You have inserted a picture in your Word document, and you want to ensure that users with visual impairments can access the picture. How can you do this?
a. Insert an object.
b. Insert a caption.
c. Insert AutoText.
d. Insert alt text.

Answers

Answer 1

Add an alt text. By providing a description of the image that assistive technology like screen readers can interpret, alt text (alternative text) enables people with visual impairments to comprehend the information.

Which tool should you use before publishing a document if you want to find problems that might make it hard for people to understand it?

A tool called the Accessibility Checker scans your material and alerts you to any accessibility problems it finds.

Which view in Microsoft Word enables you to see your document exactly as it will appear on paper?

You might want to use Microsoft Word's Print Layout view, which shows your document exactly how it will appear on paper with margins, page breaks, and other visual components.

To know more about technology  visit:-

https://brainly.com/question/20414679

#SPJ1


Related Questions

In the space provided, analyze the pros and cons of becoming a member of an artistic guild. Your answer should be at least 150 words. I need help on this in less than an 1 hour. make sure its for edge2020.

Answers

Answer:

As with almost everything in life, membership of an artistic guild comes with its pros and cons.

Explanation:

PROS

Protection:It is impossible to gain access to somethings in the industry as a stand-alone artist. Membership of the guild ensures for instance that one is guaranteed a minimum wage at the least.Many artists are given premium treatment when they are being engaged but treated like lepers when its time to pay-up for services rendered. Guild membership helps to correct that.Other benefits for those in paid jobs include but are not limited to Healthcare and Pension.Arts in most of it's forms as well as credits for same,. are very easy to steal Guild membership also guarantees that the artist gets and enjoys the benefits of getting the credit for their work.For newcomers into the industry, joining a guild guarantees a soft landing as well ease of access /navigation through the industry, information and networking opportunities.Reward from creative rights are also great incentives for joining an artistic guild

Residuals

Residuals are financial compensation paid to artists especially those in the moVie industry such as actor, directors and other personnel involved in the makting of a particular movies, and or Television show whenever such works are streamed online, watched at a cinema, re-run or further distributed via other means.

Most non-guild artists may never get such wonderful incentives. However, membership to a guild can guarantee that they do because most guilds are involves in the formation, and compliance with these kind of industry regulations.

CONS

Strong Control Over ones Career/JobBecause the guild is powerful and highly networked, they can decide whether or not you get to keep a job, whether or not the company you work for remains part of the guild etc.In many cases, if ones organization is not yet a member of the guild, they can insist that you cannot become a member until the organization that has just hired you joins the guild

Members are required to pay dues

what are the 6 causes of network problem

Answers

Answer:

Misconfiguration. Misconfiguration is the cause of as many as 80% of unplanned outages.

Security breaches.

Old equipment.

Human error.

Incompatible changes.

Hardware failures.

Power failures.

Mark brainiest

To convert microseconds to nanoseconds: a. Take the reciprocal of the number of microseconds. b. Multiply the number of microseconds by 0.001. c. Multiply the number of microseconds by 0.000001. d. Multiply the number of microseconds by 1,000. e. Multiply the number of microseconds by 1,000,000.

Answers

Answer: D. Multiply the number of microseconds by 1,000.

Explanation:

In order to convert microseconds to nanoseconds, it should be noted that one should multiply the number of microseconds by 1,000.

For example, if we want to convert 12 microseconds to nanoseconds. This will be:

= 12 × 1000

= 12000 nanoseconds.

Therefore, with regards to the information given above, the correct option is D.

Overview
In this program, you will use incremental development to manipulate a list. Objectives Be able to:
Get a list of numbers Display the individual numbers of a list
Find the average and maximum of the numbers in a list Perform calculations on a number in a list Sort a list Description
Prompt the user for how many weights should be added to a list and get the weights (in pounds) from the user, one at a time.
Display the weights back to the user, along with the average and maximum weight.
Next, ask the user for a list location and convert the weight at that location to kilogra ms.
Next, display the sorted list. And finally, display the list of weights again, along with what the weights would be on Mars. One run of the full program is as follows:
Enter the number of weights: 4
Enter weight 1: 236.0
Enter weight 2: 89.5
Enter weight 3: 176.0
Enter weight 4: 166.3
Weights: [236.0, 89.5, 176.0, 166.3]
Average weight: 166.95
Max weight: 236.00
Enter a list location (1 - 4): 3
Weight in pounds: 176.00
Weight in kilograms: 80.00
Sorted list: [89.5, 166.3, 176.0, 236.0]
Weight on Earth: [89.5, 166.3, 176.0, 236.0]
Weight on Mars: [33.9, 62.9, 66.6, 89.3]
Think about how you would do this before you continue reading.
Come up with a very rough draft of how you would create this program.
Then see if it follows the same logic presented here.
If you do not know where to start, read the first step below and then try to construct the rest of the program on your own. Commonly, the hardest part of writing a program is knowing where to start. Try to begin without using the guide below. If you need more information on how to convert pounds to kilograms or how to convert the weight on earth to the weight on Mars, look at steps 4 and 6 below.
(1) Prompt the user for the number of weights and then prompt the user to enter the numbers, each corresponding to a person's weight in pounds. Store all weights in a list. Output the list. Ex: Enter the number of weights: 4 Enter weight 1: 236.0 Enter weight 2: 89.5 Enter weight 3: 176.0 Enter weight 4: 166.3 Weights: [236.0, 89.5, 176.0, 166.3]
(2) Output the average of the list's elements with two digits after the decimal point. Hint: Use a conversion specifier to output with a certain number of digits after the decimal point.
(3) Output the max list element with two digits after the decimal point. Ex: Enter the number of weights:
4 Enter weight 1: 236.0 Enter weight 2: 89.5 Enter weight 3: 176.0 Enter weight 4: 166.3 Weights: [236.0, 89.5, 176.0, 166.3] Average weight: 166.95 Max weight: 236.00
(4) Prompt the user for a number between 1 and the number of weights in the list. Output the weight at the user specified location and the corresponding value in kilograms. 1 kilogram is equal to 2.2 pounds. Ex: Enter a list location (1 - 4): 3 Weight in pounds: 176.00 Weight in kilograms: 80.00
(5) Sort the list's elements from least heavy to heaviest weight. Ex: Sorted list: [89.5, 166.3, 176.0, 236.0]
(6) Create another list for the weights on Mars. To compute weight on Mars, take the weight on Earth and divide by Earth's gravitational force, which is 9.81. Then multiply by the Mars gravitational force, which is 3.711. Use the built in Python function round() to round the Mars weights to 1 decimal point. Print out each set of weights as follows: Ex: If the sorted list of weights is [89.5, 166.3, 176.0, 236.0] Weight on Earth: [89.5, 166.3, 176.0, 236.0] Weight on Mars: [33.9, 62.9, 66.6, 89.3]
(7) Congratulate yourself on a job well done!

Answers

Answer:

The program in Python is as follows:

num_weight = int(input("Weights: "))

Weights = []

totalweight = 0

for i in range(num_weight):

   w = float(input("Weight "+str(i+1)+": "))

   Weights.append(w)

   totalweight+=w

print("Weights: ",Weights)

print('Average Weight: %.2f' % (totalweight/num_weight))

print('Maximum Weight: %.2f' % max(Weights))

num = int(input("Enter a number between 1 and "+str(num_weight)+": "))

print('Weight in kg: %.2f' % Weights[i-1])

print('Weight in lb: %.2f' % (Weights[i-1]/2.205))

Weights.sort()

print("Sorted weights: ",Weights)

weight_on_mars = []

for i in range(num_weight):

   weight_on_mars.append(round((Weights[i]/9.81 * 3.711),1))

print("Weights on mars: ",weight_on_mars)

print("Congratulations")

Explanation:

This gets the number of weights

num_weight = int(input("Weights: "))

This initializes the weights

Weights = []

This initializes the total weight to 0

totalweight = 0

The iterates through the number of weights

for i in range(num_weight):

This gets each weight

   w = float(input("Weight "+str(i+1)+": "))

This appends the weight to the list

   Weights.append(w)

This calculates the total weights

   totalweight+=w

This prints all weights

print("Weights: ",Weights)

Calculate and print average weights to 2 decimal places

print('Average Weight: %.2f' % (totalweight/num_weight))

Calculate and print maximum weights to 2 decimal places

print('Maximum Weight: %.2f' % max(Weights))

Prompt the user for input between 1 and the number of weights

num = int(input("Enter a number between 1 and "+str(num_weight)+": "))

Print the weight at that location in kg and lb

print('Weight in kg: %.2f' % Weights[i-1])

print('Weight in lb: %.2f' % (Weights[i-1]/2.205))

Sort weights and print the sorted weights

Weights.sort()

print("Sorted weights: ",Weights)

Create a new list for weights on mars

weight_on_mars = []

The following populates the list for weights on mars

for i in range(num_weight):

   weight_on_mars.append(round((Weights[i]/9.81 * 3.711),1))

Print the populated list

print("Weights on mars: ",weight_on_mars)

print("Congratulations")

A computer is using a fully associative cache and has 216 bytes of memory and a cache of 64 blocks, where each block contains 32 bytes.

Required:
a. How many blocks of main memory are there?
b. What is the format of a memory address as seen by the cache, that is, what are the sizes of the tag and offset fields?
c. To which cache block will the memory address F8C9 (subscript) 16 map?

Answers

1) The number of blocks of main memory that are there are;

2^16/32 = 2^16/2^5 = 2^11

2) The format of a memory address as seen by the cache,that is the sizes of the tag and offset fields are;

16 bit addresses with 11 bits also in the tag field and the 5 bits in the word field.

3) The cache block that the memory address F8C9 (subscript) 16 map;

Since it is an associative cache, it can actually map anywhere.

That is, it has the ability of mapping anywhere.

With suitable example, illustrate the use of #ifdef and #ifndef.

Answers

Partitions are used to divide storage spaces into manageable segments.

Fixed partitions have a predetermined size, and they are used to allocate storage space based on the needs of an application. Fixed partitions are commonly used in mainframe systems, where applications require predictable amounts of storage.

For example, consider an organization that uses a mainframe system to manage its payroll. In this scenario, the organization may use fixed partitions to allocate storage space to the payroll application, ensuring that it has access to a specific amount of storage space at all times.

On the other hand, dynamic partitions allow the operating system to allocate storage space based on the requirements of an application. With dynamic partitions, the size of the partition is not fixed, and it can grow or shrink based on the needs of an application.

For example, consider a personal computer that is used to store and manage different types of data. In this scenario, dynamic partitions are used to allocate storage space to different applications based on their storage requirements.

As new applications are installed, the operating system dynamically allocates storage space to ensure that each application has sufficient storage space to function properly.

To know more about Partitions visit:

brainly.com/question/31672497

#SPJ1

TRUE OR FALSE A content filter is essentially a set of scripts or programs that restricts user access to certain networking protocols and Internet locations. The RADIUS system decentralizes the responsibility for authenticating each user by validating the user's credentials on the NAS server.

Answers

A content filter is essentially a set of scripts or programs that restricts user access to certain networking protocols and Internet locations is a true statement.

What does network protocol mean?

An established set of guidelines that govern how data is transferred between various devices connected to the same network is known as a network protocol. Essentially, it makes it possible for connected devices to communicate with one another regardless of differences in their inner operations, organizational systems, or aesthetics.

Which 4 types of protocol are there?

Protocol for Transmission Control (TCP) Network Protocol (IP) Datagram Protocol for Users (UDP) Standard Postal Protocol (POP)

To know more about network protocols visit:

https://brainly.com/question/13327017

#SPJ4

what is descriptive research​

Answers

Answer:

Descriptive research is used to describe characteristics of a population or phenomenon being studied. It does not answer questions about how/when/why the characteristics occurred. Rather it addresses the "what" question

3. Rearrange the mixed up process of logging into an email account in the right order.
a. Click on sign in
b. Type the website address of the email service provider.
c. Enter your ID and password
d. Open the web browser.
e. Click on the mail link.

Answers

To log into an email account, the following steps should be taken in order:

The Steps to be takenOpen the web browser.Type the website address of the email service provider.Click on the mail link.Click on sign in.Enter your ID and password.

First, open the web browser and type the website address of the email service provider into the address bar. Then, click on the mail link to go to the email login page.

Next, click on the sign-in button to access the login page. Finally, enter your ID and password in the respective fields to log in successfully.

Read more about emails here:

https://brainly.com/question/29515052

#SPJ1

PLS HELP WILL MARK BRAINLINESS AND 30 POINTS
In your own words in at least two paragraphs, explain why it is important, when developing a website, to create a sitemap and wireframe. Explain which process seems most important to you and why you feel most drawn to that process.

(i.e. paragraph one is why is it important and paragraph two is which process felt most important to you and why)

Answers

When creating a website, it is important to create a sitemap so that a search engine can find, crawl and index all of your website's content. a sitemap makes site creation much more efficient and simple. A sitemap also helps site developers (assuming you have any) understand the layout of your website, so that they can design according to your needs.

A wireframe is another important step in the web design process. Creating a website is like building a house. To build the house, you first need a foundation on which to build it upon. Without that foundation, the house will collapse. The same goes for a website. If you create a wireframe as a rough draft of your website before going through and adding final touches, the entire design process will become much easier. If you do not first create a wireframe, the design process will be considerably more difficult, and you are more likely to encounter problems later on.

To me, the wireframe is the most important due to the fact that is necessary in order to create a good website. In order to create a sitemap, you first need a rough outline of your website. Without that outline, creating a sitemap is impossible.

Which word-processing feature provides a quick way to execute commands without using your mouse?

Print Preview
Keyboard Shortcuts
Find and Replace
Spelling and Grammar​

Answers

The word-processing feature that provides a quick way to execute commands without using your mouse are Keyboard Shortcuts. The correct option is B.

What are keyboard shortcuts?

A hot key is a key or combination of keys on a computer keyboard that, when pressed all at once, performs a task (such as starting an application) faster than a mouse or other input device.

Hot keys are also known as shortcut keys. Many operating systems and applications support hot keys.

Click to start the selection, then hold down the left mouse button and drag the pointer over the text you want to select.

Click twice anywhere in the word. Click after moving the pointer to the left of the line until it changes to a right-pointing arrow.

Thus, the correct option is B.

For more details regarding keyboard shortcuts, visit:

https://brainly.com/question/12531147

#SPJ1

Answer:

its B Keyboard Shortcuts Explanation: i did the test ;/

What feature allows a person to key on the new lines without tapping the return or enter key

Answers

The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap

How to determine the feature

When the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.

In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.

This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.

Learn more about word wrap at: https://brainly.com/question/26721412

#SPJ1

If an image has only 4 colors, how many bits are necessary to represent one pixel’s color in RGB?

Answers

Answer:

Form is the overall structure of the visual elements of a piece. Form can be represented by four categories: representational, objective, realistic, and naturalist.

Explanation:

brainliest

With the evolution of RFID instead of UPC, how will this capability make the production grow and improve inventory and security? Give two examples of RFID applications in business.

Answers

Answer:

RFID in a business setting as keycards to enter into specific rooms and Elevator control. RFID will eventually have more applications and security then Barcode.

Explanation:

create a visual python quiz that pops up when you run the code

Answers

Refer to the attachment!!

create a visual python quiz that pops up when you run the code

ANSWER ASAP! Which statements are true? Select 4 options.


A function can have many parameters.


A function can have a numeric parameter.


A function can have only one parameter.


A function can have a string parameter.


A function can have no parameters.


Please answer asap. Thank you.

Answers

Answer:

A,B,D and E are true

Explanation:

In many if not all programming languages, a function can have zero or more parameters of arbitrary type.

i have no idea how to get this answer, but here.

edge 2021

ANSWER ASAP! Which statements are true? Select 4 options.A function can have many parameters.A function

How are BGP neighbor relationships formed
Automatically through BGP
Automatically through EIGRP
Automatically through OSPF
They are setup manually

Answers

Answer:

They are set up manually

Explanation:

BGP neighbor relationships formed "They are set up manually."

This is explained between when the BGP developed a close to a neighbor with other BGP routers, the BGP neighbor is then fully made manually with the help of TCP port 179 to connect and form the relationship between the BGP neighbor, this is then followed up through the interaction of any routing data between them.

For BGP neighbors relationship to become established it succeeds through various phases, which are:

1. Idle

2. Connect

3. Active

4. OpenSent

5. OpenConfirm

6. Established

Victor and Ellen are software engineers working on a popular mobile app. Victor has been in his position for 10 years longer than Ellen, who is a recent graduate. During the development of a new feature, Ellen expressed her concern that VIctor's proposed code would create instability in the app. Victor told Ellen he would address her concern with their supervisor. When Victor met privately with his supervisor, he claimed that he had discovered the problem, and that Ellen had dismissed it. Which principle of the Software Engineering Code of Ethics has Victor violated

Answers

Victor violated principle 7: Colleagues of the Software Engineering Code of Ethics

A code of ethics reaffirms an organization's ethical conducts and morals so that workers, as well as, third parties are aware of the expectations they must meet.

A code of ethics' objective is to instruct persons functioning on behalf of an organization on how they should act.

The attitude of Victor towards her junior colleague (Ellen) is unjust and dishonest since Victor has claimed the credit meant to be for Ellen.

Therefore, we can conclude that Victor has violated principle 7: Colleagues of the Software Engineering Code of Ethics.

Learn more about the code of ethics here:

https://brainly.com/question/18401975

Which of the following had already existed in Africa before the Portuguese arrived?
A. Widespread practice of Christianity
B. The Triangle trade
C. European colonialism
D. Extensive trade networks

Answers

Answer:

D. Extensive trade networks

Explanation:

Trade in in raw materials as well as manufactured goods and other items was already established in Africa before the coming of the Europeans. There were already many trade routes by which African Kingdoms traded in diverse commodities in many renowned kingdoms of Africa before the Trans-Atlantic slave trade.

Trading was carried out on land and by waterways, these existing trade network enabled the Europeans to have access to Africa . Without these existing trade routes, the penetration of the Europeans would have been more challenging.

Answer:

The answer is D. Exstensive trade networks

Explanation:

I just took the test it is correct :)

If you're a beginner to data analysis, what is the first thing you should check when you build data queries?
a. workflow diagrams
b. calculations
c. differentials
d. record counts

Answers

D. Record Counts, trust me I took notes on this and it’s also in my quizlet

A(n) ___loop is a special loop that is used when a definite number of loop iterations is required.
O a. for
O b. do...while
O c. else
O d. while

Answers

Answer: A

Explanation:

for is used when you're talking in terms of repeating loops for a finite number of times.

do... while is used when describing something to do while a variable is equal to something, else is used when a variable isn't what was defined in a while statement, and while is used when you want something to repeat while a variable is equal to something.

The instruction format of a computer is given by one indirect bit, opcode bits, register address bits, immediate operand bits and memory address bits. It occupies one memory word of 64 bits.
a- How many memory addresses can be generated if the memory size is 1 Giga Bytes (Giga-2)? Number of addresbits Number of addresses
b- Complete the missing fields in the following instruction format, given that the number of opcodes is 128, the immediate operand field occupies 24 bits and the instruction occupies one memory word Opcode Register address Immediate operand Memory address
c- If the immediate value is increased by combining it with the address field in the above instruction. Find the largest positive and smallest negative immediate values that can be stored on the address field, before and after combining it with the address field. Range before combining (+ Range after combining-+

Answers

Answer:

Following are the answer to this question:

Explanation:

A)

The memory size is 1 Giga Bytes which is equal to \(2^{30}\)

\(\texttt{Number of address bits \ \ \ \ \ \ \ \ \ \ \ \ \ \ Number of addresses}\\\\ \ \ \ \ 30 \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 2^{30}= 1073741824\)

B) \(\texttt{I \ \ \ Opcode \ \ \ Register address \ \ \ Immediate operand \ \ \ Memory address}\\\\\\\textt{1 \ bit \ \ \ \ \ \ 128 \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 2 \ bits \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 24 \ bits \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 30 \ bits}\\\\\\\)            \(= 2^7 \\\\ = 7 \ bits\)

calculating the register Bits:

\(= 64-(1+7+24+30)\\\\=64 -62\ \ bits\\\\= 2\ \ bits\\\)

C)

Immediate value size while merging the additional benefit with the address field:

\(= 2^{24} + 2^{30}\\\\= 2^{54}\\\\\)\(\texttt{Range before combining(-,+) 24 bits \ \ \ \ \ \ Range after combining( -,+)54bits}\\\\\)                         \(\textt{-2^{12} from + (2^{12}-1) \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ -2^{27} from + (2^{27}- 1)}\)

\(= \frac{24}{2} = 12\\\\= \frac{54}{2} = 27\)

The range is accomplished by dividing the bits by 2 into the two sides of the o and the number is one short to 0.

Excel Question!!!

What is the difference between function and formula in Microsoft Excel? Provide an example of each.

Answers

Answer:

A function is a pre-programmed calculation, whereas a formula is a user-defined calculation. A single function could be used in a formula.

Explanation:

if you add =AVERAGE(A1:A56), that is a formula, using the AVERAGE function. If you enter =SUM(G4+A5) - 25 * MIN(B3:B6), that is a formula which uses both the SUM function and the MIN function, as well as standard mathematical operators (-, +, *).

how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address

Answers

Answer:

The answer is "14".

Explanation:

Let the IP address \(= 196.45.204.0\)

When it borrowed 4 bits

\(\therefore\\\\ subnet = 28\)

\(IP= \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000\)

If the borrowed bits are left out then:

The Number of useable host addresses:

\(= {(2^4) - 2} \\\\ = 16-2\\\\ =14\)

why use a chart legend?

Answers

Answer:

A legend or key helps the user build the necessary associations to make sense of the chart.

Explanation:

Legends summarize the distinguishing visual properties such as colors or texture used in the visualization.

How many NOTS points are added to your record for not completely stopping at a stop sign?

Answers

The number of NOTS points added to your record for not completely stopping at a stop sign can vary depending on the location and laws of the jurisdiction where the traffic violation occurred. It is important to note that not stopping fully at a stop sign is a serious safety violation, and it can result in a traffic ticket, fines, and possible points on your driver's license record.

In some jurisdictions, failing to stop at a stop sign can result in a citation for running a stop sign or a similar violation. In other jurisdictions, it may be categorized as a failure to obey traffic signals or a similar violation. The number of NOTS points added to your record, if any, will depend on the specific violation charged and the point system used by the jurisdiction in question.

It's important to note that NOTS points are used to track and measure the driving record of a driver, and they may impact insurance rates and license status. It's always a good idea to familiarize yourself with the laws and regulations in your area and drive safely to reduce the risk of violations and penalties.

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the decrypted number is R. Are the identities of Alice and Bob verified in this protocol?

Answers

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

What is public and private key in SSL?

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

https://brainly.com/question/8782374

can
A selection statement specifies that an action is to be repeated while some condition remains true.

Answers

A selection statement specifies that an action is to be repeated while some condition remains true is a true statement.

When a condition is still true, does the selection statement repeat the action?

Code (statements) that are said to executed only when a specific condition is met are known as selection statements, sometimes known as conditional statements. A strong tool for managing the execution of code statements is selection.

Therefore, one can say that when a condition is still true, an action is to be repeated, according to a selection statement.

Learn more about selection statement from

https://brainly.com/question/13438284
#SPJ1

A selection statement specifies that an action is to be repeated while some condition remains true. True or false

some context free languages are undecidable

Answers

yess they are and have been for awhile although they’re already
Other Questions
How many hydrogen atoms are in 2NH(4)4 is a subscript What are 5 facts about the Second Amendment? Why is it important to identify the purpose of a piece of writing? Below is the graph of y=b^x. Find b.b= motown music was founded by barry gordy out of a combination of ""motion"" and ""town"" to indicate his intent that the company would move up in the business world. what is the state of matter for sand and water Juan and Patti decided to see who could read the most books in a month. They began to keep track after Patti had already read 5books that month. This graph shows the number of books Patti read for the next 10 days.Number of Books ReadBooks25201510505-X0 1 2 3 4 5 6 7 8 9 10DayIf Juan has read no books before the fourth day of the month and he reads at the same rate as Patti, how many books will he haveread by day 12?100 15O 20 The data set for a random sample of 10 baseball player's heights compared to their shoe sizes is summarized in the table.Shoe Size (U.S.) Height (inches)7 6410 6912 728 679.5 6910 7011.5 7512.5 7313.5 7110 68Part A: What is the equation of the least-squares regression line? (4 points)Part B: If a baseball player wears a size 9 and is 71 inches tall, what is their residual? Show all mathematical work. (3 points)Part C: Interpret the meaning of the residual from part B. (3 points) What is the best response to the following?"I'm having trouble setting up my roku. Can you please help? Looking forward to your response. Sincerely, Betty." Anthropological research of gender roles in many cultural settings around the world show that? Compose a persuasive email to your course instructor regarding any course-related matter. Use five components of email (correct address, subject, message text, mention of attachment if any, and signature) and apply all the principles of the effective message, you studied in chapter 13. For this exemplary email assignment, you may suppose any situation, issue, or suggestion to discuss with the instructor. a girl attempts to swim directly across a stream 15 meters wide. when she reaches the other side, she notices she also drifted 15 meters downstream. the magnitude of her displacement is closest to... an over-emphasis on state sovereignty creates which of the following problems from a classic liberal perspective? TRUE/FALSE. though hospice care can be provided in the home, an inpatient respite facility, or general inpatient care, the most frequently encountered mode of care is the acute inpatient setting. Choose the print statement that generates ['a', 'd'] as the output for my_list = ['a', 'b', 'c','d', 'e','f','g'] a. print(my_list[O:5:2])b.print(my_list[0:-1:3])c.print(my_list[0:-2:2]) d.print(my_list[1:-2:2]) 77^Why is randomization important?Select the statement that best answers the question.to ensure all treatment groups receive experimental unitsto ensure all treatment groups are roughly equivalent regarding the experimental unitsto ensure that all treatment groups are roughly equivalent regarding the variability within the experimental units4) IntroEnglish What is the name given to the type of fever in which the temperature fluctuates minimally but always remains elevated? Find the axis of symmetry of the parabola. Y=2x^2+4x-1 Between which two consecutive integers is [tex]\sqrt{201}[/tex] According to Keynes, once a system attains an economywide equilibrium, ______A) there may or may not be excess productive capacity. B) planned investment will be zero.C) the economy will be at full productive capacity.D) planned consumption will be zero.