. exclusive lock b. shared lock c. two-phased lock d. explicit lock e. implicit lock

Answers

An exclusive lock prevents all types of access to the locked resource. An exclusive lock is one that only allows one user to access a resource. Only after the resource's exclusive lock has been released can another user access it.

Exclusive locking occasionally turns out to be an overly hard and expensive locking mechanism. For instance, a lock timeout or the administrator's assistance would be needed to remove the exclusive lock in the event of a program crash or the lock owner forgetting to unlock the resource.

Owners of shared locks are free to coordinate their efforts using any other means of communication. The purpose of a shared lock is to inform collaborators of any potential outside contributors to a resource.

Multiple users can obtain a lock to a resource via a shared lock. Any user with the necessary access can therefore obtain the lock.

To learn more about exclusive lock click here:

brainly.com/question/28231567

#SPJ4

a computer network that is restricted to the organization it serves; an internal internet.

Answers

The given statement is true because a computer network that is restricted to the organization serves as an internal internet.

An internal internet also known as intranet is a local network that only is only accessible to people within the organization. The intranet is the most restricted network. It can be stated as the intranet is the network for sharing information, collaboration tools, operational systems, easier communication, and other computing services within a setup of the organization, typically to the exclusion of access by outsiders. Thus, it is said to be as the internal internet or intranet is the restricted netwrok to be used by the organization only.

"

Complete question:

a computer network that is restricted to the organization it serves; an internal internet.

True

False

"

You can learn more about intranet at

https://brainly.com/question/13139335

#SPJ4

Why is mandatory reporting important in aged care?

Answers

Elder abuse can result in serious mental and physical harm, even death, if it is not reported.

When elder abuse is reported, law enforcement and the APS have a chance to look into the allegations. Additionally, it enables lawyers to offer initial assistance to hurt individuals. Mandated reporters are obligated by law to file reports of alleged elder or child abuse as quickly as is reasonably possible. The reporting of suspected cases of abuse by mandated reporters is completely exempt from civil and criminal penalties. All populations are incredibly susceptible to abuse and neglect, so as a healthcare provider, you must be aware of the typical symptoms, indications, and symbols. Nursing professionals are obligated to report any allegations of abuse.

Learn more about provider here-

https://brainly.com/question/18000293

#SPJ4

in 1998, an act was passed by congress that established a moratorium on taxing isps on the services they provide to computer users. this act was called the:

Answers

In 1998, an act was passed by congress that established a moratorium on taxing ISPs on the services they provide to computer users, this act was called the: Internet Tax Freedom Act.

What is the Congress?

The Congress is sometimes referred to as Senate and it can be defined as a deliberative assembly or council of elected citizens found in the upper chamber or house of a bicameral legislature.

This ultimately implies that, Congress is a federal legislative arm of government of the United States of America, which is saddled with the responsibility of oversight functions, enacting and passing federal laws, acts, and bills for the citizens, with the steps enumerated above.

On the 1st of October 1998, the United States Congress passed the Internet Tax Freedom Act and it was an act which typically established a moratorium on taxing internet service providers (ISPs) on the services that they provide to computer users in the United States of America.

Read more on Congress here: brainly.com/question/325850

#SPJ1

you need to allow your network technician to view the rms logs and reports, but no additional permissions should be granted to this technician. what can you do?

Answers

Delegate the AD RMS Auditor role you need to allow your network technician to view the rms logs and reports, but no additional permissions should be granted to this technician.

Three distinct administrative roles are provided by Active Directory Rights Management Services (AD RMS), which can be used to more effectively assign control over your AD RMS infrastructure. When you first install AD RMS in your business, these roles are generated.

The functionalities in the AD RMS console are completely accessible to the AD RMS Enterprise Administrators group. When you install AD RMS, the user account that performed the installation is immediately assigned to this group. You should only allow people that need access to all AD RMS settings to join this group.

Rights policy templates can be made and managed by the AD RMS Templates Administrators group. Although it is created during the installation of AD RMS, no users are initially added to it. Keep in mind that having the ability to develop and administer templates might, in turn, grant you access to any type of protected content. Therefore, only users with whom you have a high level of confidence should be part of this group.

To learn more about Network click here:

brainly.com/question/24279473

#SPJ4

your network has a single domain named southsim. dns data for the domain is stored on the following servers: dns1 holds the primary zone for southsim. dns2 and dns3 hold secondary zones for southsim. all three dns servers are located on domain controllers. the dns zone for the domain is configured to allow dynamic updates. you want to allow client computers to send dns updates to any of the three servers and allow any of the three servers to update dns records in the zone. what should you do?

Answers

Change the DNS zone's zone type on each of the three servers to Active Directory-integrated.

What do the DNS terms primary zone and secondary zone mean?

Primary DNS servers manage DNS requests for a domain and hold all pertinent resource records. In contrast, read-only zone file copies are present on secondary DNS servers and cannot be updated.

How can I remove a DNS server IP address?

Click the Delete DNS resource record option when you right-click the records you've chosen. The dialog box for deleting DNS resource records appears. Check to make sure the right DNS server was chosen. If it isn't, select the server from which you want to remove the resource entries by clicking DNS server and choosing it.

to know more about DNS servers here:

brainly.com/question/28321805

#SPJ4

true or false: dijkstra's algorithm will correctly generate a shortest paths tree for some graphs that have negative edge weights.

Answers

It is false to say that Dijkstra's algorithm will correctly generate a shortest paths tree for some graphs that have negative edge weights. For Dijkstra's algorithm, all edge weights must be positive.

This occurs because the algorithm only modifies the response for the queued nodes during each iteration. Therefore, even if a shorter path exists than the previous one, Dijkstra's algorithm does not go back and reevaluate a node after it labels it as visited. Therefore, in networks with negative edge weights, Dijkstra's algorithm is unsuccessful.

In graphs with nonnegative weights, Dijkstra devised a greedy search method based on the optimality principle to determine the shortest (cheapest) path. According to this definition, an optimal path has the property that, regardless of the initial conditions and control variables (choices) made over a certain initial period, the control (or decision variables) made over the subsequent period must be optimal for the subsequent problem, with the node resulting from the early decisions assumed to be the initial condition.

For each weighted, directed graph with positive weights, Dijkstra's algorithm finds the shortest path. It can handle cycles-based graphs, although negative weights will result in inaccurate results for this approach.

To learn more about Dijkstra's algorithm click here:

brainly.com/question/29855934

#SPJ4



you have a laptop running windows 10. user account control (uac) has been disabled. how would you re-enable uac on the laptop? (select two. each choice is complete solution.)

Answers

You have a laptop running Windows 10. User Account Control (UAC) has been disabled. In the Control Panel, select System and Security, then Security and Maintenance.

In the Control Panel, select User Accounts, then User Accounts.

What does User Account Control do?

User Account Control (UAC) prevents malware from damaging your PC and helps businesses provide a more managed desktop. With UAC, apps and tasks always run in the security context of a non-administrator account unless an administrator explicitly grants administrator-level access to the system.

Where is User Account Control?

Check if UAC is enabled in the Start menu, and click Control Panel. From there, click User Accounts. You will see an option to Turn User Account Control on or off. Click this and you'll see a checkbox to enable User Account Control. Under Security Settings, select Local Policies > Security Options.

Learn more about User account control:

brainly.com/question/14451932

#SPJ4

janice is in the market for a new smartphone when she sees an ad online touting the new features of the latest samsung model. she had not thought about buying a samsung and doesn’t know how much it costs, but the ad made her want to research this type of smartphone further. what feature of advertising does her response exemplify?

Answers

The promising Samsung marketing strategy focuses on promoting its smartphones and appealing to the audience by leveraging the power of exceptional marketing campaigns. Sponsorships, social media ads, and online advertising all helped to strengthen the brand.

What is Marketing strategy?

A marketing strategy is a company's overall game plan for reaching out to potential customers and converting them into paying customers for their products or services. A marketing strategy includes the value proposition of the company, key brand messaging, data on target customer demographics, and other high-level elements.

A comprehensive marketing strategy addresses all four Ps of marketing: product, price, place, and promotion.

To know more about online advertising, visit: https://brainly.com/question/29228561

#SPJ4

quick search lets you refine or narrow your search results using links under tweak my results. why might you use this tool to limit your search results by creation date?

Answers

The quick search tool limits your search results by creation date so that you can focus on recent material available. You may get better results by limiting the area that a search engine will search in order to reduce the number of results.

The ability to filter searches by the creation dates of online pages is available on several search engines. This is a highly helpful feature for folks who plan to conduct ongoing studies on a certain subject because it allows them to restrict the results to sites added since their previous search.

Your search results are reduced to more recent material. It may discover a page that is unimportant or out of the way and only index it once. This obscure, never-updated page is still appearing in your search results two years later. Only the most recent matches will be returned if you restrict your search to a more recent date period. It also aids in avoiding current happenings. It enables you to evaluate outcomes across time.

A count like this isn't perfect, of course; indexing dates alter over time. But in general, it functions well enough that trends may be seen.

To learn more about Quick search click here:

brainly.com/question/15683160

#SPJ4

there is a linux command called uname. when executed, the uname command will output important information about the system. which uname command option will output only the kernel version?

Answers

Linux command Uname has numerous other settings that enable us to isolate only the data we require. The -r or --kernel-release option, which solely displays details on the kernel release, is one such instance.

      $ uname -r

      output: 5.8.0-59-generic      

The name of the operating system you are using is printed on standard output by the uname command. The machine ID number is made up of 12 characters and is formatted as xxyyyyyymmss. The system is shown by the xx positions, which are always zero. The system's unique ID number can be found in the yyyyy positions.

Syntax: uname [OPTION]

Use the -v or --kernel-version option to print information about the kernel version.

      $ uname -v

      #88~20.05.1-Ubuntu SMP Thu Jan 19 12:00:10 UTC 2022

To learn more about Linux click here:

brainly.com/question/28591010

#SPJ4

a slide contains objects with multiple animations applied. how do you change the order of the animations?

Answers

You should be able to click and hold and drag with your mouse

You may modify the sequence of animations on a presentation in Microsoft PowerPoint by doing the steps in the following solution.

What is Microsoft PowerPoint?

Microsoft PowerPoint is a program to construct slideshows.

In Microsoft PowerPoint, you can change the order of animations on a slide by following these steps:

Select the object that has the animations applied to it.

Go to the "Animations" tab in the ribbon.

In the "Animation Pane," select the animation that you want to move.

Use the "Move Earlier" or "Move Later" buttons in the "Animation Pane" to change the order of the animation.

Alternatively, you can right-click on the animation in the "Animation Pane" and select "Move Earlier" or "Move Later" from the context menu.

Keep in mind that the order of the animations in the "Animation Pane" determines the order in which the animations will be played. So, if you want to change the order of the animations, make sure to rearrange them in the "Animation Pane" accordingly.

Note: The exact steps may vary depending on the version of PowerPoint you are using.

To learn more about Microsoft PowerPoint click here:

https://brainly.com/question/10444759

#SPJ12

a data source can be shared among database users as long as they have the same dbms driver and privilege to access the database. select one: a. file b. common c. shared d. system e. user

Answers

A File data source can be shared among database users as long as they have the same dbms driver and privilege to access the database. They are typically more adaptable to use than machine data sources since they store connection information in a text file rather than the Windows registry.

So that your program can rely on consistent and accurate connection information across all of the machines it uses, you can, for instance, copy a file data source to any computer that has the appropriate ODBC driver. Alternatively, you can put the file data source on a single server, distribute it across numerous machines connected to the network, and conveniently manage the connection information in a single place.

A file data source or also known as DSN files, may also not be able to be shared. A machine data source is referenced by an unshareable file data source that is contained on a single computer. You can access existing machine data sources from file data sources by using unshareable file data sources.

To learn more about database click here:

brainly.com/question/28391263

#SPJ4

you are the network administrator for your company. all computers are joined to a single active directory domain. several computers store sensitive information. you are configuring security settings that will be distributed to all computers on your network. you want to identify attempts to break into a computer by having the computer that denies the authentication attempt note the failed attempt in its security database. how can you create a policy that meets these requirements?

Answers

policy that meets these requirement Select Failure for Audit account logon events

Administrators use what to configure control and manage users and computers.?

Group Policy is a hierarchical infrastructure that enables a network administrator in charge of Micro soft's Active Directory to implement specific user and computer configurations. Group Policy is primarily a security tool, and can be used to apply security settings to users and computers.

What type of group is typically used to manage resources in a domain?

Domain local groups should be used to manage resource permissions because they can be applied anywhere in the domain. A domain local group can include members of any type in the domain and members from trusted domains.

Which of the following does an Active Directory client use to locate objects in another domain?

Active Directory stores location information on objects in the database, but it uses the Domain Name System (DNS) to locate domain controllers. Every domain in Active Directory has a DNS domain name, and every joined computer has a DNS name within that same domain.

learn more about DNS Visit:

brainly.com/question/17163861

#SPJ4

100 POINTS!!!
Type the correct answer in the box. Spell all words correctly. Michael works for a graphic design firm. He is creating an informative poster. He needs to add a great deal of text in the poster. What tool will help him format the text? Michael will use___________ a tool to help format the text for creating an informative poster.​

Answers

Answer: I Think The Answer is Format Tool

Explanation: If its wrong I Am Sorry;}

Other Questions
Which of the following elements would be best to use when attempting todescribe regions in Europe and Southwest Asia?O A. Common religions and languagesOB. Human rights recordsC. Membership in the United NationsD. Conquest by foreign powers When a resident has an indwelling urinary catheter, the nurse aide should expect that the resident's care plan will includeA. limiting activity by keeping the resident on bedrest.B. emptying the urinary drainage bad every two-hours.C. keeping the area where the catheter enters the body clean.D. toileting the resident every two hours for bladder retraining. What are the 3 key elements of the story? The owner of a sandwich shop surveyed her customers on how often they came in, which sandwiches they preferred, and what quantity of sandwiches they ordered. She then added up the quantities demanded by all her consumers at each price. What did she create?. What kind of conflict is described in the passage from the epic poem Beowulf??character against author character against charactercharacter against self character against fare The assets and liabilities of a local surf shop are listed below.Building Mortgage $109,850Other Debt $35,988Accounts Receivable $10,760Property Value $162,974Long Term Investments $238,000Small Business Loan $62,700Long Term Liabilities $38,000Owned Inventory $72,980Cash $215,083Savings Account $128,721Owned Equipment $30,971The surf shop owner receives notice that the property value has increased by $20,000. What is the net worth of the surf shop? $859,489 $879,489 $612,951 $632,951 as medical tourism grows, hospitals outside the united states are promoting services that include the surgery, doctors' fees, and recuperative stays in resorts for one price. this pricing strategy is: a. bundled pricing. b. price leader. c. leader pricing. d. price lining. What part of the story is it in when Dorothy wakes up in The Wizard of Oz and realizes it was all a dream?A. the conclusionB. the climaxC. the characterD. the conflict Flint corporation borrowed $1,092,000 from central bank on may 31, 2019. The 3-year, 7% note required annual payments of $416,108 beginning may 31, 2020. Interest expense for the year ended december 31, 2019 was. 1. Who was Joseph McCarthy and what was McCarthyism? identify whether the given items are examples of imports, exports, or neither. assume the united states is considered the domestic country. unless otherwise instructed, you may use the periodic table in the chemistry: problems and solutions book for this question. which amount has the greatest mass? what is an internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard? Describe the role of the Calvin cycle in photosynthesis. In an experiment, Shara feeds her rat different brands of rat food (brands X, Y, and Z) each for 2 weeks and weighs the rat over several days, during the period of each diet. What is the independent variable? the duration of each period the rat's change in weight during the period the amount of water that the rat gets in each period the brand of food that Shara feeds the rat on a control chart, what separates sample points indicating common causes of variation from those indicating assignable causes of variation? PICTURE Finding Cube RootsEvaluate the expression. the molar enthalpy of solution of a salt that dissolves endothermically in water is measured in a coffee-cup calorimeter by weighing a known amount of distilled water into the cup and measuring its temperature, then adding a known mass of the salt to the water and measuring the temperature after the salt dissolves. if some water is initially present in the cup before the weighed amount of water is added, what is the effect on the experiment? a marginal cost pricing rule for a natural monopoly sets marginal cost equal to group of answer choices minimum average variable cost. marginal revenue. average cost. price. the smaller of price or marginal revenue. What is the main idea of Fourth of July?