discribe two ways to zoom in and out from an image

Answers

Answer 1

Option 1: Spread your fingers on your laptop's trackpad.

Option 2: Press Command (or control) and the + sign.

Hope this helps!

Have a wonderful day!


Related Questions

Which of the following are examples of third party software that banks use? (Select all that apply.)
A -compliance reporting
B -unencrypted Microsoft Suite
C -accounting software
D -customer relationship management

Answers

Answer:

c , it is a correct answer for the question

How does a computer work? Explain with an example. ​

Answers

Answer:

A computer system works by combining input, storage space, processing, and output. ... For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

Part 1 - Write the ingredients list to a file (10 points) Modify the program you developed for Lab 5 to make it output the data in the same format to a text file cake_ingredients_list.txt Note: Writing to a file is easier to code, so let's do that first. Hints: After the file has been opened, call the .write() function to write one line at a time to the file, in almost the exact fashion as calling print

Answers

Answer:

Explanation:

I do not have access to the ingredients list so instead I created the list and added the ingredients needed to make a cake. Then I used a for loop to loop throught the ingredients in the list and the .write() method to write the data to a text file with the same name as in the question. The code was tested and the output to the file can be seen in the attached image below.

ingredients = ['sugar', 'butter', 'eggs', 'vanilla', 'flour', 'baking powder', 'milk']

file = open('cake_ingredients_list.txt', 'w')

for ingredient in ingredients:

   file.write(ingredient + '\n')

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the
difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400
Some example leap years are 1600, 1712 and 2016.
Write a program that takes in a year and determines whether that year is a leap year.
Ex If the input is
1712
the output is
1712 13 leap year.
Ex If the nouts
1913
the outoutis
1913 not leap year.
Written is Coral Language

Answers

Answer:

integer userInput

userInput = Get next input

if userInput % 400 == 0

  Put userInput to output

  Put " is a leap year" to output

else

  if userInput % 4 == 0

     Put userInput to output

     Put " is a leap year" to output

  else

     Put userInput to output

     Put " is not a leap year" to output

Explanation:

I don't know what is so special about Coral but here we go. I couldn't find and IDE that supported Coral so I just used their Coral simulator on their website. The first if statement on line 5 determines if the number is divisible by 400. If so, the leap year is on a century year e.g 1900 1800. If not, the else statement will be executed and the second if statement will execute. If the number is divisible by 4, it is a leap year. If not, the else statement gets executed in which case the number was not a century leap year or a leap year. After that the program terminates.

Hope this helped :)  If it didn't let me know and I do my best to find out what went wrong.

Have a good day :)

what is IBM 1401 used for? Write your opinion.​

Answers

Explanation:

The 1401 was a “stored program computer,” allowing programmers to write (and share) applications loaded into the machine from punched cards or magnetic tape, all without the need to physically reconfigure the machine for each task.

How do l write a program which countdown from 10 to 3​

Answers

Answer:

use loop

for(int i =10;i>2; i--)

{

System.out.println(i+"\n")

}

What are some 5 constraints in using multimedia in teaching​

Answers

Answer:

Explanation:

Technological resources, both hardware and software

Technological skills, for both the students and teacher

Time required to plan, design, develop, and evaluate multimedia activities

Production of multimedia is more expensive than others because it is made up of more than one medium.

Production of multimedia requires an electronic device, which may be relatively expensive.

Multimedia requires electricity to run, which adds to the cost of its use

There are constraints in using multimedia in teaching​; The Technological resources, both hardware and software Also, Technological skills, for both the students and teacher

What is a characteristic of multimedia?

A Multimedia system has four characteristics and they are use to deliver the content as well as the functionality.

The Multimedia system should be be computer controlled. The interface is interactive for their presentation and lastly the information should be in digital.

There are constraints in using multimedia in teaching​;

The Technological resources, both hardware and software

Also, Technological skills, for both the students and teacher

Since Time required to plan, design, develop, and evaluate multimedia activities

The Production of multimedia is more expensive than others because it is made up of more than one medium.

The Production of multimedia requires an electronic device, which may be relatively expensive.

The Multimedia requires electricity to run, which adds to the cost of its use.

Learn more about multimedia here;

https://brainly.com/question/9774236

#SPJ2

1. Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the letters that make up the word can be arranged.
2. Convert the pseudocode in question one to JavaScript and test your program.

Answers

Answer:

1)Pseudocode:-

Prompt user to enter string

Pass it to combination function which can calculate the entire combination and can return it in an array

In combination method -

Check if the string is length 2 size ie of 0 or 1 length then return string itself

Else iterate through string user entered

Get the present character within the variable and check if the variable is already used then skip

Create a string from 0 to i the index + (concatenate) i+1 to length and recursive call combination function and pass this string and store end in subpermutation array

For each recursive call push character + sub permutation in total arrangement array.

2)Code -

function combinations(userStr) {

   /* when string length is less than 2 then simply return string */

   if (userStr.length < 2) return userStr;

   /* this array will store number of arrangement that word can be stored */

   var totalArrangements = [];

   /* iterate through string user enter  */

   for (var i = 0; i < userStr.length; i++) {

       /* get the current  character  */

       var character = userStr[i];

       /*check if character is already used than skip  */

       if (userStr.indexOf(character) != i)

           continue;

       /* create a string and concanete it form  0  to i index and i+1 to length of array   */

      var str = userStr.slice(0, i) + userStr.slice(i + 1, userStr.length);

       /* push it to totalArrangments  */

       for (var subPermutation of combinations(str))

           totalArrangements.push(character + subPermutation)

   }

   /* return the total arrangements */

   return totalArrangements;

}

/* ask user to prompt string  */

var userStr = prompt("Enter a string: ");

/* count to count the total number of combinations */

let count = 0;

/* call function the return tolal number of arrangement in array */

totalArrangements = combinations(userStr);

/* print the combination in console  */

for (permutation of totalArrangements) {

   console.log(permutation)

}

/* total combination will be  totalArrangements.length */

count = totalArrangements.length;

/*print it to console  */

console.log("Total combination " + count)

Output:-

The analog computer deals directly with

Answers

continuously variable aspects of physical phenomena such as a electrical, mechanical etc.

The analog computer deals directly with measured values of continuous physical magnitude.

What is an Analog computer?

An analog computer may be defined as a type of computer that is significantly used to process analog data. These computers store data as a continuum of physical quantities and perform calculations using measurements.

It is completely different from digital computers, which use symbolic numbers to represent results. are great for situations that require data to be measured directly without conversion to numbers or codes. Analog computers, although readily available and used in scientific and industrial applications such as control systems and aircraft, have largely been superseded by digital computers due to the many complications involved.

Therefore, the analog computer deals directly with measured values of continuous physical magnitude.

To learn more about Analog computers, refer to the link:

https://brainly.com/question/18943642

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

The analog computer deals directly with:

number or codes.measured values of continuous physical magnitude.signals in the form of 0 or 1.signals in discrete values from 0 to 9

What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sensitive information is stored in one secure place, or a distributed model, where information is spread around in many different places?

Answers


Co-Ordination Difficulty: ...
Waste of Resources: ...
Larger Interests of the Enterprise Neglected: ...
Emergency Decision not Possible: ...
Lack of Qualified Managers: ...
Certain Activities Decentralization not Possible:

Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using

Answers

Answer:

I'll let you make an educated guess off of this info! You always retain info better making an inference on a subject that you are having trouble with!

Explanation:

There are four types of wireless networks -- wireless local area networks, wireless metropolitan area networks, wireless personal area networks and wireless wide area networks -- each with its own function.

wireless local area network

A wireless local area network (WLAN) is a wireless distribution method for two or more devices. WLANs use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection.

wireless metropolitan area network

A metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN).

wireless personal area network

A PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants. PANs can be used for communication among the personal devices themselves, or for connecting to a higher level network and the Internet where one master device takes up the role as gateway.

wireless wide area network

Wireless wide area network (WWAN), is a form of wireless network. ... WWAN connectivity allows a user with a laptop and a WWAN card to surf the web, check email, or connect to a virtual private network (VPN) from anywhere within the regional boundaries of cellular service.

I hope this helped!!

shania

The network type Genevieve uses is a wireless local area network.

What is a wireless local area network?

A wireless local area network (WLAN) exists as a wireless distribution procedure for two or more devices. WLANs utilize high-frequency radio waves and often contain an access issue to the Internet. A WLAN permits users to move around the coverage area, often a house or small office, while preserving a network connection.

Therefore, the correct answer is option (a) LAN.

Complete questions:

Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using

(a) LAN

(b) MAN

(c) PAN

(d) WAN

To learn more about wireless local area networks refer to:

https://brainly.com/question/8985345

#SPJ2

Which devices are considered to be central venous access devices (CVADs)? (Select all that apply.) Group of answer choices Heparin locks Peripherally inserted central catheters (PICC lines) Implanted subcutaneous ports Saline locks

Answers

Answer:

The answer is

Peripherally inserted central catheters (PICC lines)

Implanted subcutaneous ports

Explanation:

Central venous access devices are devices which are normally put in the body with the sole aim of aiding the transport of substances into the bloodstream of an individual . Such substance may include drugs, hormones etc.

Examples of such devices include Peripherally inserted central catheters (PICC lines) and Implanted subcutaneous ports

A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit

Answers

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

What is hacking? Why is hacking a concern for law enforcement?

Answers

Answer:

hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.

Hacking is having unauthorized access to data in a computer or a system. It's a huge concern because everything nowadays depends on the internet, and every device connected to the Internet is at risk

Develop a c program to display the following input output interphase enter a number 5
The table of 5 is
5*1=5
5*2=10

Answers

Answer:

int main()

{

int number;

printf("Enter a number: ");

scanf_s("%d", &number, sizeof(number));

for (int i = 1; i <= 2; i++) {

 printf("%d*%d=%d\n", number, i, number * i);

}

}

Explanation:

I used the safe scanf_s() that takes a third parameter to indicate the size of the buffer. In this case it is the size of an integer.

explain how data structures and algorithms are useful to the use of computer in data management

Answers

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

Outlook 365 can be described as a personal information manager.
True or false

Answers

Answer:

True

Explanation:

The statement is True. The Microsoft Outlook 365 can be described as personal information manager.

What is Microsoft Outlook?

Microsoft Outlook is the software system, that allows the users to manage various personal and official information and data altogether at one place.

The Microsoft Outlook is known as personal information manager because it allows the users to managing task, providing calendar services, helps in emailing. It also manages contact and keeps the record of journal logs and many more.

Therefore, the statement regarding outlook 365 is True.

Learn more about Microsoft Outlook, here:

https://brainly.com/question/17457799

#SPJ5

What is system software?

No Spam

Answer quickly

Answers

[tex]\large{\underline{\underline{\pmb{\tt{Answer:}}}}}[/tex]

System software controls a computer's internal functioning, chiefly through an operating system, and also controls such peripherals as monitors, printers, and storage devices.

Answer:

[tex]\large\mathsf{\red{\underline{\underline{\pmb{System~ Software}}}}}[/tex]

[tex]\textsf{It is a set of programs}[/tex] [tex]\textsf{that control and manage the }[/tex] [tex]\textsf{operations of computer hardware.}[/tex]

[tex]\textsf{It also helps application programs}[/tex][tex]\textsf{to execute correctly.}[/tex]

[tex]\textsf{System Software are designed to}[/tex] [tex]\textsf{control the operation and extend}[/tex][tex]\textsf{the processing functionalities of}[/tex][tex]\textsf{ a computer system.}[/tex]

How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50

Answers

Answer:

Create boxes with the following content

Initialize sum to 0, product to 1 and number to 1Check if number is a prime. If yes, update sum += number and product *= numberIncrease number by 1If number is <= 50, go back to "check" block.

The check block has a diamond shape.

At the "yes" branch of the check block, you can create separate blocks for updating the sum and the product.

Connect the blocks using arrows.

Indicate the start and the end of the flow using the appropriate symbols.

The block to check if a number is a prime you could further decompose into the steps needed to do such a check.

Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động

Answers

Answer:

gzvzvzvzbxbxbxb

Explanation:

hshzhszgxgxggdxgvdvsvzvzv

Which term refers to the use of expressions to check consistency in relation to other fields in the same record?
O data validation
O record validation
O input mask
O validation text

Answers

This is the answer 3 due to the thought me

The  term validation text refers to the use of expressions to check consistency in relation to other fields in the same record.

What is the use of validation text?

The term Validation text is known to be one that helps a user to be able to have a message that can help them to be able to input data that is said to be not valid.

Conclusively, Validations rules is known to aid one in that one can check data for accuracy and consistency in terms of  data entry.

Learn more about Validation text from

https://brainly.com/question/12069810

#SPJ2

cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]

Answers

Answer:

please translate

Thank you✌️

e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}​

Answers

Explanation:

double e-d/5.6;is wrong it should return to c

Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.

a. True
b. False

Answers

I’m sure the answer is true

Write a pseudocode method swap(aList, i, j) that interchanges the items currently in positions i and j of a list. Define the method in terms of the operations of the ADT list, so that it is independent of any particular implementation of the list. Assume that the list, in fact, has items at positions i and j. What impact does this assumption have on your solution

Answers

Answer:

Explanation:

The following pseudocode for this method using operations of the ADT list would be the following

swap(aList, indexI, indexJ) {

    initialize temp_variable = Retrieve(indexI, aList)

    Insert(Retrieve(indexJ, aList), indexI, aList)

    Insert(Retrieve(indexI, aList), temp_variable, aList)

}

This code basically saves the aList index of i , into a temporary Variable. Then it sets the aList index of i to the value of the element in index of j. Then it does the same for the index of j with the tem_variable. If we assume that the indexes of i and j exist, then it can crash our entire program if those indexes are missing from the list when we try to access them.

please help!....................

Answers

Answer:

Based on what the graph does on the number line, I would say 1100110

Every time the graph spikes up, that is a one, otherwise it is a zero.

Explanation:

Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of old files, then writes and saves the document. Describe how the OS interacts with the disk to allow the new file to be written.

Answers

Answer:

Explanation:

In a situation like this, the OS erases the files from its core, and saves the document in its files compartment

The hard drive on Frankie's computer is completely full. In this case, the OS deletes the files from its core and saves the document in its files' compartment because it has to produce and save a new document.

What is a document?

Everybody has a distinctive signature, and signatures are crucial in proving that a person actually signed a document and accepted its terms.

An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.

Through a specified application program interface, the application programs seek services from the operating system (API)

Therefore, the OS will erase the file from the scratch and save it in a different folder.

To learn more about the document, refer to the below link:

https://brainly.com/question/14980495

#SPJ2

A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server. Soon after, the help desk begins receiving calls from users who are unable to log in. After further investigation, it becomes clear that no users have successfully connected to the web server since the certificate installation. Which of the following is MOST likely the issue?
A. DA Incorrect firewall rules are blocking HTTPS traffic.
B. Users are still accessing the IP address and not the HTTPS address.
C. DC Workstations need an updated trusted sites list.
D Users are not using tokens to log on.

Answers

C- I think. I hope this helps you.

Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to use the apply method to get a new DataFrame named result_df with a new column AVG. The AVG column should average the float values across P2010 to P2015. The apply method should also remove the 6 original columns (P2010 to P2015). For that, what should be the value of x and y in the given code?

Answers

Answer:

x = 1

y = 1

Explanation:

The apply method has the axis argument which enables it to use the applied function either across the rows or columns, by passing the value 1 to the axis argument, the mean of at each index is calculated, (across the column) such that the length of the AVG column is equal to the lengtb of the original dataframe.

The drop method is used in pandas to remove row or column entry from a dataframe. To remove columns from a data table, the value 1 is passed to the axis argument of the drop method. Hence, passing 1 to the axis argument removes all 6 columns leaving only the AVG column in result_df.

Other Questions
A person who is 15 years old has a target heart rate range ofA. 132-176.B. 99132.C. 123-164.D. 114-152. pls somebody help me wth this Much like the Japanese during World War II, Americans are currently subjected to greater scrutiny and discrimination. a. African b. Asianc Native d. Muslim Is the answer option c? At what approximate temperature and pressure can all three phases of water exist simultaneously?0C, 760 mmHg0C, 5 mmHg80C, 380 mmHg100C, 760 mmHg Why does Hamilton think the National Bank is constitutional? You are standing 186 feet away from the base of a building and your clinometermeasures 23 when it's looking at the top of the building. (This angle is the one betweenthe ground and the top of the building). Please calculate the height of the building. 15.Identify a transformation of the function (x) = x by observing the equation of the function g(x) = x a. A horizontal shift a units to the right.A vertical shift a units downward.A horizontal shift a units to the left.A vertical compression by a factor of 1/a. Write an argumentative essay about coronavirus and its impact in PNG and parts of the world. Deepak works on a hotel reception. He keeps receiving complaints about the noisy hotel next door. He decides to write them a letter ofcomplaintEdit the formal letter below by replacing any shortened words.EmailFROMDeepakTOHotel-PartyTERNETCOUR SECUSUBJECTLoud Musicel. Ifnotice board doDear Sir or MadamI'm writing to you to complain about the loud music that our guests are able to hear coming from your premises every other night. I've never had towrite an email like this to another hotel before. However, it's completely unfair of you to expect our customers to endure such noise late into the night. Idon't think you'll appreciate it if we were to bother your customers late into the night. I'd imagine you'll complain very quickly.In future, when you're having a late night party, please consider our guests and keep the noise to a reasonable level. I don't want to have to escalate thiscomplaint and take it to the policeYours faithfullyDeepak Multanie media formabe checked forto y otherREPLYDELETER USE OF THEETotodRose20 Mostly sunny ADG If the balance were not tared prior to weighing out the KHP.... how would you expect this to affect the molarity of NaOH calculated? What type of error is this? How did the scientific revolution contribute to the Enlightenment in Europeduring the 17th and 18th centuries? Given the growth/decay percentage, determine the multiplier.1) 5% Growth2) 12% Decay4) 0.85% Decay3) 200% Growth Components of the master budget are the operating budget, the capital expenditures budget, and the financial budget. Group of answer choices True False 3. Compare the tools used by the earliest people with those of modern times? A field of corn being harvested by huge machines representsA)commercial farming.B)nonrenewable resource management.C)commercial Industry.D)subsistence farming What do you mean by active and passive voice? What government reforms were put into place after Watergate ? In C, for variables of type int we use %i as the format specifier in printf and scanf statements. What do we use as the format specifier for variables of type float, if we want to output the floating point value, showing 3 decimal places? what is the passive voice of "who broke this chair "ans by whom this chair is broken