Why should we apply print preview before printing the document.​

Answers

Answer 1

to helps them to see how the final printed material will appear. 


Related Questions

Pls guys I need help fast my PC is new and it can't connect to a network

Answers

Answer:

There are several reasons why your PC might not be able to connect to Wi-Fi. You should first make sure that your PC's Wi-Fi adapter hasn't been turned off, or needs to be reset. The issue might also be with the Wi-Fi, not your PC — make sure that it works on other devices.

Answer:

Use ethernet cable, it worked for me!

Software that functions as an electronic version of a filing cabinet?

Answers

Answer: There are a lot of choices

Explanation: do you want a database? You can obtain a terabyte or even larger size thumb drive or USB drive

Do want a print server? a networked drive specific for your data and if you have  to   print out anything

Do you want a connected drive to send all your documents to with organized folders?  any size drive will work for this they come all prices

Enter the electronic filing system, sometimes called document management software. These computerized filing systems provide electronic file management. In other words, they give us a simple way to store, organize, and retrieve digital files and digital documents and pdfs.

https://www.filecenter.com/info-electronic-filing-system.html here is some good software

What type of software can Agile and DevOps be applied

Answers

Answer:

STATA AND SPSS

Explanation:

these are mostly widely used statistical package in modern statistical calculations. it is minimizes times and as well as resources.

43
What are several examples of fictional photography?
O A
celebrity, fashion, glamour
OB.
nature, sports, life
OC. military, propaganda, commercial
OD. corporate, scientific, police
Reset
Next

Answers

Answer:

c

Explanation:

I think A for sure it shows everything I could think of in fictional photography

Can case conditions use test conditions?
A. yes
B. no

Answers

Answer:

yes.

Explanation:

because i Been tro it before

E. Write an algorithm to show 'How to prepare a cucumber sandwich?". ​

Answers

Answer:

Place slices of bread on plate, side by side...

Postcondition: Sandwich is ready to eat.

Step 1: Start with the number 1.

Step 2: find another person and form a pair.

Step 3: add your numbers together.

Step 4: one person from the pair sits down.

Step 5: the other person goes back to step 2.

what actions should be taken on improvement backlog items from the problem-solving workshop

Answers

Actions that should be taken on improvement backlog items from the problem-solving workshop are:

The team then casts a combined vote on the top three possibilities.The following PI Planning event will receive them rephrased as improvement stories and features. The RTE assists in making sure that the pertinent work required to deliver the specified changes is planned throughout that time.By closing the loop, action will be taken and the appropriate personnel and resources will be committed to enhancing the current situation.

What is problem solving workshop ?

The ART conducts an organized, root-cause problem-solving workshop to address systemic issues. Instead than focusing only on the symptoms of an issue, root cause analysis offers a set of problem-solving tools used to determine the true causes of a problem. In a timebox of two hours or less, the RTE often facilitates the session.

Learn more about problem solving workshop here https://brainly.com/question/14362975

#SPJ10

what are the importance of computer software​

Answers

Answer:

It controls and coordinates all hardware and software functions within your PC. It is designed to be ever-improving so that newer tasks are performed more efficiently.

Software not only makes your computer hardware perform important tasks, but can also help your business work more efficiently. The right software can even lead to new ways of working. It is therefore a crucial business asset and you should choose your software carefully so that it matches your business needs.

How ict tools changed the way we live explain it​

Answers

Answer:

How does ICT change our way of living?

ICT has contributed a lot to change our everyday life such as letter to e-mail, market shopping to on-line shopping, classroom learning to e-learning, etc. This paper present's the effects of ICT as Home and Domestic Activities, Social Networking, Education, Health, Commerce, Banking, and Employment.

Efficiency in computation is achieved by

Answers

Answer:

Computational efficiency measures the amount of time or memory required for a given step in a calculation, such as an evaluation of a log posterior or penalized likelihood.

Statistical efficiency typically involves requiring fewer steps in algorithms by making the statistical formulation of a model better behaved.

Give an implementation of the abstract data type of a priority queue of integers as an
ordered list using the SML syntax (ML functor). Given the following:

type Item
val > : Item * Item -> bool

Answers

We can use the code for IntPQ to implement the priority queue construction:

functor PQUEUE(type Item  

              val > : Item * Item -> bool  

             ):QueueSig =  

struct  

   type Item = Item  

   exception Deq  

   fun insert e [ ] = [e]:Item list  

     | insert e (h :: t) =  

       if e > h then e :: h :: t  

                else h :: insert e t  

   abstype Queue = Q of Item list  

   with  

       val empty          = Q []  

       fun isEmpty (Q []) = true  

         | isEmpty _      = false  

       fun enq(Q q, e)    = Q(insert e q)  

       fun deq(Q(h :: t)) = (Q t, h)  

         | deq _          = raise Deq  

   end  

end;

What is SML?

The capital asset pricing model (CAPM), which displays varying levels of systematic, or market risk, of various marketable securities plotted against the projected return of the entire market at any one time, is represented graphically by the security market line (SML), a line drawn on a chart.

The supplied predicate, which we consider to be a total ordering, can be used as the priority order in a priority queue. The end result is a structure with a new type for the queue and a number of operations that work with it. We create a new structure from a group of types and values (a structure), and we represent this creation as an ML functor. A functor takes a structure and produces a new structure, much as how a function takes a value and makes a new value. To accomplish the formation of the priority queue, we can utilize the IntPQ code.

Learn more about SML here https://brainly.com/question/15901527

#SPJ10

total_coins = 0

nickel_count = int(input())
dime_count = int(input())




print(total_coins)

Answers

The code statement that completes the program is total_coins = nickel_count + dime_count

How to complete the segment?

From the code segment, we have the following highlights:

total_coins is initialized to 0, at line 1Inputs for nickel_count and dime_count are taken on lines 2 and 3The last line prints total_coins

The above means that total_coins has not been calculated.

This is calculated using:

total_coins = nickel_count + dime_count

The above must be placed before the last line of the program

Read more about code segments at:

https://brainly.com/question/24833629

#SPJ1

Complete question

Complete the code segment to calculate the total number of coins

total_coins = 0

nickel_count = int(input())

dime_count = int(input())

print(total_coins)

The Electronics Communications Privacy Act allows the government to have access to....?

Answers

Personal information like who the person is, what they do, and where they go are the information that can be accessed by the government under the Electronics Communications Privacy Act.

What is Electronics Communications Privacy Act?

Electronic Communications Privacy Act allows the government to have the authority to the suspicious activity that takes place at social sites or through the use of electronic devices.

The unlawful acts and issues are overseen so that any violent circumstances do not arise. The data is provided through networking sites, cell phone providers, etc.,

The suspicious and unlawful activities are tracked through the electronic device that allows the government to keep track of the activities that can be a threat to them and the country.

Therefore, the act allows the government to track personal information which is unlawful and unauthorized.

Learn more about Electronics Communications Privacy Act here:

https://brainly.com/question/3773028

#SPJ1

In what ways may the WBS be used as a key document to monitor and control a project?

Answers

By bringing everyone's attention to the work that has to be done, WBS can be utilized to prevent scope creep.

What is WBS?

WBS stands for Work Breakdown Structure. It facilitates task allocation. It is much simpler to allocate work to the proper person when a project is divided into manageable tasks or packages. This assists your team in making plans for tasks that must be accomplished in addition to the job at hand.

Thus, the WBS can be used as a key document to monitor and control a project because it makes the process of quickly creating a timetable easier, By assigning work estimates to particular WBS parts, the required task is described and organized by it.

Learn more about WBS here:

https://brainly.com/question/13090633

#SPJ1

What should the Dhruv consider when connecting to the Internet in a public place? Select all that apply.

Answers

Dhruv should be more careful while using internet in a public place

When replacing a defective switch what is necessary characteristic of a new switch

Answers

The complete question is :

When replacing a defective switch, what is a necessary characteristic of the new switch?

Select one:

a. Greater number of poles and throws than the original switch

b. The same number of positions as the original switch

C. Identical cover plate as the original switch

d. Greater current ratings than the original switch

So, according to it the correct answer is option d. Greater current ratings than the original switch.

What is a switch?

A switch is a component of physical circuitry that controls the flow of signals. A switch or toggle switch enables the opening or closing of a connection. The switch permits a signal or power to pass through the connection when it is opened. The switch cuts the circuit connection and halts the flow when it is closed.

Learn more about switches here https://brainly.com/question/14883923

#SPJ10

what is the function of computer?​

Answers

[tex]\huge\purple{Hi!}[/tex]

the four basic function of a computer are input, storage, processing and output.

When dividing it’s total debt by total equity what’s a company trying to measure

Answers

Answer:

A business's debt-to-equity ratio, or D/E ratio, is a measure of the extent to which a company can cover its debt. It is calculated by dividing a company's total debt by its total shareholders' equity. The higher the D/E ratio, the more difficult it may be for the business to cover all of its liabilities.

When dividing its total debt by total equity, a company is trying to measure its leverage or debt-to-equity ratio.

What does this indicate?

This ratio indicates the proportion of debt used to finance the company's assets compared to its equity. It helps assess the company's financial risk and its ability to meet its debt obligations.

A higher debt-to-equity ratio implies higher financial leverage and indicates that the company relies more on debt financing, which can increase its financial risk. Conversely, a lower ratio suggests a lower reliance on debt and a stronger financial position.

Read more about debt-to-equity ratio here:

https://brainly.com/question/27993089

#SPJ2

The commented line states that I have assigned a 2D array to a pointer but I want array of such pointers which could store numbers of 2D Array.

Answers

It is impossible to store numbers or contents of 2D array to a pointer array.

How to store pointers in 2D Arrays?

Arrays and pointers are different data structure elements, and there is a limit to the operations that can be performed on both.

Having said that, it is impossible to store numbers or contents of 2D array to a pointer array.

The closest you can do, is to use the following declaration:

int *p[] = {(array-type [][number of columns]) {Array-content}}

Read more about arrays and pointers at:

https://brainly.com/question/17355709

#SPJ1

Answer:

Get the element => *( (int *)aiData + offset ); calculate offset => offset = (1 * coloumb_number)+ 2); Add offset in array base address => (int *)aiData + offset; //here typecast with int pointer because aiData is an array of integer Get the element => *( (int *)aiData + offset );

How to change the command prompt of a computer​

Answers

- Open the Terminal tab in the Command Prompt's Properties window.
- Next, in the Terminal Colors section, select the options you want to change
- You can also change the cursor type to Underscore, Vertical Bar, Empty Box, or Legacy Style.

List and describe four services that comprise IT infrastructure, beyond physical devices and software applications.

Answers

The four services that comprise IT infrastructure are:

Telecommunications services. Data management services . Application software services.Physical facilities management services.

What does these services do?

Telecommunications services is known to help in terms of giving data, voice, and video network.

Data management services helps to save , manage, and analyze all data. Application software services helps to give firms-wide range capabilities.

The Physical facilities management services helps to make and handle physical installations of technology.

Therefore, The four services that comprise IT infrastructure are:

Telecommunications services. Data management services . Application software services.Physical facilities management services.

Learn more about  IT infrastructure from

https://brainly.com/question/869476

#SPJ1

Q For each of the following words identify the byte that isstored at lower memory address and the byte that is stored athigher memory address in a little endian computer.
a. 1234
b. ABFC
c. B100
d. B800

Answers

C is the correct answer for this question

what are differences between Ram and Rom?​

Answers

Answer:

RAM, which stands for random access memory, and ROM, which stands for read-only memory, are both present in your computer. RAM is volatile memory that temporarily stores the files you are working on. ROM is non-volatile memory that permanently stores instructions for your computer.

Explanation:

Answer:

RAM is random access memory - we can have it even after we shut down the computer. it is volatile .it stores temporarily.

ROM - Read only memory. it is non volatile memory. we can only have it until computer is turn on. after that it's gone.it stores memory permanently

What is not a computer software?
a. web browser
b. powerpoint
c. motherboard

Answers

Answer:

Motherboard

Explanation:

Its a device in the computer that helps it run while powerpoint and web browser are just things you can do with your computer to make or create information.

Design a program that asks the user for a series of names (in no particular order). After the final person’s name has been entered, the program should display the name that is first alphabetically and the name that is last alphabetically. For example, if the user enters the names Kristin, Joel, Adam, Beth, Zeb, and Chris, the program would display Adam and Zeb.
In pseudo and java

Answers

The program for the same in python is as follows :

#This gets the count of names to be input

count = int(input("Total names: "))

#This initializes the list of names

names = []

#This iteration gets all names

for i in range(count):

  #This gets a name

  name = input("Enter a name: ")

  #This appends it to the list

  names.append(name)

#This sorts the name

names.sort()

#This prints the first and the last name, alphabetically

print(names[0] + " " + names[-1])

Learn more about such codes here https://brainly.com/question/22654163

#SPJ10

What is software engineering? What are the objectives of software engineering?

Answers

Answer:

The basic objective of software engineering is to develop methods and procedures for software development that can scale up for large systems and that can be used consistently to produce high-quality software at low cost and with a small cycle of time.

Explanation:

1.Which thematic group uses technology to direct the behavior of dynamical systems, ensuring that they behave in a predictable manner?
2.Which thematic group creates circuits with miniature, packaged components that directs and control electricity?

a.Communication Systems
b.Control Systems
c.Computer Systems
d.Energy Systems
e.Electronic Systems

Answers

Dynamic systems are governed by control systems, whereas electronic systems contain the minuscule parts required to conduct electricity. Option E is correct.

What are groups?

People who concentrate on the same issue or idea form thematic groups. Individuals with experience in diverse systems make form thematic teams working on various initiatives and concepts.

In order to achieve the intended outcome, the control system's main purpose has been to govern dynamic systems.

The electronic system theme group's job is to put electronic miniatures in systems that act as power-control mechanisms. Thus, option E is correct.

Learn more about thematic groups. here:

https://brainly.com/question/14835569

#SPJ1

HELP QUICK!!!!!!!

Which item is used in Excel to identify the row of a particular cell?
O letter
O number
O type
O sheet

Answers

Answer:

Number.

Letter is for columns, Number is for rows.

For example to find the cell on the fifth row, and 1st column, it would be A5.

in tabular form differentiate the first four generations of computer ​

Answers

Answer:

Explanation:

See attachment.

compare the results of both the RATS and Skipfish reports.

Answers

Answer:

The results of both reports RATS is known nas mouse and skipfish is known as one type of fish

Other Questions
Simplify[tex]\left(\frac{123}{321}\right)\left(\frac{456}{654}\right)\left(\frac{789}{987}\right) \left(\frac{123}{321}\right)^{-1}\left(\frac{456}{654}\right)^{-1}\left(\frac{789}{987}\right)^{-1}[/tex] In Anzaldas poem, To Live in the Borderlands, variations of the line, To live in the Borderlands means are used multiple times. Which of the following is NOT an effect of this repetition?It ties together the descriptions of life in the borderlands from each of the stanzas to form a complete as a picture as possible.It gives the poems language forcefulness and strength through the repeated sounds and words.It makes the poem sound rhythmic, which represents how simple life in between two worlds is.It reinforces the theme that the experience of living between two worlds is difficult to understand and describe. The lines below are parallel. If the slope of the green line is -3, what is theslope of the red line?m = A box has 1 red marble, 1 blue marble, and 4 green marbles of the same shape and size. dan draws a marble randomly from the box, replaces it, and then draws another marble randomly. what is the probability of drawing two green marbles in a row? explain your answer. 4. Solve: 82n6n=16A. n=11B. n=9C. n=10D. n=3 What would be an example of a cultural difference that may affect one's health? Multiple choice question. family values personal preferences genetic predispositions A 6-sided number cube is rolled twice. What is the probability of getting a 3 on the first roll and a 4 on the second roll? 2.8% 16.7% 20% 33.3% Which factor most contributed to delays in construction for the Central Pacific Railroad?A.a shortage of suppliesB.intense summer heatC.long stretches of desolate landscapeD.conflicts with Indigenous People Help please, can someone answer. Determine if an exponential would be an appropriate model for the data shown in each scatter plot. Select one that applies. State and explain four ways One can organise his or her artworks 0.0000000019 written in scientific notation is What is the interval in which both f (x) and g(x) are positive?A. (1, )B. (2, )C. (3, )D. (, 2) (2, ) Pythagorean Theorem and its Converse I need number 6 When a shortage of a commodity occurs, we would expect to find that Which of the following expressions are equivalent to - -13/12A. -13/-12B. 13/-12C. None of the above There are 230 calories in a 48 gram packet of M&M's. How many calories are in a 33.6 gram bag? Question 9 of 10How did life change for women during World War II?OA. There were fewer men at home and more jobs.OB. There were more children at home and less work.OC. There were more men at home and fewer jobs.OD. There were no opportunities to work outside the home. 5.)(2x + 8) - (4y + 1)6.)-5x * (3x^2 - 2x - 1) Which of the following is a ballistic stretching exercise?A.calf stretchB.arm circlesC.yoga plowD.hurdle stretch