Jane, an employee at your company, has just opened an online chat with you. Jane states that although she has access to the internet, she cannot access either her email or her calendar. Jane just started her job in marketing today, and she is very flustered and does not know what to do.

Jane’s manager just gave her a project to research competitive ads to help inform a new campaign. She had taken a lot of notes in a Word document, and now she cannot find that document either. She was supposed to have the project sent over to her manager by the end of the day.

Jane is very nervous that she is going to get into trouble with her manager on her first day of work. She is sharing all of this with you in the online chat box.

What do you do?

Answers

Answer 1

In this situation, it is important to provide Jane with guidance and support to help her address the issues she's facing. By providing guidance, reassurance, and practical solutions, I can help alleviate Jane's concerns and guide her toward resolving the technical issues she is facing on her first day of work.

Here's what you can do:

Reassure and empathize: Start by reassuring Jane that you understand her concerns and that technical difficulties can happen to anyone. Let her know that you are there to help and that you will work together to find a solution.Troubleshooting assistance: Ask Jane to provide more details about the specific issues she is experiencing with her email, calendar, and the missing Word document. Offer step-by-step troubleshooting guidance, such as checking internet connectivity, restarting her computer, or verifying email and calendar settings.IT support contact: If the issue persists or seems to be beyond your expertise, provide Jane with the contact information for the IT support team at your company. Advise her to reach out to them for further assistance, explaining that they are trained to handle technical issues efficiently.Document recovery options: Assure Jane that there are potential ways to recover her lost Word document. Suggest checking the document recovery feature in Microsoft Word, looking for temporary or autosaved versions of the file, or utilizing file recovery tools if available.Communicate with her manager: If Jane is genuinely concerned about her manager's expectations, offer to communicate with her manager on her behalf. Assure Jane that you will explain the technical difficulties she encountered and the steps she has taken to resolve them. Emphasize that her manager will appreciate her proactive communication.Follow-up and support: After providing initial guidance, follow up with Jane to check if she was able to resolve the issues or if she needs further assistance. Offer ongoing support and encourage her to reach out if she encounters any additional challenges.

Remember to remain calm, supportive, and understanding throughout the interaction.

For more questions on guidance

https://brainly.com/question/839980

#SPJ8


Related Questions

Consider a logical address space of 8 Giga pages of 4KB each, mapped onto a physical memory of 4M frames.


a. How many bits are there in the logical address?


b. How many bits are there in the physical address?

Answers

The logical address has 45 bits. The physical address has 34 bits. The total number of bits in the physical address is 22 + 12 = 34 bits.

To determine the number of bits in the logical address, we need to find the number of bits required to represent the page number. Since we have 8 Giga pages, which is equivalent to 2^33 pages, we need 33 bits to represent the page number. Additionally, since each page is 4KB (2^12 bytes), we need another 12 bits to represent the page offset. b. For the physical address, we need to calculate the number of bits required to represent the frame number. Since we have 4M frames, which is equivalent to 2^22 frames, we need 22 bits to represent the frame number. Additionally, since each frame is 4KB (2^12 bytes), we need another 12 bits to represent the frame offset.

Learn more about logical address here:

https://brainly.com/question/23862371

#SPJ11

Consider the following code segment. Int count = 5; while (count < 100) { count = count * 2; } count = count 1; what will be the value of count as a result of executing the code segment?

Answers

Using the while loop, the value of count as a result of executing the following code segment is 161.

int count = 5;    

while (count < 100)

{

count = count * 2;  // count value will 10 20 40 80 160  then exit the while loop as count<100

}

count = count + 1; // here, 161 +1

When a condition is not satisfied, a "While" loop is used to repeat a certain piece of code an undetermined number of times. For instance, if we want to ask a user for a number between 1 and 10, but we don't know how often they might enter a greater number, until "while the value is not between 1 and 10."

While the program is running, the statements are continually executed using both the for loop and the while loop. For loops are used when the number of iterations is known, but while loops execute until the program's statement is proven incorrect. This is the main distinction between for loops and while loops.

To learn more about While loop click here:

brainly.com/question/29102592

#SPJ4

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy?

Answers

Answer:

IPS

Explanation:

Intrusion Prevention System can track suspicious activities such as policy violation and actively take preventive measures to prevent and minimize the intrusion impact. It is referred to the network protection technology that analyses the flows of network traffic to identify and mitigate exploits of vulnerability. Vulnerabilities generally come to a specific service in the form of malicious inputs, which attackers use to disrupt and seize the power of a particular application. As per the question, Vicky needs an IPS to counter the hacking attempts.

which is true about packets? which is true about packets? packets are reassembled at their final destination. the receiving device acknowledges the first and last packets to indicate receipt of the data stream. packets travel in order to their destination. packets follow the shortest path to their destination.

Answers

Packets are reassembled at their final destination.

When data is transmitted over a network, it is divided into small units called packets, each containing a portion of the original data, along with information about the packet's destination and its place in the overall data stream. The packets travel independently over the network, and they may take different paths to reach their destination. Once the packets arrive at their destination, they are reassembled into the original data stream based on the information contained in the packets' headers. This reassembly process occurs at the final destination and is done automatically by the receiving device, which uses the packet headers to determine the correct order for the packets.

Learn more about packet's destination click here:

brainly.com/question/31262430

#SPJ11

Which composer below was not part of the classical period?
A. Beethoven B. Bach
C. Mozart

Answers

Explanation:

B. Bach

Thanks for your point

Which step is done first to replace existing text in a text box?
•Select the text to be replaced.
•Type new text into the text box.
•Click and drag the text to replace.
•Click an area outside the text box.

Answers

The step is done first to replace existing text in a text box is to  Select the text to be replaced.

What is a text box used for?

A text box is known to be a tool or an object that a person can add to their document and it is the one that p[permits one to lets add type text anywhere in one's file.

Note that based on the above, The step is done first to replace existing text in a text box is to  Select the text to be replaced.

Learn more about text box from

https://brainly.com/question/26372855

#SPJ1

Answer:

A. Select the text to be replaced.

Explanation:

hope this helps :)

Microsoft® Access® manages which the following types of files? Question 3 options: Presentations Databases Images Texts.

Answers

Microsoft® Access® manages B. databases.

What does Microsoft® Access® do ?

It is a relational database management system (RDBMS) that allows users to store and manage large amounts of data in an organized manner. Users can create tables to store data, relationships between tables to ensure data consistency, forms to enter and view data, queries to retrieve specific data, and reports to present data in a formatted manner.

Microsoft Access is commonly used in small to medium-sized businesses and can handle a wide range of data types, including text, numbers, dates, images, and more.

Find out more on Microsoft Access at https://brainly.com/question/24643423

#SPJ1

Robert's got a quick hand
He'll look around the room he won't tell you his plan
He's got a rolled cigarette
Hanging out his mouth, he's a cowboy kid
Yeah, he found a six shooter gun
In his dad's closet, in a box of fun things
And I don't even know what
But he's coming for you, yeah, he's coming for you
All the other kids with the pumped up kicks
You better run, better run, outrun my gun
All the other kids with the pumped up kicks
You better run, better run faster than my bullet
All the other kids with the pumped up kicks
You better run, better run, outrun my gun
All the other kids with the pumped up kicks
You better run, better run faster than my bullet
Daddy works a long day
He's coming home late, yeah, he's coming home late
And he's bringing me a surprise
Cause dinner's in the kitchen and it's packed in ice
I've waited for a long time
Yeah, the slight of my hand is now a quick pull trigger
I reason with my cigarette
Then say your hair's on fire
You must have lost your wits, yeah
All the other kids with the pumped up kicks
You better run, better run, outrun my gun
All the other kids with the pumped up kicks
You better run, better run faster than my bullet
All the other kids with the pumped up kicks
You better run, better run, outrun my gun
All the other kids with the pumped up kicks
You better run, better run faster than my bullet
All the other kids with the pumped up kicks
You better run, better run, outrun my gun
All the other kids with the pumped up kicks
You better run, better run faster than my bullet
All the other kids with the pumped up kicks
You better run, better run, outrun my gun
All the other kids with the pumped up kicks
You better run, better run faster than my bullet
All the other kids with the pumped up kicks
You better run, better run, outrun my gun
All the other kids with the pumped up kicks
You better run, better run faster than my bullet

Answers

verry
good
song
love
it
ALL THE OTHER KIDS WITH THE PUMPED UP KICKS YOU BETTER RUN BETTER RUN ! FASTER THAN MY GUN !

the __________ online protection act was passed to protect minors from accessing inappropriate material on the internet.

Answers

The children's online protection act was passed to protect minors from accessing inappropriate material on the internet.

What is internet?

Internet is a global network of computers that are connected to each other via communication cables or wireless connections. It is a platform where users can send, receive and store data. It is a vast network of computers and other devices connected to each other and to the World Wide Web. It is used by people around the world to access information, communicate with each other, conduct business, and much more. It has enabled the development of many new technologies and services, such as video conferencing, online shopping, online banking, and social media. It has made the world a much smaller place, bringing people from different countries, cultures and backgrounds together.

To learn more about internet

https://brainly.com/question/2780939

#SPJ1

Do the previous two exercises by using the Formula property rather than the FormulaR1C1 property. (Hint: Enter a formula in cell N4 and then use the Copy method to copy down. Proceed similarly in row 14. Do not use any loops. )

Answers

The previous two exercises can be done using the Formula property by entering a formula in cell N4 and copying it down, and proceeding similarly in row 14.

When using the Formula property, you can enter a formula in a single cell and then use the Copy method to copy it down to other cells in the same column or row.

This allows you to quickly and easily apply the same formula to multiple cells without the need for loops or other programming constructs.

To use the Formula property for the exercises, simply enter the appropriate formulas in cells N4 and N14, and then use the Copy method to fill in the formulas in the rest of the cells in the same rows. This will give the desired results for both exercises.

Overall, the Formula property is a powerful tool for working with formulas in Excel and can help simplify and streamline the process of applying formulas to multiple cells.

For more questions like Property click the link below:

https://brainly.com/question/29528698

#SPJ11

dns poisoning can be prevented using the latest edition of what software below?

Answers

DNS poisoning can be prevented using the latest edition of  BIND, or Berkeley Internet Name Domain.

What is the DNS poisoning?

To prevent DNS poisoning, secure DNS resolvers, like BIND, are commonly used. BIND is an open-source software that's robust and up-to-date. BIND is a popular DNS server that supports DNSSEC, providing cryptographic security to DNS and preventing DNS poisoning attacks.

Preventing DNS poisoning requires updating DNS software, implementing DNSSEC, using access controls, and monitoring traffic for suspicious activity. Keep operating systems and software up to date to address vulnerabilities.

Learn more about DNS poisoning  from

https://brainly.com/question/13185329

#SPJ1

Create a class called Drive. It should have instance fields miles and gas which are both integers. Another instance field, carType, is a String. The constructor should receive a String which initializes carType. The other two instance fields are both automatically initialized to 1 in the constructor. Create a method called getGas that returns an integer that is the gas data member. The getGas method has no parameters. Write in java. First correct answer will be marked brainliest, i need answer very soon

Answers

public class JavaApplication87 {

   

   public static void main(String[] args) {

       Drive dr = new Drive("Insert type of car");

       System.out.println(dr.carType);

   }

   

}

class Drive{

   int miles;

   int gas;

   String carType;

   public Drive(String ct){

       carType = ct;

       miles = 1;

       gas = 1;

       

   }

   int getGas(){

       return gas;

   }

   

}

I'm pretty sure this is what you're looking for. Best of luck.

This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false. Where should return false; be written in the code? function checkVowel(character){ var vowels = ["a", "e", "i", "o", "u"]; for(var i=0; i

Answers

Answer:

at the end, i.e., after the for loop.

Explanation:

see code.

I also added a cooler alternative implementation.

This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false.
This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false.

The main function's return of 0 indicates a successful program execution. Return 1 in the main function denotes an error and indicates that the program did not run correctly. Returning zero indicates that a user-defined function has returned false. Returning 1 indicates that a user-defined function has returned true.

What return false be written in the code?

One of the two values is what t may return. If the parameter or value supplied is True, it returns True. If the supplied parameter or value is False, it returns False.

Because it is a string, “0” is equivalent to false in JavaScript. However, when it is tested for equality, JavaScript's automatic type conversion changes “0” to its numeric value, which is 0; as we know, 0 denotes a false value. As a result, “0” is false.

Therefore, at the end, i.e., after the for loop. I also included a more attractive alternate implementation.

Learn more about code here:

https://brainly.com/question/20345390

#SPJ5

An object is identified by its
characteristics
state
class
attribute​

Answers

Answer:

Characteristics is the correct answer to the given question .

Explanation:

The main objective of object is for accessing the member of class .When we have to access the member of class we can create the object of that class The object  is is identified by there characteristics.The characteristics describe the behavior and state of a class.

With the help of class and object we can implement the real world concept .The object is the run time entity of a class where as the class is physical entity .Without the object we can not implemented the object oriented programming.All the other option are not correct for the object because they are not described the identification of object .

Which 1947 Invention paved the way for the Digital Revolution?

Which 1947 Invention paved the way for the Digital Revolution?

Answers

Answer: I would like to say transistors which is a circiut board component im almost 90% sure lad :)

Explanation:

I hope this helps

have a great day :)

Answer:

Transistor

Explanation:

1947-1979 - The transistor, which was introduced in 1947, paved the way for the development of advanced digital computers. The government, military and other organizations made use of computer systems during the 1950s and 1960s.

01000111 01110101 01100101 01110011 01110011 00100000 01110111 01101000 01100001 01110100 00111111

Answers

12435 425 2 52 35 Guess what?

What are the two components of the FRID system? How does the
reader extract the data stored on the RFID tag.

Answers

The two components of the RFID system are the RFID tag and the RFID reader.

The RFID tag is a small electronic device that contains a microchip and an antenna. It is attached to or embedded in an object or product. The tag stores information or data that can be read by the RFID reader. The data stored on the tag can be unique identification numbers, product details, or other relevant information.
The RFID reader is a device that is used to communicate with the RFID tag. It emits radio frequency signals that power the tag and extract the data stored on it. The reader sends out a radio frequency signal which is picked up by the antenna on the RFID tag. The tag then uses the energy from the signal to power up and transmit the data back to the reader.
Here is a step-by-step process of how the reader extracts the data stored on the RFID tag:
1. The reader emits a radio frequency signal.
2. The antenna on the RFID tag picks up the signal and uses it to power up.
3. Once powered up, the tag sends back a response signal containing the data stored on it.
4. The reader receives the response signal and decodes the data.
5. The decoded data is then processed and used for various applications such as inventory management, access control, or tracking purposes.
For example, let's say you have a library book with an RFID tag attached to it. When you approach the library's entrance with the book, the RFID reader emits a radio frequency signal. The tag on the book picks up the signal, powers up, and sends back the book's identification number. The reader receives the response signal, decodes the identification number, and processes it to check if the book is properly checked out or not.
In summary, the two components of the RFID system are the RFID tag and the RFID reader. The reader extracts the data stored on the tag by emitting a radio frequency signal, which powers up the tag and enables it to transmit the data back to the reader.

To learn more about RFID system
https://brainly.com/question/30498263
#SPJ11

tle electrical instulation maintance
1.what is inventory 2. what is job order 3. what is barrow form 4. what is purchase request

Answers

Inventory refers to the process of keeping track of all materials and equipment used in electrical insulation maintenance.  A job order is a document that contains all the information necessary to complete a specific maintenance task.

Definition of the aforementioned questions

1) Inventory refers to the process of keeping track of all materials and equipment used in electrical insulation maintenance. This includes maintaining a list of all the items in stock, monitoring their usage, and ensuring that there are enough supplies to meet the demands of the job.

2) A job order is a document that contains all the information necessary to complete a specific maintenance task. This includes details about the task, such as the materials and tools required, the location of the work, and any safety considerations.

3) A barrow form is a document used to request materials or equipment from the inventory. It contains details about the requested item, including the quantity, the purpose of the request, and the name of the person or team making the request. The form is usually signed by an authorized person and submitted to the inventory manager or other appropriate personnel.

4) A purchase request is a document used to initiate the process of purchasing new materials or equipment for the electrical insulation maintenance program. It contains details about the item to be purchased, including the quantity, the cost, and the vendor or supplier. The purchase request is typically reviewed and approved by a supervisor or manager before the purchase is made.

learn more about electrical insulation maintenance at https://brainly.com/question/28631676

#SPJ1

Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bag_ounces followed by "seconds". End with a newline. Remember that print() automatically adds a newline.

Answers

Answer:

In Python:

def print_popcorn_time(bag_ounces):

   if bag_ounces < 3:

       print("Too small")

   if bag_ounces > 10:

       print("Too large")

   else:

       print(str(6 * bag_ounces)+" seconds")

       

Explanation:

This defines the function

def print_popcorn_time(bag_ounces):

This checks if bag_ounces < 3

   if bag_ounces < 3:

If yes, it prints too small

       print("Too small")

This checks if bag_ounces > 10

   if bag_ounces > 10:

If yes, it prints too big

       print("Too large")

If otherwise,

   else:

Multiply bag_ounces by 6 and print the outcome

       print(str(6 * bag_ounces)+" seconds")

Answer:

Explanation:

def print_popcorn_time(bag_ounces):

  if bag_ounces < 3:

      print("Too small")

  elif bag_ounces > 10:

# Use of 'if' for this portion, will only yield a test aborted for secondary tests

      print("Too large")

  else:

      print(str(6 * bag_ounces)+" seconds")

user_ounces = int(input())

print_popcorn_time(user_ounces)

What are computer skills?​

Answers

Answer:

Explanation:

like programming or hacking ,  or game design,   maybe telecommunication controls ( think cell phone )

Yeah programming and hacking

what is the function of virtualization.
A. to run network devices over the internet
B. To run an operating system on incompatible hardware
C. To create a system without using any hardware
D. To run one operating system inside another operating system
E. To efficiently run hardware without overloading a system

Answers

Answer:

C

Explanation:

The function of virtualization is to create a system without using any hardware.

What is virtualization?

Virtualization is a process of creating something that is the virtual version including hardware, virtual computers, etc.

The types of virtualization are desktop, server, application virtualization, etc.

Thus, the correct option is C. To create a system without using any hardware.

Learn more about virtualization

https://brainly.com/question/19906390

#SPJ2

Sarah has a class assignment to debate how globalization has impacted business organizations

Answers

Globalization pushes businesses to internationalize and significantly increase the number and variety of cross-border transactions in products, services, and capital.

What is globalization?

The spread of financial products, goods, technology, information, and jobs across national borders and cultures is referred to as globalization. In economic terms, it refers to the interconnection of nations around the world produced by free trade.

Therefore, furthermore, globalization causes the quick dispersion and diffusion of products, technology, and knowledge around the world, regardless of origin.

To learn more about globalization, refer to the link:

https://brainly.com/question/28643280

#SPJ1

Select the software which is used to convert audio data to text .

Answers

Answer:

The process of converting an audio file into a text file is audio transcription. That can include any audio recording like a conference recording, an interview, an academic study, a music video clip. A lot of scenarios exist where it is easier to have a text file than to record audio.

Explanation:

These are the three main ways to transcribe audio into text.

Transcribe our transcription editor manually to the audio (FREE).Use our software for automatic transcription.Book our Services for Human Transcript.

1. If you have no trouble transcribing your files for a little more, you can use our online transcription software. You can listen to the audio file while it is being transcribed by this free interactive editor so that the audio is replayed as many times as necessary. You can use both your dashboard and directly from the editor page to our free transcription editor.

2. First, by using automatic transcription software you can convert an audio file to a readable. To convert any sound recordings into a text file, Happy Scribe uses speech-to-text algorithms.

3. Another option is to hire a freelancing transcriber or to use transcription services such as Happy Scribe when converting audio to text. In order to provide highly effective transcripts, we work with the best transcripts in the world. In English, French, Spanish, and German, our human transcription is available.

sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses i am a failure sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses

sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses

Answers

Answer:

SUNGLASSES!!!!! Also, side note, you're not a failure!

EISDHUOSHSD ITS WORLD WIDE HANDSOME

a new layer 3 switch is connected to a router and is being

Answers

A Layer 3 switch is a device that combines the functions of a switch and a router. It can connect devices on the same subnet or VLAN at high speeds and also support routing protocols and quality of service specifications. When configuring a new Layer 3 switch for interVLAN routing, some of the steps required for the configuration include: enabling IP routing, assigning ports to VLANs, and installing a static route.

Connecting a Layer 3 switch to a router involves configuration of the switch's interfaces, setting up VLANs, and configuring routing protocols for improved network performance.

When a new Layer 3 switch is connected to a router, it involves configuring the switch's interfaces, setting up VLANs (Virtual Local Area Networks), and configuring routing protocols. The Layer 3 switch can perform routing tasks as well as switching tasks. The goal is to optimize the network's overall performance. For example, if there's a lot of inter-VLAN traffic, a Layer 3 switch can handle that locally without having to involve the router. This frees up the router to handle other tasks and reduces overall network traffic. Therefore, when connecting a Layer 3 switch to a router, it's important to plan the configuration carefully according to specific network requirements and architecture.

Learn more about Layer 3 switch here:

https://brainly.com/question/31563411

What does each row represent?
What distinguishes one record from another?
What should you choose as the primary key for
this table?

Answers

Answer:

I think this is your answer broski.

Explanation:

What does each row represent?What distinguishes one record from another?What should you choose as the

Answer:

a..c,,c

Explanation:

drop down on edge

Suppose you are writing an anonymous JavaScript function that will run when your web page loads, and you want to include a statement that will cause a selection list in a web form to become active and ready for data entry. Which method should you apply in this statement?

a. element.focus()

b. element.blur()

c. element.select()

d. element.selectedIndex()

Answers

Answer:

The correct answer is a. element.focus().

Explanation:

the focus() method sets cognizance on the specified element if it can be focused. The focused detail is the element on the way to receive the keyboard and similar occasions by default. So, in case you need to make a ramification listing in a web form active and geared up for information access, you should use the focus() technique.

Here is an example of how to use the focus() method in an anonymous JavaScript function:

function() {

 var selectionList = document.getElementById("mySelectionList");

 selectionList.focus();

}

This function will set focus on the selection list with the id mySelectionList when the web page loads.

To learn more about JavaScript function,

https://brainly.com/question/30331545

Answer:

Explanation:

The correct method to use in the statement to cause a selection list in a web form to become active and ready for data entry is:

element.focus()

The focus() method is used to give focus to an element on a web page, such as an input field or a selection list. When an element receives focus, it becomes the active element, and the user can interact with it or enter data.

In this case, to make a selection list active and ready for data entry when the web page loads, you can use the focus() method on the corresponding <select> element.

For example, if your selection list has an element ID of mySelect, you can include the following statement in your anonymous JavaScript function:

javascript

Copy code

document.getElementById('mySelect').focus();

This will programmatically give focus to the selection list with the ID mySelect, making it active and ready for data entry when the web page loads.

Therefore, the method to apply in the statement is element.focus()'.

Which of the following is not one of the three Trojan horse components?
Group of answer choices
Payload
Dropper
Locker
Wrapper

Answers

A Trojan horse in computers is any malware that deceives people about its true purpose.

What is Trojan horse components?A Trojan horse in computers is any malware that deceives people about its true purpose. The word is taken from the myth of the trickery Trojan Horse in Ancient Greek literature, which resulted in the destruction of the city of Troy. An example of malware that impersonates trustworthy code or software is a Trojan Horse (Trojan). Once within the network, attackers have access to all actions that a regular user would be able to take, including exporting files, editing data, deleting files, and otherwise changing the device's contents. A Trojan horse in computers is any malware that deceives people about its true purpose.

To learn more about Trojan horse components refer to:

https://brainly.com/question/9171237

#SPJ4

You keep forgetting where all of your friends live, so you've decided to write a program to keep track of their addresses for you! Create a variable addressBook that stores the names and addresses of your friends. Given a friend's name, you should be able to lookup their address. The addressBook should be initialized with the following information: Nemo lives at: P Sherman, 42 Wallaby Way, Sydney Luna lives at: 20 Ottery Street, Devon, England Fred lives at 301 Cobblestone Way, Bedrock, CA Then change Nemo's address to be the following address: 124 Conch Street, Bikini Bottom, Pacific Ocean Then lookup the address for Nemo and print it out to make sure it's right! We wouldn't want to lose Nemo. Then we'd have to go find him.​

Answers

Answer:

let addressBook = {

 Nemo: "P Sherman, 42 Wallaby Way, Sydney",

 Luna: "20 Ottery Street, Devon, England",

 Fred: "301 Cobblestone Way, Bedrock, CA"

};

addressBook.Nemo = "124 Conch Street, Bikini Bottom, Pacific Ocean";

console.log(addressBook.Nemo); // "124 Conch Street, Bikini Bottom, Pacific Ocean"

Which task can be completed using both the Shape Fill and Shape Outline panes of PowerPoint?
O adding color
O adding weight
O adding texture
O adding a picture

Answers

Answer:

A.) adding color

Explanation:

just did it on edg 2021

Answer:

A. Adding color

Explanation: Just did it and got it right on Edg 2021

Other Questions
Find the area of the shaded polygon If a second order reaction has an initial concentration of 2.91 M and a concentration of 1.38 M after 189 seconds, what is the rate constant k for the reaction? Your answer should have three significant figures (use scientific notation). A natural gas tank is constructed so that the pressure remains constant. On a hot day when the temperature was 33C, the volume of gas in the tank was determined to be 3000.0L. What would the volume be on a warm day when the temperature is 11C? Name the law that is used to solve this problem. Evaluate and write your answer in a + bi form, rounding to 2 decimal places if needed. [3(cos 95 + i sin 95*))" Average costs:a) should be the basis for decision makingb) are often misleadingc) are differential costsd) contain sunk costs Intercept form 4x + 5y = 20 parallel and perpendicular lines. Solve the system of equations -x+10y-2z=8. y-52=-4, 1+3x-y=0 via the SOR method using the starting point xo=0,yo=0.9,zo=1.1 tolerance=tol=0.05,a11=3,a22=10,a33=5and=0.9. [16 marks] The design of air bags depends on stoichiometric precision. A compound named sodium azide(NaN 3 ) quickly decomposes into sodium metal and nitrogen gas. The sodium metal is safely reacted in anotherside-reaction, but how many grams of NaN 3 must be included in the air-bag design if they need to inflate thebag with 65.1 liters of nitrogen gas? Assume the reaction occurs at STP (just an assumption for this problem).Show your work! Balance the chemical equation. (4 pt)___NaN 3 ___Na + ___N 2 Determine which of the following matrices are symmetric, and which are orthogonal If orthogonal, find the inverse.a. $\left[\begin{array}{rrr}-6 & 2 & 0 \\ 2 & -6 & 2 \\ 0 & 2 & -6\end{array}\right]$b. $\quad\left[\begin{array}{ccc}2 / 3 & 2 / 3 & 1 / 3 \\ 0 & 1 / 3 & -2 / 3 \\ 5 / 3 & -4 / 3 & -2 / 3\end{array}\right]$ The most frequently used approach to defending a company's present position involves actionsa. displaying a strong bias for swift, decisive, and overwhelming actions to overpower rivalsb. employing the element of surprise as opposed to doing what rivals expect and are prepared forc. creating and deploying company resources in ways that cause rivals to struggle to defend themselvesd. focusing on building competitive advantage and then striving to convert in into a sustainable advantagee. restricting a challenger's options for initiating a competitive attack among girls in premier ballet academies, there are such strong social pressures to look prepubescent that breast development evokes distress. according to the text, this tends to support the idea that ____ . please choose the correct answer from the following choices, and then select the submit answer button. answer choices A. in general, u.s. culture tends to view larger breasts on women as better than smaller breasts B. children's reactions to puberty depend on their unique environment C. children's reactions to puberty and menstruation are genetic D. u.s. girls feel proud of their developing breasts You were recently hired as a marketing executive by Dreamland [http://www.dreamland.com.my/]. The company plans to improve its overall branding/marketing strategy targeting at consumers with higher concern about spinal support. You are tasked to suggest three ways to achieve the objective and present your findings. Your suggestions need to be aligned with the promotional tools and how it complements one another. The Corata Appliance Manufacturing Corporation manufactures two vacuum cleaners, the Standard and the Super. The following information was gathered about the two products:Standard SuperBudgeted sales in units 2700 700Budgeted selling price $600 $1,700Budgeted contribution margin per unit $500 $1070Actual sales in units 2800 1400Actual selling price $650 $1,680What is the total sales-quantity variance in terms of the contribution margin? (Round intermediary calculations to two decimal places.)A.$495,760 favorableB.$179,760 favorableC.$316,000 favorableD.$136,240 favorable in the vector space model, the dimensions in the multi-dimensional space are the terms the documents The bad feelings associated with disappointing news can generally be reduced if the receiverGroup of answer choicesA. believes that the decision was fair.B. All of the above.C. knows the reason for the rejection.D. thinks the matter was revealed sensitively. what is a main purpose of launching an access attack on network systems? Joco Company purchased an equipment on November 1, 2015, for $150,000. At the time of acquisition, the equipment was estimated to have a useful life of 10 years and a salvage value of $5,000. Joco recorded the depreciation using 150% declining balance method On May 1, 2018, the equipment was sold for $56.000Compute the depreciation expense for 2015 explain how Qantas dealt with covid 19 pandamic and why thosestrategies worked to sustain the business. An electric current of 1.00 ampere is passed through an aqueous solution of Ni(NO3)2. How long will it take to plate out exactly 1.00 mol of nickel metal, assuming 100 percent current efficiency? (1 Faraday = 96,500 coulombs = 6.02 x 1023 electrons). multiple choice: 386,000 sec193,000 sec96,500 sec48,200 sec24,100 sec