answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Colt1911 [192]
2 years ago
11

If you were teaching a fellow student to use software for the first time and the software had many built-in hotkeys, would you f

ocus on teaching them hotkey commands or menu-based commands? What about that teaching style (or learning style) works best for you? What do you see as the relative benefits and drawbacks of your preferred teaching style?
Computers and Technology
1 answer:
Liula [17]2 years ago
5 0

Answer:

Hotkey commands

Explanation:

It would be easier and more efficient in the long run to use hotkeys.

You might be interested in
As in algebra, you can use brackets to override the order of operations Excel follows to perform formula calculations. True or f
sertanlavr [38]

Answer:

false

Explanation:

parasynthesis is used to change the order of priority.

6 0
2 years ago
Juan, a network user, sends an email to you, the IT admin of the network, stating that his account is locked because he has lost
slamgirl [31]

Answer:

The correct answer to the following question is Option D.

Explanation:

Already when we authorize an individual to set up a new credential or provide a provisional code or password, we must make ensure that the person is checked. We could allow a verification code after confirming the consumer.

  • Verification remains crucial because an imposter may try to compromise to provide a temporary credential or switch his password by posing as a further person.
  • So, Juan fixes his problem by making sure whether resetting the password has always been allowed by checking that Juan is the one that he claims he is.

8 0
2 years ago
Assume there is a machine with the IP address 129.82.102.63 with netmask /23, and with a parent NW whose netmask is 255.255.224.
blagie [28]

Complete question is:

Assume there is a machine with the IP address 129.82.102.63 with netmask /23, and with a parent NW whose netmask is 255.255.224.0.

For each answer, do not include any spaces, give full IP addresses/netmasks where these are requested, give the "/" as part of the answer for slash notation.

a. What is the parent NW's netmask in dotted decimal notation?  

b. What is the parent NW's netmask in slash notation?  

c. What is the child NW's (subnet's) netmask in dotted decimal notation?  

d. What is the child NW's (subnet's) netmask in slash notation?  

e. How many bits are there for host # portion for the parent NW? (Another way to say the same thing is How many bits do we manage - on the parent NW?)  

f. How many bits are there for NW# portion (within the parent address space) for the subnet?

g. How many bits are there for host # portion for the subnet?  

h. How many addresses can we assign to machines/interfaces on this subnet?

Answer:

a. 255.255.224.0

b. /19

255.255 amounts to 16 bits being 1. .224 means 3 more bits are 1. So, in total 19 bits are 1. Hence, total network bits are 16 + 3 = 19.

c. 255.255.254.0

/23 means 8 + 8 + 7 that means

first 2 octets are 1s and 7 bits out of the 3rd octet are 1s. Hence, /23 means 255.255.254.0

d. /23

e. 13 bits are reserved for hosts

Parent network mask is /19, so total 32-19 = 13 bits

f. 19 bits are reserved for the network in the parent address.

g. 9 bits

Subnetwork's mask is /23, so total 32-23 = 9 bits for the host portion.

h. Since 9 bits are reserved for hosts, a total of 29 -2 = 510 machines can be assigned the IP addresses. Two addresses will be network and broadcast addresses for the subnet that can't be allocated to any device.

Explanation:

3 0
2 years ago
Assignment 1 is to write a program that will write the lyrics to "X number of beers on the wall". Use only the main method. Prom
g100num [7]

Answer:

// here is code in java.

import java.util.*;

class Main

{

// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

       // variable to store the number of bottles

       int num_bot;

        Scanner scr=new Scanner(System.in);

        System.out.print("Enter number of bottles of beer on the wall:");

        //read the number of bottles

        num_bot=scr.nextInt();

        // print the output

        for(int i=num_bot;i>0;i--)

        {

         // print the first statement

         System.out.println(i+" beer bottles on the wall");

         // print the second statement

         System.out.println(i+" beer bottles . Take 1 down and pass the bottle around.");

         }

         // when there is 0 bottle

           System.out.println("0 bottles of beer on the wall.");

   }catch(Exception ex){

       return;}

}

}

Explanation:

Declare a variable "num_bot" to store the initial number of beer bottles.Then ask user to give number of bottles.Run a for loop to pass a beer bottle until there is 0 bottle on the wall. When number of bottle is 0 then it will print there is "0 bottle on the wall".

Output:

Enter number of bottles of beer on the wall:3

3 beer bottles on the wall

3 beer bottles . Take 1 down and pass the bottle around.

2 beer bottles on the wall

2 beer bottles . Take 1 down and pass the bottle around.

1 beer bottles on the wall

1 beer bottles . Take 1 down and pass the bottle around.

0 bottles of beer on the wall.

4 0
2 years ago
Which programming element is used by a game program to track and display score information?
lubasha [3.4K]
I think is Variablesss
7 0
2 years ago
Read 2 more answers
Other questions:
  • Python comes with ________ functions that have been already prewritten for the programmer.
    5·1 answer
  • Write a program in c or c++ to perform different arithmeticoperation using switch statement .the program will take two inputinte
    10·1 answer
  • Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA
    5·1 answer
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • Database management systems are expected to handle binary relationships but not unary and ternary relationships.'
    7·1 answer
  • Which broad area of data mining applications analyzes data, forming rules to distinguish between defined classes?
    13·1 answer
  • Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
    11·1 answer
  • Doctors discovered a tumor in Amanda’s brain and used robotic surgery to remove it. Which best describes the role a worker in th
    15·2 answers
  • Assume each student is assigned an advisor from a department. Each classroom is assigned a classroom (class# determines Classroo
    14·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!