You've made changes to document and need to save as pdf..how do you do this?

Answers

Answer 1

Answer:

file and download the freshly edited doc and download it/export as a pdf


Related Questions

In _____programs and data have the same form.

Answers

In array, programs and data have the same form.

Is the data type shared by arrays?

A succession of objects with successive numbers are stored in an array, which is a homogeneous data structure (all components have the same data type). The items are allocated in contiguous memory.

By utilizing its number, each object in the array can be accessed (i.e., index). You specify an array's size when you declare it.

When the array is declared as an Object, it is possible to create an array containing items of several data types. as of System. An item in an array of objects can have a reference to any other type of object because objects are the basic class for all other types. A data structure called an array can hold a fixed-size group of identically data-typed elements

Therefore, based on the above, In array, programs and data have the same form.

Learn more about array from

https://brainly.com/question/26104158

#SPJ1

Explain security interdependence among components in a computing environment.Give three examples demonstrating security interdependence in an information system.

Answers

When a catastrophic risk faced by one firm is partially determined by the behavior of other firms, and when this behavior influences the incentives of the first firm to limit its exposure to the risk, security issues become interdependent.

What is security independence in a computing environment?

Because security is a component that requires the integration of several system parts, such as from the authentication and authorization segment where users are authenticated and granted access, and security is established using the encrypted part of the program or system, security interdependence can be seen in the various components of the information system or the computing environment. Security is dependent on the system as a whole, including the link layer security, transport layer security, any encryption methods utilized, and secure data transfer.

The use of link layer security, transport layer security, and encryption techniques are three examples of how security is interdependent.

To get more information about Security Independence :

https://brainly.com/question/28149669

#SPJ1

Whst addresses do not change if you copy them to a different cell?

Answers

The type of addresses that do not change if you copy them to a different cell is Absolute references.

What are absolute references?

There are known to be two types of cell references which are: relative and absolute.

Note that Relative and absolute references can work differently if copied and filled to other cells. The Absolute references, is one that often remain constant, no matter where a person may have copied them to.

Therefore, The type of addresses that do not change if you copy them to a different cell is Absolute references.

Learn more about Absolute references from

https://brainly.com/question/11764922

#SPJ1

What is wrong with this text message:
USPS: Tracking Number:
US3896901185421. Dear
customer we have problems with
your shipping address, please
update your information. Check
Here: https://usps.nom.co/vf9

Answers

The Link is saying that there was an error and that you had a faulty link that was not secure.

The Connection is informing you that there was a mistake and that your link was broken and insecure.

What are tracking numbers?

Once you receive your tracking number, tracking your package is simple. The USPS Tracking page only requires the tracking number to be entered.

Along with additional tracking details, such as delivery and/or attempted delivery information, you'll receive the item's current status. The majority of domestic services, like USPS Priority Mail, have tracking numbers that begin with a series of numbers, like 9400.

However, the USPS's overseas tracking numbers start with a series of letters.

Therefore, the Connection is informing you that there was a mistake and that your link was broken and insecure.

To learn more about tracking numbers, refer to the link:

https://brainly.com/question/27640701

#SPJ5

Is it true that all office programs include the capability to incorporate feedback called online collaboration across the internet or a company network

Answers

It is true that all office programs include the capability to incorporate feedback called online collaboration across the internet or a company network.

What is online collaboration?

The process of connecting users digitally to communicate in an online space is known as online collaboration. A software system that allows team members to communicate using video, audio, and text is usually used to supplement online collaboration.

It is primarily used by businesses to improve communication and project efficiency.

All Office programs include the ability to incorporate feedback via the internet or a company network, which is known as online collaboration.

Thus, the given statement is true.

For more details regarding online collaboration, visit:

https://brainly.com/question/19191600

#SPJ1

Question 1
Which of the following is NOT a picture format command?
O Remove background
O Theme
O Crop
O Arrange

Answers

It would be arrange.

The "Theme" command is NOT a picture format command.  (Option B)

How are the others a picture format command?

The other options listed – "Remove background," "Crop," and "Arrange" – are picture format commands that are typically found in image editing or presentation software.

"Theme" is usually related to the overall design style or appearance of a document or presentation, rather than a specific picture format manipulation.

It's important to note that your provided context is slightly unclear, and without additional details, this answer is based on common understanding of these terms in the context of image editing or presentation software.

Learn more about picture format  at:

https://brainly.com/question/32510553

#SPJ2

When working on a ladder, what's one thing you need to avoid in order to prevent falling?
A. Making sure the ladder is in its locked position before use
B. Having a peer hold the ladder while you're climbing to make sure it's stable
C. Facing the ladder as you climb up and downD. Using the top ladder as a step

Answers

Answer:

  D. Using the top ladder as a step

Explanation:

You are given suggestions for use of a ladder, and asked to identify one that is unsafe.

Ladder safety

In general, you will want to make sure a ladder is locked so that movable parts cannot move, and placed on a stable, level surface at an appropriate angle. It can be helpful to have someone hold the ladder for you to make sure it does not move. It is always a good idea to face the ladder while climbing up and down, so that you can appropriately grip the rails.

The one practice listed here that is unsafe is using the top step of the ladder.

Answer: Its D

Explanation:

Maintaining three points of contact with the ladder at all times

Never standing on either of the top two rungs of a stepladder

Never stepping on any of the top four rungs of an extension ladder

Having a partner hold and steady a ladder as you use the ladder to climb

up and down.

odify the guessing-game program so that the user thinks of a number that the computer must guess.

The computer must make no more than the minimum number of guesses, and it must prevent the user from cheating by entering misleading hints.
Use I'm out of guesses, and you cheated and Hooray, I've got it in X tries as your final output.

Answers

The guessing-game program that the user thinks of a number that the computer must guess is illustrated below.

How to illustrate the program?

The appropriate program for the guessing game will be:

import random

import math

smaller = int(input("Enter the smaller number: "))

larger = int(input("Enter the larger number: "))

count = 0

print()

while True:

   count += 1

   myNumber = (smaller + larger) // 2

   print('%d %d' % (smaller, larger))

   print('Your number is %d' % myNumber)

   choice = input('Enter =, <, or >: ')

   if choice == '=':

       print("Hooray, I've got it in %d tries" % count)

       break

   elif smaller == larger:

       print("I'm out of guesses, and you cheated")

       break

   elif choice == '<':

       larger = myNumber - 1

   else:

       smaller = myNumber + 1

Learn more about programs on:

https://brainly.com/question/16397886

#SPJ1

What other new jobs could be created to help address the reality of climate change?

Answers

The new jobs that could be created to help address the reality of climate change are:

Environmental Engineer. Clean Car Engineer.Environmental Scientist. Conservation Scientist.

What exactly is climate change?

The term climate change is known to be a Long-term changes in temperature and weather patterns are referred to as climate change. These changes could be caused by natural processes, such oscillations in the solar cycle.

Note that human activities are known to be primarily the combustion of fossil fuels like coal, oil, and others are those that have been the primary cause of climate change.

Therefore, The new jobs that could be created to help address the reality of climate change are:

Environmental Engineer. Clean Car Engineer.Environmental Scientist. Conservation Scientist.

Learn more about climate change from

https://brainly.com/question/1789619
#SPJ1

1
A problem that can be solved through
technological design has been identified. A
brief has been written. What is the next step
in the design process?
O Specification writing
O To conduct background research
O To identify barriers and constraints
The design of different potential solutions

Answers

The next step in the design process will be the design of different potential solutions. The correct option is D.

What is technological design?

Technological design is a distinct process with several distinguishing characteristics: it is purposeful, based on specific requirements, iterative, creative, and systematic.

A good technical design is one that requires the least amount of effort and money while meeting your business requirements, particularly in terms of development speed and turn-around time, maintenance cost, deployment complexity, scalability, or security requirements.

A problem has been identified that can be solved through technological design. A synopsis has been written. The design of various potential solutions will be the next step in the design process.

Thus, the correct option is D.

For more details regarding technological design, visit:

https://brainly.com/question/26663360

#SPJ1

I need the user to type 17 OR 18 and if they type a different number the computer should say error else it should say thanks

if Age !="17" or "18" :
print("Error please try again")
elif Age == "17" or "18":
print("thanks")

Answers

The output for the first condition would be thanks while the one when age is not 17 or 18 would be error please try again.

What is the else if (elif statement)?

This is the statement that is used in programming which tells the computer to fulfill another condition if the first condition that it was given is unmet.

Here the first condition is to type 17 or 18 as age.

This would be

If Age == "17" or "18"

print ("thanks")

The output would be thanks if the age falls under the condition of 17 or 18.

Next we are to get what happens if age is not 17 or 18

elif age != "17" or "18"

print("Error please try again")

The output that we would have here if the first condition is unfulfilled would be error try again.

Read more on elif codes here: https://brainly.com/question/15091482

#SPJ1

CodeHS 2.9.5 Style Your Class List answer

Answers

In this exercise we have to use the knowledge of computational language in python to write the code that Style Your Class List answer

Writting the code:

ipenup()

backward(100)

for i in range(4):

pensize(5)

pendown()

left(60)

color("green")

forward(50)

right(120)

color("blue")

forward(50)

color("red")

right(120)

forward(50)

penup()

left(180)

forward(50)

See more about python at brainly.com/question/22841107

#SPJ1

Correctly discuss the third generation Considering​

Answers

Answer:

Random-access memory...

I will earn at least a 3.0 gpa in all of my courses this semester is an example of all the criteria of a smart goal?

Answers

Based on the given scenario, it can be clearly seen that it fulfils all criteria for a SMART goal.

What is a SMART goal?

This is an acronym that means Smart, Measurable, Attainable, Realistic and Time-Bound.

With this in mind, we can see that

S = Specific

There is a specific criteria (3.0 GPA) that this person is trying to meet

M = Measurable

This goal is measurable, and can be measured by looking at grade point averages.

A = Attainable

Yes, 3.0 is a B average, which is attainable if you work hard!

R = Realistic

Yes, most grade-based goals are realistic as long as they are not aiming for 100%!

T = Time-Bound

This goal is time bound to one semester

Therefore, we can state that it fulfilled all criteria for a SMART goal

Read more about SMART goals here:

https://brainly.com/question/8986181

#SPJ1

Question 3: Which of the following is NOT one of the basic functions of malware?
O Gathering personal information about you
O Launching a denial of service attack
O Aggressive advertising
O Tracking your surfing habits

Answers

Answer choice 4 is not one of the basic functions of malware

Question 4: A computer controlled by a hacker is called a
O spybot
O pharm
O zombie
O Trojan horse

Answers

Zombie

Zombie is a computer connected to the internet that has been compromised by a hacker via a computer virus,worm or Trojan horse program
Zombie is going to be your correct answer

What conflict control method are you exhibiting if you deal with people in a way that does not offend them?

Answers

Answer: A

Explanation:

Why was the department of homeland security created ​

Answers

Answer: To stop terrorist

Explanation: After the attack on 9/11 the Department Homeland Security was created to stop terrorist. :)

in python
Write an if-else statement with multiple branches.
If year is 2101 or later, print "Distant future" (without quotes). Otherwise, if year is 2001 or greater, print "21st century". Otherwise, if year is 1901 or greater, print "20th century". Else (1900 or earlier), print "Long ago".

Sample output with input: 1776
Long ago

Answers

Answer:

year = 1776

if year >= 2101:

   print("Distant future")

elif year >= 2001:

   print("20th century")

else:

   print("Long ago")

   

Explanation:

Alternatively, if you wanted the user to assign a value to the "year" variable. You could replace year = 1776 with year = int(input("Enter a year: "))

Mary and Joanne would like to start their own jewelry business. They do not want to file a bunch of papers, but also do not want to be personally liable for debts incurred by the company. Which form of ownership should they pursue?\


A-Partnership
B-Sole proprietorship
C-Limited Partnership

(helping my friend do his work cos hes sick)

Answers

In the United States, an LLC is a type of organizational structure where the owners are not held personally responsible for the debts or obligations of the business. Limited liability companies are hybrid legal entities with traits shared by corporations, partnerships, and sole proprietorship.

What personally liable for debts incurred by the company?

A business where some people hold the bulk of the company's shares is known as a closely held corporation. Shares cannot be purchased by the public because they are not openly traded on an exchange. The majority shareholders have a large impact on and control over the company.

Therefore, The simplest and most straightforward type of business ownership is a sole proprietorship. One individual is the owner of it. The distinction between the individual and the company does not exist. Profits and losses from the company are shared by the owner.

Learn more about personally liable here:

https://brainly.com/question/14682274

#SPJ1

Evaluate when to use Object-oriented design
methodology

Answers

The time to  use Object-oriented design methodology is when a person wants to fill the space between problem and solution.

Check more about Object-oriented design methodology  below:

What is object oriented design used for?

The term Object-oriented design (OOD) is known to be a kind of an act or method that involves the use of   an object-oriented methodology to design a computing system or any form of application.

Note that this technique is known to be one that entails the act of the implementation of a software solution which is said to be as a result of an idea or the concepts of objects, since OOD serves as an aspect of the object-oriented programming (OOP) act or lifecycle.

Therefore, based on the above, one can say that The time to  use Object-oriented design methodology is when a person wants to fill the space between problem and solution.

Learn more about Object-oriented design from

https://brainly.com/question/13383471
#SPJ1

When following the user-centered design approach, what should a designer do after completing initial user research to better understand the user?
• Test the design solution with real people
• Determine who your user is
• Build on previous designs and make tweaks
• Determine the most important user problem to solve
which option is correct answer

Answers

Following the user-centered design approach, after completing initial user research to better understand the user they should go for determining who the user is. The correct option is B.

What is user-centered design approach?

Design is founded on a clear understanding of users, tasks, and environments; it is guided and refined by user-centered evaluation; and it addresses the entire user experience.

The iterative process involves users throughout the design and development process.

UCD is an iterative design process in which designers focus on the users and their needs throughout the design process.

UCD design teams use a variety of research and design techniques to involve users throughout the design process in order to create highly usable and accessible products for them.

Following the user-centered design approach, they should determine who the user is after conducting preliminary user research to better understand the user.

Thus, the correct option is B.

For more details regarding user-centered design approach, visit:

https://brainly.com/question/28379376

#SPJ1

Emily has copied some text from one of her documents. She would like to insert it in a new word-processing document. What command should Emily use?


Save As

Save

Cut

Paste

Answers

The ans is paste if u copy something and right click again the paste command will show up

students in your class publish a list online that ranks all the students in your grade from most attractive to least attractive. It gets forwarded and shared across social media.

How could you respond to this situation? List as many responses as you can think

Answers

Since there was an online ranking of all the students in your grade from most attractive to least attractive, my response will be that it is unethical.

That some student whose name may be in the lowest point can see it and be sad as well as laugh at which may make them to have low self esteem and can even make them to stop going to school so that they would not be laugh at and as such, such things should be removed as the cons are more that the pros.

What are Unethical behavior?

Unethical behavior is known to be a term that can be defined as any kind of actions that are known to be done against social norms.

Note that they can be seen as any kind of acts that are found to be unacceptable to the public.

Therefore, Since there was an online ranking of all the students in your grade from most attractive to least attractive, my response will be that it is unethical. That some student whose name may be in the lowest point can see it and be sad as well as laugh at which may make them to have low self esteem and can even make them to stop going to school so that they would not be laugh at and as such, such things should be removed as the cons are more that the pros.

Learn more about Unethical behavior from

https://brainly.com/question/24518056

#SPJ1

In 25 words or fewer, explain how u can help maintain a productive work environment while on the job

Answers

I would ensure side attractions like gisting or surfing the internet while I am supposed to be working are eliminated while also personalizing my space.

The currency number format allows you to add a dollar sign symbol and decimal places for data true or false

Answers

decimal places for data is false

Group dynamics differ according to the size of the group.
True
False

Answers

Uhm this one is confusing in group dynamics we need peoples too but it really doesn’t matter in big size even if there is just two people we can interact anyways I will go for true

What kind of software would I be able to build with functional programming language?​

Answers

Answer:

Functional programming languages are specially designed to handle symbolic computation and list processing applications. Functional programming is based on mathematical functions. Some of the popular functional programming languages include: Lisp, Python, Erlang, Haskell, Clojure, etc.

what does a microchip do. what is it used for and when was it made?

Answers

A microchip is used in almost every electronic gadget we use today, including cellphones, game consoles, automobiles, as well as in medical equipment, and they all uses microchips.

What exactly is a microchip and how does it work?

A microchip is a discrete piece of packaged computer circuitry, also known as an integrated circuit, that is produced on a very small scale from a material like silicon. Program logic (logic or microprocessor chips) and computer memory are produced using microchips (memory or RAM chips).

Therefore, based on the above, A microchip is used in almost every electronic gadget we use today, including cellphones, game consoles, automobiles, as well as in medical equipment, and they all uses microchips.

Learn more about microchip from

https://brainly.com/question/28469339
#SPJ1

Describe a present-day computing environment that might use each of the memory allocation schemes (single user, fixed, dynamic, and relocatable dynamic) described in the chapter. Defend your answer by describing the advantages and disadvantages of the scheme in each case.

Answers

The single user, fixed, dynamic, and relocatable dynamic is further explained below.

How to illustrate the information?

1. Single user memory allocation scheme

The complete program is loaded into memory, and it allots as much contiguous space there as it requires. Programs or jobs are processed in this single user system in a sequential manner. The memory manager needs to put in the least amount of effort under this system. A register is used to hold the base address, while an accumulator measures the size of the program

Fixed partitions

The primary memory is divided into this fixed segment. Multiprogramming is possible. The partition's size doesn't change until the system is shut down, configured, or restarted. The memory size of the job, the appropriate job size, and the partition size must all be protected.

Dynamic partition

Only the amount of memory requested by each work is put into the memory, and the available memory is preserved in contiguous blocks.

Learn more about computer on:

https://brainly.com/question/24540334

#SPJ1

Other Questions
Based upon the description, what can we infer about the Squire's personality? Which details show how Arthur's tale draws on How Theseus Lifted the Stone for theme development Astronomers observe a typical star using a telescope and a spectrometer. they will see? At what stage of the target market selection process is the marketer first likely to uncover information that makes a segment less attractive than previously thought?. let's say that i'm using radiometric dating to get a time of formation for a rock. radiometric dating can give uncertainties, meaning that the date on a rock is not always precise. in this hypothetical situation, my rock turns out to be 255 million years old /- 20 million years (the /- means that it is possible that the rock was formed 20 million years later or earlier). what possible time periods could the rock have formed in? A 10 mM salt solution is _________ to a 500 mM salt solution. Which expression is equivalent to -3[4*-0.50]?12x 1.5012x + 1.5012x 2.5012x 3.50 Write an equation for the number of miles y it travels in x hours how many miles will it travel in 3 What is the author's purpose in writing this essay? Provide details from the text to supportyour argument. The Summer hunger crisis which two traditions did the early humans combine to prepare them for danger? Need help ASAP, thanks in advanceFor each question, choose answer choice a-e and explain why you chose that answer.The weight of the box is changed to 50 N.The weight of the box is changed to 200 N.The applied force is increased to 50 N.The applied force is increased to 80 N.The coefficient of static friction is increased to 0.7.The coefficient of kinetic friction is increased to 0.5.The coefficient of kinetic friction is increased to 0.5 and the coefficient of static friction is increased to 0.7.The weight of the box is changed to 200 N and the coefficient of static friction is increased to 0.7.The weight of the box is changed to 200 N and the coefficient of kinetic friction is increased to 0.5.The weight of the box is changed to 200 N and the applied force is increased to 50 N. Choose the memoir that you liked best from the Teen Ink website. Explain in your discussion what you feel the writer did well. Be sure to include "showing" as well as memoir characteristics in your post. Also discuss aspects of the memoir that you think could be better. If you could give the writer suggestions to improve his or her writing, what would those suggestions be? Be sure to state the title of which memoir you chose to discuss. What is the value of x?Enter your answer in the box. Suppose a plane accelerates from rest for 30 s, achieving a takeoff speed of 80 m/s after traveling a distance of 1200 m down the runway. A smaller plane with the same acceleration has a takeoff speed of 40 m/s . Starting from rest, after what distance will this smaller plane reach its takeoff speed? How did navajo soldiers help the allies regain islands in the pacific during the war? a single stranded dna (oligonucleotides) can hybridize with (select one): select one: a. complementary dna b. complementary rna c. complementary protein d. a and b What is the first valid host on the subnetwork that the node 172.19.49.43/21 belongs to? 1. Why do you think Margot acts the way she does-why doesn't she play with her classmates,for example? Why does she react so strongly to the shower? explain the process of social research and why scholars who study social problems often rely on existing data What value correctly fills in the blank so that the expressions are equivalent?32 + 72 = blank x (4 + 9)481213