a user needs to load windows 10 onto a notebook that was running windows 7; this will be a new installation, not an upgrade. since the notebook has no cd/dvd, the user has the image of the operating system stored on a usb flash drive. what must be done to the system prior to loading from the flash drive?

Answers

Answer 1

Before loading Windows 10 from a USB flash drive onto a notebook that previously ran Windows 7, the user must ensure that their important data is backed up and saved elsewhere, as the new installation will wipe out all existing files on the notebook.

The user should also check if the notebook meets the minimum system requirements for Windows 10, such as processor speed, RAM, and storage space. Next, the user should make sure that the USB flash drive is inserted into the notebook's USB port before turning it on. They can access the notebook's BIOS or UEFI settings by pressing a specific key (such as F2, F10, or Del) during the boot-up process, and then selecting the USB flash drive as the primary boot device. Once the notebook boots up from the USB flash drive, the user can follow the on-screen instructions to install Windows 10 onto the notebook's hard drive. After the installation is complete, the user should remove the USB flash drive and restart the notebook to begin using Windows 10.

To learn more about USB flash drive :

https://brainly.com/question/27800037

#SPJ11


Related Questions

what are the key features of the point-to-point protocol (ppp)? (choose three) can authenticate devices on both ends of the link. can be used on both synchronous and asynchronous serial links. establishes, manages, and tears down a call. does not carry ip as a payload

Answers

C, a replacement for the programming language B, was initially created by Ritchie at Bell Labs between 1972 and 1973 to create utilities for Unix.

Thus, It was used to re-implement the Unix operating system's kernel. C increasingly gained popularity in the 1980s.

With C compilers available for almost all current computer architectures and operating systems, it has grown to be one of the most popular programming languages.

The imperative procedural language C has a static type system and supports recursion, lexical variable scoping, and structured programming. It was intended to be compiled, with minimal runtime assistance, to offer low-level memory access and language constructs that easily map to machine instructions.

Thus, C, a replacement for the programming language B, was initially created by Ritchie at Bell Labs between 1972 and 1973 to create utilities for Unix.

Learn more about C, refer to the link:

https://brainly.com/question/30905580

#SPJ4

how do i create a robot

Answers

Answer:

with your hands

Explanation:

What can Amber do to make sure no one else can access her document? O Use password protection. O Add editing restrictions. O Use Hidden text. O Mark it as final.​

Answers

Add a password.

The question is asking how to make sure no one can “access” it which means look at it at all. This means that Editing restricting still allow people to access it, white text does nothing but make the text invisible, and marking it as final still gives them access
use password protection.

the term "____" means that work activities are done once, then again, and yet again.

Answers

The term "repetitive" means that work activities are done once, then again, and yet again.

The term "repetitive" refers to work activities that are performed repeatedly, often on a regular basis. These activities are characterized by a high degree of similarity, with little variation from one iteration to the next. Examples of repetitive work activities include assembly line work, data entry, and machine operation.

Repetitive work can be physically and mentally demanding, and can lead to boredom, monotony, and fatigue. It can also result in physical strain and repetitive stress injuries, such as carpal tunnel syndrome.

Learn more about repetitive activities:https://brainly.com/question/29511535

#SPJ11

If you witness physical bullying and want to help, what should you consider first?

Answers

Answer:

confront the bully

Explanation:

If you witness physical bullying and want to help, you should consider first whether the person perpetrating bullying is struggling with something.

What is physical bullying?

Physical bullying is the use of physical actions to intimidate and gain direct control. Physical activity is unwanted by the victim and can cause damage to the body or property. Some common types of violence enacted through physical bullying are hitting, Kicking, Pinching the Damage of property.

Ask them to refuse engaging emotionally. Set boundaries, don't engage with the abusive behavior, set consequences, and stick to them. Walk away if a boundary you set is crossed, or if you feel unsafe, leave. the place for some period. Talk to victim privately by setting a time aside, expressing your concern.

Offer any assistance, an ear to listen when they need it. Getting someone else involved might result in victim, be more open, to recognize the abuse, since including more people to express concern or witnessing the abuse, adds more value to the concern.

Thus, If you witness physical bullying and want to help, you should consider first whether the person perpetrating bullying is struggling with something.

Learn more about physical bullying on:

brainly.com/question/17505353

#SPJ3

what is pure substance ​

Answers

Answer:

i don't know

Explanation:

I don't understand

A computer system consists uses usernames with 6 symbols, where the allowable symbols are capital letters (A, B, . . ., Z) and digits (0, 1, . . . , 9). Don’t multiply out. Leave your answers in a form like 7! × 53 × 2.
(a) How many usernames are possible if repetition is not allowed?
(b) How many usernames allow repetition and use only letters?
(c) How many usernames are possible if the first three symbols must be different capital letters (i.e., no repeats), the last symbol must be a nonzero digit, and there are no other restrictions on the symbols?

Answers

The possible usernames if repetition is not allowed is 36⁶.

The usernames that allow repetition is 26⁶

The usernames possible if the first three symbols must be different is 15,600.

How to find possibilities?

(a) There are 36 possible symbols for each of the 6 symbols, so there are 36⁶ possible usernames.

(b) There are 26 possible letters for each of the 6 symbols, so there are 26⁶ possible usernames.

(c) There are 26 possible letters for the first symbol, 25 possible letters for the second symbol, and 24 possible letters for the third symbol. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 = 15,600 possible usernames.

The first three symbols must be different capital letters. There are 26 possible capital letters for the first symbol, 25 possible capital letters for the second symbol, and 24 possible capital letters for the third symbol. So there are 26 × 25 × 24 possible combinations for the first three symbols.

The last symbol must be a nonzero digit. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 possible usernames.

Find out more on computer system here: https://brainly.com/question/30146762

#SPJ4

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

a Program in Small Basic to Calculate the Area and Perimeter of a Triangle

Answers

Here's an example Small Basic program that calculates the area and perimeter of a triangle, given its base and height:

' Enter the base and height of the triangle

base = TextWindow.ReadNumber("Enter the base: ")

height = TextWindow.ReadNumber("Enter the height: ")

' Calculate the area and perimeter of the triangle

area = 0.5 * base * height

perimeter = base + (2 * Math.Sqrt((0.5 * base) ^ 2 + height ^ 2))

' Display the results

TextWindow.WriteLine("Area: " + area)

TextWindow.WriteLine("Perimeter: " + perimeter)

This program first prompts the user to enter the base and height of the triangle using the TextWindow.ReadNumber function. It then uses the formula for the area of a triangle, 0.5 * base * height, to calculate the area, and the formula for the perimeter of a right triangle, base + (2 * sqrt((0.5 * base) ^ 2 + height ^ 2)), to calculate the perimeter.

The Math.Sqrt function is used to calculate the square root of a number.

Finally, the program displays the calculated area and perimeter using the TextWindow.WriteLine function.

Learn more about coding: https://brainly.com/question/30590902

#SPJ4

a Program in Small Basic to Calculate the Area and Perimeter of a Triangle

What type of terminations are found with RG-6 and RG-59 cables? (Choose two.) A) G-type. B) RJ-10. C) F-type. D) BNC.

Answers

The types of terminations commonly found with RG-6 and RG-59 cables are:

C) F-type.

D) BNC.

Both RG-6 and RG-59 cables typically use F-type and BNC terminations. The F-type connector is commonly used for cable television (CATV) connections and is compatible with RG-6 and RG-59 cables. It provides a secure and reliable connection for coaxial cables. The BNC (Bayonet Neill-Concelman) connector is also used with RG-6 and RG-59 cables, particularly in applications such as video surveillance and professional audio/video equipment. The BNC connector offers a twist-lock mechanism for quick and secure connections.

Learn more about RG-6 here:

https://brainly.com/question/31915517

#SPJ11

Consider network below, determine the maximum number of cans (io thousands) an hour from east so tioeth Carolina.

Answers

The maximum number of cans (in thousands) an hour from east to south Carolina is 48.

To determine the maximum number of cans per hour from east to south Carolina, we will need to first find the maximum flow capacity for the network below:Network Diagram To get the maximum flow capacity, we will apply Ford-Fulkerson algorithm as shown below:Step 1: Start with the source node S and perform a depth-first search to find an augmented path to the sink node T. If no path exists, terminate the algorithm and output the maximum flow capacity. If a path exists, proceed to step 2.Step 2: Calculate the residual capacity for the augmented path found in step 1. This is done by finding the minimum capacity among the edges in the path. Subtract this capacity from the forward edges and add it to the reverse edges. Proceed to step 3.Step 3: Update the flow capacity by adding the residual capacity of the augmented path to the previous flow capacity. Proceed to step 1.To find the maximum flow capacity, we will use the following network flow table:Network Flow TableThe algorithm will run as shown below:Augmented Path (in bold): S-A-B-C-D-T Residual Capacity = 10Maximum Flow Capacity = 10Augmented Path (in bold): S-A-B-C-E-T Residual Capacity = 5Maximum Flow Capacity = 15Augmented Path (in bold): S-F-B-C-E-T Residual Capacity = 7Maximum Flow Capacity = 22Augmented Path (in bold): S-F-B-D-T Residual Capacity = 2Maximum Flow Capacity = 24Augmented Path (in bold): S-F-G-D-T Residual Capacity = 8Maximum Flow Capacity = 32Augmented Path (in bold): S-F-G-C-D-T Residual Capacity = 5Maximum Flow Capacity = 37Augmented Path (in bold): S-F-G-C-E-T Residual Capacity = 5Maximum Flow Capacity = 42Augmented Path (in bold): S-F-A-B-C-E-T Residual Capacity = 3Maximum Flow Capacity = 45Augmented Path (in bold): S-F-A-B-C-D-T Residual Capacity = 1Maximum Flow Capacity = 46Augmented Path (in bold): S-F-A-B-D-T Residual Capacity = 2Maximum Flow Capacity = 48Augmented Path (in bold): S-F-G-C-D-T Residual Capacity = 0Maximum Flow Capacity = 48Therefore, the maximum number of cans (in thousands) an hour from east to south Carolina is 48. Answer: 48.

Learn more about algorithm :

https://brainly.com/question/21172316

#SPJ11

im almost failing computer class✨✨ does anybody know the mistakes in all this code?

im almost failing computer class does anybody know the mistakes in all this code?

Answers

Answer:

I think it's the fact that the orange red color isn't a color code OR that's it's one word

Explanation:

what did Bakers wear (1) in the Portugal does (2) when was author was young ???

Please don't post invalid answer please..!!​


Anyone active here please give me answer of that question..!!

Answers

(i) The dress that the bakers used to wear in Portugal was; a a single-piece long frock that reached to their knees called ''Kabai''.

(ii) The dress that the bakers used to wear when the author was young was; shirts and trousers that were shorter than the ones of full length but longer than half-pants.

This question is from the title "Glimpses of India" which is a story about a baker from Goa that is related to the period/time when the Portuguese were ruling in Goa. The story is simply a chronicles of one of the bakers that was residing in a Goan village.

i) Now, according to his story, it was clear that the cloth that was synonymous with the bakers was a single piece frock that reached their knees and this dress was called "Kabai"

ii) When the author was young he reported that the dresses then among the bakers were shirts and trousers that were quite shorter than the ones of full length but longer than the half-pants.

Read more on glimpses of india at; https://brainly.com/question/9566788

In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply

Answers

There is great improvement in technology. Tom should reply that Containers uses Containers use operating system (OS) components for virtualization.

That is a kind of operating system (OS) virtualization where leverage features is placed on the host operating system so as to separate or isolate processes and control the processes' access to CPUs, memory and desk space.

Container based virtualization often makes use of the kernel on the host's operating system to run multiple guest instances. By this, one can run multiple guest instances (containers) and each container will have its specific root file system ascribe to it, process and network stack.

Learn more from

https://brainly.com/question/24865302

What is another term for the notes that a reader can add to text in a word- processing document?

Answers

Answer:

Comments

.....

why is it generally not recommended to configure bridgehead servers manually?

Answers

Explanation:

Bridgehead servers are the domain controllers that manage the replication of directory data between sites in Active Directory. While it is technically possible to manually configure bridgehead servers, it is generally not recommended to do so because of the complexity involved in ensuring proper replication of directory data.

Manually configuring bridgehead servers can be time-consuming and error-prone, and can lead to issues such as replication delays, data inconsistencies, and even data loss. This is because bridgehead servers need to be carefully configured to ensure that they are communicating properly with other domain controllers and are using the most efficient replication topology.

Instead of manual configuration, it is recommended to use automated tools or procedures to configure bridgehead servers. This can help to ensure that the servers are properly configured and that replication is running smoothly. Additionally, using automated tools can help to save time and reduce the risk of errors in the configuration process.

Overall, while it is possible to manually configure bridgehead servers, it is generally not recommended due to the complexity involved and the potential risks to the integrity of directory data.

What is the difference between semantic segmentation and object detection?

Answers

Semantic segmentation and object detection are two computer vision techniques used for image analysis. The difference between them is in the level of granularity of the analysis. In contrast, semantic segmentation divides the image into a grid of predefined classes and can provide more detailed information about the objects in the image.

Semantic segmentation is a process of dividing an image into different segments, with each segment representing a distinct object or region of the image. In other words, it is a pixel-wise classification of an image, where every pixel is assigned a label that describes the object it belongs to.

Object detection, on the other hand, is the process of identifying and localizing specific objects within an image. Object detection algorithms detect the presence of an object in an image and draw a bounding box around it to indicate its location. This allows for multiple objects to be detected in a single image. In summary, while semantic segmentation deals with pixel-wise classification of an image, object detection is focused on detecting and localizing specific objects within an image.

Learn more about semantic segmentation https://brainly.com/question/28454998

#SPJ11

In a certain country, a person must be at least 16 years old to drive a car and must be at least 18 years old to vote. The variable age represents the age of a person as an integer. Which of the following expressions evaluates to true if the person is old enough to drive but not old enough to vote, and evaluates to false otherwise?
I. (age ≥ 16) AND (age ≤ 18)
II. (age ≥ 16) AND (NOT(age ≥ 18))
III. (age < 18) AND (NOT(age < 16))

Answers

Answer:

i. (age >= 16) AND (age <= 18)

Explanation:

What the statement means is that it will only be true if the person is older than or 16 and younger than or 18.

That means that if either one is not true, the entire statement won't be either, as it requires both to be true to work.

The other 2 statements use NOT which changes the value. This means that if someone is less than 18, which is supposed to be true, the not statement will change it so that it's not.

I hope this makes sense :)

what is the name of the square in the lower-right corner of a selection that is used to copy cells

Answers

The square in the lower-right corner of a selection that is used to copy cells is called the Fill Handle. When you click and drag the Fill Handle, Excel automatically copies the data from the selected cell(s) into adjacent cells in the same column or row. The Fill Handle is a useful tool for quickly copying formulas, values, or formatting across multiple cells.

To use the Fill Handle, first select the cell(s) that contain the data you want to copy. Then, hover your mouse over the lower-right corner of the selection until the cursor changes to a small black cross. Click and drag the Fill Handle in the direction you want to copy the data (down to copy to cells below, or right to copy to cells to the right). When you release the mouse button, Excel will automatically copy the data into the adjacent cells.
In addition to copying data, the Fill Handle can also be used to fill in a series of numbers or dates. For example, if you have a series of dates that you want to fill in, you can select the starting date and then drag the Fill Handle down to fill in the rest of the dates in the series.
Overall, the Fill Handle is a simple but powerful tool that can save you time and effort when working with large sets of data in Excel.

Learn  more about excel here:

https://brainly.com/question/30324226

#SPJ11

Is anyone good a photography? If so pls any help would be great! Brainliest will be given:)

Is anyone good a photography? If so pls any help would be great! Brainliest will be given:)

Answers

Answer:

Based on the image I'd have to say the answer is fast shutter speed

what layout or organizational features (e.g., topic, chapter headers) help you understand an informational text?

Answers

With headings at the top and subheadings below, organizational features like headings and subheadings help the reader understand what they're about to read. The font used to indicate headings and subheadings is different from the font used for the rest of the text.

What characteristics distinguish an informational text?

A table of contents, an index, bold or italicized text, embedded definitions for specialized vocabulary, realistic illustrations for photos, captions and other labels, graphs, and charts are a few examples of these.

What are the four different features of informational text?

Literary nonfiction, expository writing, argumentative writing (also known as persuasive writing), and procedural writing are the four primary categories of informational texts.

To know more about subheadings visit:-

brainly.com/question/12562417

#SPJ4

In Python: Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.

Sample Run:
Enter a number: 9
Smallest: 9
Enter a number: 4
Smallest: 4
Enter a number: 10
Smallest: 4
Enter a number: 5
Smallest: 4
Enter a number: 3
Smallest: 3
Enter a number: 6
Smallest: 3

Answers

Answer:

python

Explanation:

list_of_numbers = []
count = 0
while count < 6:
   added_number = int(input("Enter a number: "))
   list_of_numbers.append(added_number)
   list_of_numbers.sort()
   print(f"Smallest: {list_of_numbers[0]}")
   count += 1

FILL IN THE BLANK. the gea group implemented a(n) ___________ to address its reporting issues.

Answers

The GEA Group implemented a comprehensive Enterprise Resource Planning (ERP) system to address its reporting issues. An ERP system is a centralized software solution that helps manage various business processes such as accounting, human resources, and inventory management.

The system integrates all the data from different departments and provides a unified view of the business operations, enabling decision-makers to have real-time access to accurate and up-to-date information.

With the implementation of the ERP system, the GEA Group was able to streamline its reporting processes, eliminate redundancies and inconsistencies, and ensure compliance with regulatory requirements. The system also provided the company with a better understanding of its financial and operational performance, allowing it to make data-driven decisions.

The benefits of the ERP system go beyond addressing reporting issues, as it helps companies achieve greater efficiency, cost savings, and improved customer satisfaction. It enables businesses to better manage their resources, reduce waste and improve productivity, which ultimately contributes to their overall success.

You can learn more about ERP systems at: brainly.com/question/30086499

#SPJ11

diffreciate between primary source of information and secondary source of information​

Answers

Answer:

Primary is firsthand, secondary is viewed through articles and other materials.

Explanation:

EX: Primary account of a story, secondary view through pictures.

* bsttest. Java is the main in zybooks and is used for testing your code. Tree. Java is the interface you will implement in bst. Java. These are named the same as lab 20, but the code is different. Last lab you worked with a binary search tree of integers. Now you will be extending the functionality of the tree to work with any class that implements the comparable interface. As can be seen in oracle's javadoc to when a class implements the comparable interface, it must provide an implementation of the method compareto(). This method compares one object to another to determine if the object is less than, equal to or greater than the other object. The javadoc explains what each of these cases return, but i'll show an arbitrary example in case it comes off as a little confusing. Say we have object x and another object of the same type y. Xpareto(y) returns an integer less than 0 if x < y, returns zero if x

Answers

The provided text seems to be incomplete, as it cuts off mid-sentence. However, based on the available information, it appears to be discussing the implementation of a binary search tree (BST) in Java.

The text mentions two Java files: "bsttest.java" and "Tree.java." "bsttest.java" is likely the main class used for testing the code, while "Tree.java" is an interface that needs to be implemented. The goal is to extend the functionality of the tree to work with any class that implements the Comparable interface.

The Comparable interface requires implementing the compareTo() method, which compares objects to determine their order. The method should return an integer less than 0 if the object is less than the compared object, 0 if they are equal, and an integer greater than 0 if the object is greater.

Without the complete information or specific code examples, it is difficult to provide further details or assistance. If you have specific questions or need help with a particular aspect of implementing the binary search tree, please provide more context or code snippets.

To know more about binary search tree (BST), visit:

brainly.com/question/31604741

#SPJ11

Consider the following class and print the output:

abstract class Test1 {

static int x;

Test1() {

System.out.printf("Making objects");

}

public abstract void restful(int x);

}

public class Test2 extends Test1 {

public void restful(int x) {

System.out.printf("class Test2");

}

}

public class Test3 extends Test1 {

Test3()

{

super();

}

public void restful(int x) {

System.out.printf("class Test3");

}

}

public class Driver {

public static void main(String [] args)

{

Test2 a1 = new Test1();

Test3 a2 = new Test();

a1.restful(15);

a2.restful(20);

Test a3 [] = new Test[5];

for(int i=0;i
if (i%2)

a3[i] = new Test2();

else

a3[i] = new Test3();

for(int i=0;i
a3[i].restful[10];

}

}

Answers

There are a few errors in the provided code. First, in the main method of the Driver class, the code tries to create an object of the abstract class Test1 using the Test2 constructor. This is not allowed since Test1 is abstract and cannot be instantiated.


Secondly, in the for loop that creates an array of Test objects, the method call to restful() is incorrect. It should be a method call with parentheses instead of square brackets.
Here's the corrected code with the expected output:
abstract class Test1 {
   static int x;
   Test1() {
       System.out.println("Making objects");
   }
   public abstract void restful(int x);
}

public class Test2 extends Test1 {
   public void restful(int x) {
       System.out.println("class Test2");
   }
}

public class Test3 extends Test1 {
   Test3() {
       super();
   }
   public void restful(int x) {
       System.out.println("class Test3");
   }
}

public class Driver {
   public static void main(String[] args) {
       Test2 a1 = new Test2();
       Test3 a2 = new Test3();
       a1.restful(15);
       a2.restful(20);
       Test1 a3[] = new Test1[5];
       for (int i = 0; i < 5; i++) {
           if (i % 2 == 0)
               a3[i] = new Test2();
           else
               a3[i] = new Test3();
           a3[i].restful(10);
       }
   }
}

Expected output:
Making objects
Making objects
class Test2
class Test3
Making objects
class Test2
Making objects
class Test3
Making objects
class Test2
Making objects
class Test3
Making objects

Learn more about loop about

https://brainly.com/question/30706582

#SPJ11

Effective nonverbal communication can cause tension.

True or False

Answers

Explanation:

When your nonverbal signals match up with the words you're saying, they increase trust, clarity, and rapport. When they don't, they can generate tension, mistrust, and confusion.

Answer:

False

Explanation:

Using the World Wide Web, search for advice about the following issues. For each issue, search for information on the manufacturer’s web site and at least one third-party resource or forum. Consider how you found the solution for each item, what the solution is, and how the answers differ or do not differ on the manufacturer’s web site and the third-party site. If you cannot find a description or resolution of an error in two different places, explain your process searching for that information on either a third-party site or the manufacturer’s site.

What problem does the OS X Mountain Lion 10.8.2. Supplemental Update 2.0 resolve?
What are the disk space requirements for installing Windows 7 Service Pack 1 from an installation DVD?
List two causes and one solution for a 404 Error.
Define device manager error code 10 and explain how to fix it.
Describe the steps to locate the serial number on an Acer desktop computer.
How do you find out the meaning of beep codes you hear during startup?
What is the first step to take to resolve a blue screen of death error?
What steps should you take if you installed a new device driver and the computer will not start?
Explain the possible causes of a User32.dll Not Found error message.
List the steps for changing the language of your keyboard.
Write a report sharing the detailed information for each of these tasks. You may do so using bullet points or a table. You may use screen shots to illustrate a particular issue or solution. Make sure to include information about:

how you found the solution on the web sites: search, browse, ask a question, etc.;
how you located the manufacturer and/or third-party web sites you used;
the solution or details requested above; and
the difference between the solution or explanation offered by the manufacturer and the third-party website (s).
Submission Requirements
Use standard English and write full phrases or sentences. Do not use texting abbreviations or other shortcuts.
Make any tables, charts, or graphics neat and well organized.
Make the information easy to understand.

Answers

Using the World Wide Web, search for advice about the following issues the net browser (generally called a browser) is a software program person agent for getting access to statistics at the World Wide Web.

What are the three search engines like and yahoo that assist you locate statistics from extraordinary websites?

There are many extraordinary search engines like and yahoo you may use, however a number of the maximum famous consist of , Yahoo!, and Bing. To carry out a seek, you may want to navigate to a seek engine on your net browser, kind one or greater keywords—additionally called seek terms—then press Enter to your keyboard.

A browser is a laptop software that allows you to apply the laptop to view WWW files and get admission to the Internet taking benefit of textual content formatting, hypertext links, images, sounds, motion, and different features.

Read more about the browser:

https://brainly.com/question/25689052

#SPJ1

Which of the following is NOT true about high-level programming
languages?

Answers

Answer:

this can't be answered because you didn't show the "following" answers

Answer:

u did't write the question

then how will we answer u

and people behind brainly don't try to delete my answer

because only if he show the question then only i can answer him

To identify the effect in a text, you can ask yourself which question?

A. What happened?

B. Why did this happen?

C. How did the person feel?

D. Where did this happen?

Answers

Answer:

why did this happen?

Explanation:

effect means what caused it so You should ask why did this happen or (what caused it)

A. What happened? I’m sorry if this is wrong
Other Questions
eeeeANEXO 6Mircoles 24 de Febrero de 2021LOS TEXTOS EXPOSITIVOSINSTRUCCIONES: Escribe debajo de cada pestaa la parte deltexto expositivo que corresponde:*Titulo *Subtitulo *Introduccin Desarrollo * CierreEl aguaEl agua (del latn aqua) esuna sustancia cuyamolcula est formada pordos tomos de hidrgeno yuno de oxgeno (H20).TEXTOEXPOSITIVOveelara la"El aguasupervivencia de todas lasformas conocidas de vida.Es esenciesencial su cuidado.seres vivos es por ellosatmsfera, embalses, ros ylagos, humedad del suelo.orden decreciente entreEl agua se reparte enagua totalocanos donde se concentra el 96.55 delterrestre 2 Se local principalmente en loscuore al 15 de louperficie de la cortesoJoseosa denominada vapor Baguoda tomada hielo y en su formalo mismo puedo holone en su fomola sustancia en estado luido, aunqueTeming gua generalmente se refierereee The following parametric equations trace out a loop. x=54/2t y = -4/t+4t+1Find the t values at which the curve intersects itself. t= Find the x and y values of the intersection 10 points Ez points Help plz:))) Ill mark u brainliest with the flowmeter set at 6 l/min, the nasal cannula will deliver up to _______ oxygen. Choose the sentence in which the subjects and verbs have been correctly identified and they agree. What is the verb tense of the underlined word in the sentence you chose? A) At the end of the story, they was living happily ever after. B) At the end of the story, they were living happily ever after. C) At the end of the story, they were living happily ever after. D) At the end of the story, they was living happily ever after. The following data shows the weight, in pounds, of 5 boxes: 3, 1, 2, 2, 2 what is the value of the mean absolute deviation of the weight of the boxes, and what does it represent about the weight of a box? Find the whole.20% of ___is 18.Explain your method. Select the correct answer.Read the following excerpt from Franklin D. Roosevelts First Inaugural Address.With this pledge taken, I assume unhesitatingly the leadership of this great army of our people dedicated to a disciplined attack upon our common problems.How does Roosevelt communicate his intentions? A. by using personification to make the country appear as someone who fights for the nations people.B. by using an allusion to describe the universal problem of conflict.C. by using a metaphor to compare fixing the nations problems with fighting an enemy at war.D. by using an idiom to relate to his audience about their common issues. a 70 year old with malnourishment and a history of type 2 diabetes is admitted from the nursing home with pneumonia and tachypnea. what kind of shock is this patient most likely to develop? Determine whether the following statement is always, sometimes, or never true. Explain.If line m lies in plane X and line m contains a point Q, then point Q lies in plane X. 2. would there have been a change in your results if activated carbon was not added to the solution before recrystallization? DIRECTIONS: Underline the collocations used in each sentence.1. James and Lily are happily married.2. The mother was deeply worried about her son.3. Your recent performance is a big improvement from last time.4. What is their departure time?5. He was interviewed by the head teacher.6. He was deeply hurt by their betrayal.7. At the rate of your spending, you will go bankrupt soon.8. John was doing the dishes when his mother arrived.9. The old man deeply regrets not taking risks when he was still young.10. We should pay a visit to Mr. Garcia next week.pahelp po need kolang po Evaluate R C F dr, where F(x, y, z) = 5xi 5yj 3zk and C is given by the vector function r(t) = hsin t, cost, ti, where 0 t . Which of the following questions does the Conceptual Framework NOT answer? a. What are the objectives of financial reports? b. What method of valuation and measurements should be used? c. Who are the potential users of financial reports? d. None of the above. The CF answers all the above questions. Valuation of ending inventory on the basis of 'cost or net realisable value whichever is lower' is a reflection of which of the following accounting doctrines? a. 'Substance over form' b. Fair value accounting c. Full disclosure. d. Prudence. The Financial Reporting Council (FRC) is responsible for: a. enforcing AASB accounting standards b. implementing the harmonisation project of the IASB C. Firing non-performing members of the AASB d. None of the aboveWhich of the following is NOT a function of the AASB? a. Enforcing AASB accounting standards on companies b. Advising the government about the correct way for regulating corporate reporting c. Advising accountants and auditors about their responsibilities d. a All of the above. Suppose you are writing a business plan for an event planningbusiness. What resources will you require? How will you sustain your differentiation? explain how one reason for or against the war of 1812 played a major role in us politics and policies after the war apush Temperature-sensitive conditional mutations cause expression of a wild-type phenotype at one growth temperature and a mutant phenotype at another- typically higher-temperature. Imagine when a bacterial cell carrying such a mutation is shifted from low to high temperatures, RNA polymerase process of elongation complete transcription normally, but no new transcripts can be started. The mutation in this strain most likely affects what feature? Explain what the following statement means. Polvnomials are closed under the operations of addition and subtraction. Provide one addition example and one subtraction example to demonstrate. Which choices are examples of self-governance during the period of salutary neglect?A)town meetingsB)House of Conmonsquartering troopsD)House of BurgessesE)Constitutional Convention candy corporation has $100,000 of 8% bonds that were issued in year 1 at face amount. when the bonds are repaid at the maturity date, the journal entry will require which of the following entries?