Identify the tools used for the following purpose: -Technology

1 Answer

Answer :

(a)Dodge tool(b)Shear tool

Related questions

Description : How to customize your Windows 10 desktop with free tools? -Technology

Last Answer : With Windows, you've got an almost limitless number of free, open-source and paid apps to customize the appearance of desktop. In this article, we're going to share a list of open-source and free tools ... is included in the A/B testing, you should be able to access the widgets from Edge's menu.

Description : On Internet, to go to other Web page through button, the user should use (a) Search tools (b) Find and replace -Technology

Last Answer : (d) On the Internet, to go to other Web pages available through a button, the user should use hyperlinks.

Description : Explain how text wrapped around a picture from picture tools. -Technology

Last Answer : Wrap Text Around a Picture Steps to wrap text around a picture in a document are as follows:(a) Step 1: Select the picture.(b) Step 2: Select the Picture Tools Format tab. (This tab ... from the Position menu. You can make more precise changes from the Advanced Layout dialog box that appears.

Description : The Themes group is presented on ………….. tab. (a) Home (b) Page Layout (c) References (d) Picture Tools Format -Technology

Last Answer : (b) The Themes group is presented on Page Layout tab.

Description : Write down the name of the freehand drawing tools which are using when custom shapes can be drawn. -Technology

Last Answer : Curve, Freeform and Scribble are the three freehand drawing tools which are using when custom shapes can be drawn.

Description : The Drawing Tools Format tab appears at the bottom of the Word document window. -Technology

Last Answer : FalseDrawing Tools Format tab appears at the top of the Word document window.

Description : Which field has been benefitted using the Information and Communication Technology Tools? (a) Education (b) Health -Technology

Last Answer : (d) Information and Communication Technology tools are benefitted in various fields such as Education, Governance and Health etc.

Description : Name any four tools used for Retouching an image in GIMP. -Technology

Last Answer : (a)Scale Tool(b)Blur/Sharpen Tool(c)Brush & Pencil Tool(d)Eraser Tool(e)Blend Tool(f)Smudge(g)Dodge / Burn Tool

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Can you identify examples of refugees utilizing technology to maintain contact with the homeland?

Last Answer : answer:@JonnyCeltics you do realize the vast majority of refugees do not have electricity, basic food and water and therefore little or no access to social networking, right? Those speaking ... (Facebook included) after last years quake/tsunami and the resulting nuclear meltdown in northern Honshu.

Description : Identify input/output devices from the clues given below: (a) Transfers typed or handw -Technology

Last Answer : (a) Scanner(b) Barcode reader(c) Optical Mark Recognition (OMR)(d) Magnetic Ink Character Recognition (MIGR)(e) Printer (f) Speaker

Description : Identify the software that helps you in sending and receiving an E_mail: (a) MS_Office (b) Internet Explorer -Technology

Last Answer : (c) MS-Outlook is preferred E-mail client which is used for sending or receiving an E-mail.

Description : Identify the columns out of the given three, which should not be present in each of the following tables: -Technology

Last Answer : (i) DateofBirth(ii) Admno(iii) Phonenumber

Description : Primary key is used to …………….. identify the record. -Technology

Last Answer : Primary key is used to uniquelyidentify the record.

Description : Carefully read the following descriptions and identify what is being talked about. 1. It consists of two insulated wires twisted around each other, -Technology

Last Answer : 1. Twisted pair cable2. Crosstalk3. Radiowave4. Wired communication channel5. Resource sharing

Description : Identify the odd term amongst the following. (a) Microwave (b) Radiowave (c) Bluetooth -Technology

Last Answer : (d) Except optical fibre, all are wireless transmission media.

Description : Identify the error(s) in the following HTML code. Also, write the correct code. -Technology

Last Answer : The error in the code is that in place of color attribute there should be bgcolor.The correct code is

Description : Identify the errors and write the correct HTML code 1. -Technology

Last Answer : 1. 2.

Description : Identify error(s) in the following HTML code. Also, write the correct code. type=“a” start=“d”> -Technology

Last Answer : tag’s attributes should be placed in between . In the list, the start attribute must be set to a numeric value and type attribute specifies ‘A’, ‘a’, T ‘i’ or ‘1’. So, the correct code is

Description : Identify which one is an attribute or a tag? 1. Body 2. Type -Technology

Last Answer : 1. Body – Tag2. Type – Attribute3. Br – Tag4. Link – Attribute5. Face – Attribute

Description : Carefully study the Web page given here. Identify 10 tags -Technology

Last Answer : 1. . It encloses the entire HTML document and tells the browser that it is reading an HTML document and to display as such.2. It encloses the head of the HTML document and it is used to contain ... It is used to insert a horizontal line.10. .. This tag is used to align the text centrally.

Description : Identify the errors in the following HTML code and write the correct code with each correction underlined. -Technology

Last Answer : Error 1 The tag must be within element.Error 2 bgcolor attribute of body element supports a color like red, green or its color value.Error 3 tag needs a source attribute src to place an ... element must be closed not bgcolor attribute.The correct code is as follows:IMAGESHERE IS MY IMAGE FILE

Description : Identify the option, which is not a feature covered under device management? (a) Speed (b) Spooling (c) Sharing (d) Programming -Technology

Last Answer : (d) Among given options, programming is not a feature covered under device management.

Description : Identify which of the following is a tag or an attribute ? 1. link 2. table -Technology

Last Answer : 1. link — attribute2. table — tag3. align — attribute4. href— attribute5. br — tag

Description : Carefully study the Web page given below. Identify 10 tags (structural as well as formatting tags) that have been utilized -Technology

Last Answer : 1. to specify the title of the Web page.2. contains all the content that is to be displayed on the Web page and all the various formatting and structural tag.3. used to create an unordered ... anchor tag. Use the href attribute to provide the reference of the Web page that you want to hyperlink.

Description : Carefully study the Web page given below. Identify 10 tags (structural as well as formatting tags) that have been utilized in creating this -Technology

Last Answer : 1. to specify title of the Web page.2. contains all the text content that is to be displayed on Web page and all the various formatting and structural tag.3. defines the most important and biggest ... provide caption to the table.9. used to create a table row.10. used to define data cells.

Description : The following figure shows a small part of a Word document. Identify different formatting features that are applied to it. -Technology

Last Answer : 1. Center alignment of title2. Bold and color font of title3. Font type it changed for title4. Line spacing in paragraph5. Justified alignment for paragraph

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : Identify the fastest wired media out of the following: Ethernet cable, Optical fiber, Co_axial cable -Technology

Last Answer : Optical fiber

Description : Identify the type of network (out of LAN/PAN/MAN/WAN) formed in the given diagram: -Technology

Last Answer : PAN(Personal Area Network)

Description : Identify the primary key column of Train and Reservation. -Technology

Last Answer : (i) Train-TrainIdReservation-RefNo(ii) (d) By default, the UNION operator selects all the values.

Description : Draw a use case diagram and identify the actors for the situations (i) do (ii) as directed: (i) A repair can be made by a master, -Technology

Last Answer : Actors : Master, Trainee An actor is any entity (user or system) that interacts with thesystem of interest. For an ATM, this includes:• Bank Customer• ATM Maintainer• Central Bank Computer

Description : i. Are these tags part of HTML code or XML code? ii. Identify the root element. -Technology

Last Answer : XML codei. Companyii. name, deptiii. eid, deptid

Description : Identify the invalid variable names. State the reason if invalid. -Technology

Last Answer : Marks Unit is an invalid variable name because variable name does not allow spacing.

Description : Identify the error in the following code : -Technology

Last Answer : Default case is missing in the given switch code which is optional but necessary. When user gives a wrong choice then default case’s statement is executed.

Description : Identify the topology shown below. Write 2 advantages of this topology. -Technology

Last Answer : Star Topology Two advantages of star topology are as follows :1. Easy to detect faults and remove It.2. Failure to single system will not bring down the entire network.

Description : What are some reliable tools to identify Twitter unfollowers?

Last Answer : Since there are many tools to track and unfollow twitter followers lets count best rated in 2021: SocialBee Unfollower Stats Who Unfollowed Me Commun.it Tweepi

Description : In order to identify the users, web analytics tools need to report on? A. user sessions B. Unique users C. Page Views D. All of the above

Last Answer : A. user sessions

Description : Which of the following free tools/websites could help you identify which city in the world has the largest search for the keyword : "six sigma"? A. Alexa B. Google Trends C. Google Traker D. Word Tracker

Last Answer : D. Word Tracker

Description : Which step should a communicator take as the starting point? (a) Select the channels of communication (b) Set up feedback process (c) Specify the objectives of communication (d) Identify the tools of communication

Last Answer : (c) Specify the objectives of communication

Description : Write the purpose of search engine. -Technology

Last Answer : The main purpose of search engine is to help people to find more information in any topic, which user wants.

Description : What is general purpose application software? Give some examples of general purpose application. -Technology

Last Answer : General purpose application softwares are those softwares, which are used for any general function. They allow people to do simple computer tasks. It is sometimes referred to as GPS. e.g. graphics, multimedia, presentation software, desktop publishing software etc.

Description : Write the purpose of DBMS. -Technology

Last Answer : DBMS is used to store logically related information at a centralized location. It facilitates data sharing among all the applications requiring it.

Description : Explain any five specific purpose application softwares. -Technology

Last Answer : 1. Hotel Management SystemIt refers to the management techniques used in the hotel sector. It includes hotel administration, accounts, billing marketing, housekeeping, front office or front desk, e.g. ... delivered to acustomer or set of customers.e.g. Billing Manager, BillingTracker, kBilling etc..

Description : What is the purpose of Default Value field property? -Technology

Last Answer : If there is a situation when you want to enter the same value for all records. Then, to avoid typing the same thing many times, you can set as a Default Value property.

Description : computer network. A computer network is a group of (i) ………. that are (ii) ……… to each other for the purpose o -Technology

Last Answer : (i) computers(ii) connected(iii) communication(iv) network(v) share

Description : Which field properties are used in Office Access 2007? Give the purpose of each field property. -Technology

Last Answer : Field PropertiesAfter you create a field and set its data types, you can also set additional field properties. Setting field properties can give the database extra flexibility and functionality.Some ... control.Text, Memo, Number,Date/Time, Currency,AutoNumber, Yes/No, OLEObject, Hyperlink.