philip creates a coded value domain containing the values n, s, e, and w to store directions for road names. when he begins editing, there are no values listed in the dropdown list in the table. what is the most likely problem?

Answers

Answer 1

Philip only entered the codes in the domain properties and not the descriptions, which is why he didn't get any values in the drop-down list in the table.

What is Table in Excel?

Your data is contained in Excel Tables. Excel is informed that all the data in the columns and rows you have marked as related by the definition of the data as a table. That saves a ton of time. First, many list-related features are provided to you automatically. Second, all formats and formulas are automatically added when a row is added.

How do You create an Excel table?

One of Microsoft Excel's simpler features is making a table. Select the worksheet containing your list when your Excel workbook is open. Either choose the desired list range yourself or let Excel choose your list. Then select a table by clicking on insert. and finished.

To learn more about Tables, visit: https://brainly.com/question/14078371

#SPJ4


Related Questions

How can you identify the type of resource returned by a search engine?
Select one:
O a. It's impossible to tell without clicking on the URL to see what happens
O b. The type will be clearly labeled next to the description
O c. You request a specific type up-front when you begin the search
O d. Look at the file extension at the end of the URL

Answers

d.Look at the file at the end of the URL

How to look at the file at the end of the URL?

The file's extension informs your computer which program created or can open the file and which icon to use. For instance, the docx extension instructs your computer to display a Word symbol when you examine the file in File Explorer and that Microsoft Word may open it.

Extensions are crucial since they inform your computer about the file's icon and the program that may open it. For instance, a file with the extension "doc" indicates to your computer that it is a Microsoft Word file.

Hence looking at the file  at the end of the URL is suggested

To know more about the file please follow this link:

https://brainly.com/question/12325790

#SPJ1

a data analyst adds a section of executable code to their .rmd file so users can execute it and generate the correct output. what is this section of code called?

Answers

Code results may be directly placed into a. Rmd file's text by surrounding the code with the letter "R" there is a file format called Markdown.

What does an RMD file mean?

The R programming language's open-source Integrated Development Environment (IDE), RStudio, is used to create R Markdown files, which are known as RMD files. It consists of YAML information, plain text with Markdown formatting, and sections of R code that, when produced with RStudio, come together to create an intricate data analysis document.For creating dynamic documents using R, there is a file format called Markdown. R Markdown documents, like the one below, are written in markdown (a simple plain text style) and include sections of embedded R code.    

To learn more about RMD files refer to:

https://brainly.com/question/26021537

#SPJ4

15) an object-oriented database structures the information into multidimensional data cubes. (1 point) true false

Answers

It is FALSE to state that an object-oriented database structures the information into multidimensional data cubes.

What are multidimensional data cubes?

A multidimensional data cube generally aids in the storage of vast volumes of data by utilizing a multidimensional array. It improves its efficiency by maintaining an index for each dimension. As a result, of is multi-dimensionality, it can obtain data quickly.

An object-oriented database (OOD) is a database system that can handle sophisticated data objects, such as those found in object-oriented programming languages. Everything in object-oriented programming is an object, and many objects are highly complicated, with various characteristics and actions.

Learn more about object-oriented database:
https://brainly.com/question/28298014
#SPJ1

tom surveys the users of a new software product. one of the survey questions asks users to rate their preferences on a likert scale. tom addresses the dimension of usability known as .

Answers

Tom addresses the dimension of usability known as  satisfaction. A collection of computer programs, documentation, and data is referred to as software. This is in contrast to hardware, which is the foundation of the system and does the real work.

What is Software?

Software is a collection of computer programs, documentation, and data. This is in contrast to hardware, which is the foundation of the system and does the real work.

A set of instructions, data, or programs used to run computers and carry out specified activities is referred to as software. It is the inverse of hardware, which describes a computer's physical components. Software is a catch-all phrase for apps, scripts, and programs that execute on a device.

Examples of well-known computer software include: operating systems (such as Microsoft Windows, Linux, and macOS) productivity software (for example, Microsoft Office Suite including Word, Excel, and PowerPoint) Browsers on the internet (including Firefox, Chrome, and Safari).

To learn more about software refer to:

https://brainly.com/question/1538272

#SPJ4



What factors are most important when designing a computer network? SELECT ALL THAT APPLY
1) the ways in which employees share business documents
2) the type of work done at networked computers
3) the rate of pay for networked employees
4) the number of networked computers
5) the number of hours employees work
6) the number of employees using each computer

Answers

The factors are most important when designing a computer network are:

1) the ways in which employees share business documents.

2) the type of work done at networked computers.

4) the number of networked computers.

6) the number of employees using each computer.

What are networks on computers?

Computer networking is the term for a network of connected computers that may communicate and share resources. These networked devices transmit data through wireless or physical technologies using a set of guidelines known as communications protocols.

Local-area networks (LANs) and wide-area networks are two fundamental types of networks (WANs). LANs use links to connect computers and peripheral devices in a constrained physical space, like a lab, office, or college campus.

So, If you want a network that is dependable, secure, and efficient, there are four key factors that you must take into mind while designing it. Embedded security mechanisms, software and hardware standardization, network resilience, and redundancy are a few of them.

Learn more about computer network from

https://brainly.com/question/20535662
#SPJ1

when hackers gain access to a database containing your personal private information, this is an example of:

Answers

Answer: Breach, database breach.

Explanation:

if a loop does not contain, within itself, a valid way to terminate, it is called a(n) loop question 2 options: a) for b) do-while c) while d) infinite

Answers

Option c is correct. If a loop does not contain, within itself, a valid way to terminate, it is called a while loop.

A while loop is a control flow statement that enables code to be performed repeatedly based on a specified Boolean condition in the majority of computer programming languages. The while loop can be viewed as an iterative version of the if statement.

When a condition is not satisfied, a "While" loop is used to repeat a certain piece of code an undetermined number of times. For instance, if we want to ask a user for a number between 1 and 10, but we don't know how often they might enter a greater number, we keep asking "while the value is not between 1 and 10."

To know more about while loop click here:

https://brainly.com/question/15172842

#SPJ4

write a function choose door that asks the user to input an integer 1,2,3 to choose a door and returns the door they chose. you should catch any errors that the user might make and continue asking for input until the user inputs a valid choice.

Answers

The required function is written in C++:

#include <iostream>

using namespace std;

void func_input(int);

int main()

{

   int in_num;

  cout<<"Please enter 1,2, or 3 :  ";

   cin>>in_num;

   func_input(in_num);

   return 0;

}

void func_input(int in_n)

{

if (in_n==1 || in_n==2 || in_n==3)

  {

    if (in_n==1)

      cout<<"door 1 opened";

    if (in_n==2)

     cout<<"door 2 opened";

    if (in_n==3)

     cout<<"door 3 opened";

  }

  else

    cout<<"Please enter a valid number";

}

Please find the implementation of the function with output in the given attachment.

You can learn more about function at

https://brainly.com/question/16362961

#SPJ4

why can't i update my windows 10 there were problems installing some updates, but we'll try again later. if you keep seeing this and want to search the web or contact support for information, this may help:

Answers

These are the main reasons:

Conflicting software - In this case, you might need to remove the external program that causes this issue.Corrupted system files - Even though this could be a major issue for other Windows services, using a system repair tool will be helpful.Antivirus programs - These programs are necessary to protect your data, but they may interfere with some critical operations and may need to be turned off.

What can I do if Windows 10 updates won’t install?

If the updates won't install, Windows Update might not be operating properly. Resetting the relevant parts and attempting again will resolve this.

Occasionally, you might receive The error notice "We couldn't complete the updates" comes if a problem with your system stops the update from finishing. Antivirus software may occasionally be the cause of this.

A few users claimed that Windows updates were awaiting installation, which the built-in troubleshooters could resolve.

How can I fix the problems with installing updates?

Run Windows Update troubleshooter

Run the DISM tool

Manually reset Windows Updates components

Run a System File Checker scan

Temporarily disable your antivirus security software

Download updates manually

Learn more about windows update click on this:

https://brainly.com/question/28903855

#SPJ4

you are configuring the host firewall on a linux system and want to make sure that the packets sent by the ping program are not processed by the system. which command should you use?

Answers

Since you are configuring the host firewall on a Linux system the command that you should  use is iptables -A INPUT -p icmp -j DROP

Why is it crucial to host a firewall?

Utilizing host-based firewalls has the advantage of preventing all incoming traffic, including malicious traffic of course, from accessing the operating system.

Therefore, Directly installed firewall software is known as a host-based firewall (rather than a network). Host-based firewalls aid in the detection and termination of viruses, malware, and other malicious scripts that network security may not have been able to stop.

Learn more about  host firewall from

https://brainly.com/question/27960047
#SPJ1

a data analyst adds specific characters before and after their code chunk to mark where the data item begins and ends in the .rmd file. what are these characters called?

Answers

If a data analyst adds specific characters before and after their code chunk to mark where the data item begins and ends in the .rmd file, these characters are called delimiters.

Who is a data analyst?

A data analyst can be defined as an expert or professional who is saddled with the responsibility of inspecting, transforming, analyzing, and modelling data with the sole aim of discovering useful information, providing insights, and creating informed conclusions, in order to support decision-making and create a completed report.

What is a delimiter?

In Computer technology, a delimiter can be defined as a set of characters that are designed and developed to be used by computer programmers for marking the beginning and ending of a data item in a code chunk (.rmd file).

In this context, we can reasonably infer and logically deduce that a delimiter is used for indicating where a data item starts and end.

Read more on data analyst here: brainly.com/question/27853454

#SPJ1

Complete Question:

A data analyst adds specific characters before and after their code chunk to mark where the data item begins and ends in the .rmd file. what are these characters called?

A. Delimiters.

B. Syntax

C. Markdown

D. Backtricks

gwen is investigating an attack. an intruder managed to take over the identity of a user who was legitimately logged into gwen's company's website by manipulating hypertext transfer protocol (http) headers. which type of attack likely took place?

Answers

Hackers can access a target's computer or online accounts by using the session hijacking technique.

What is session hijacking?Hackers can access a target's computer or online accounts by using the session hijacking technique.A hacker who wants to acquire a user's passwords and personal information hijacks the user's browser session in a session hijacking attack. IP spoofing, the most popular technique for session hijacking, involves an attacker using source-routed IP packets to snoop into a conversation taking place between two network nodes while pretending to be one of the authenticated users.Depending on how they are carried out, there are two different types of session hijacking.Active hijacking is when the attacker actively interferes with the target, and passive hijacking is when the attacker only watches the communication. Attackers look for sessions where they can enter your accounts without authorization and take your data.To prevent session hijacking attacks, you should always validate your login credentials in a secure method.

To learn more about Session hijacking refer

https://brainly.com/question/13068625

#SPJ4

write some code that repeatedly reads a value into the variable n until a number between 1 and 10 (inclusive) has been entered.

Answers

Making a set of instructions that instruct a computer how to carry out a task is the process of programming. Computer programming languages like JavaScript, Python, and C++ can all be used for programming.

every iteration, the formula initVal:step:endVal increases the index by the value step, or decreases the index if step is negative.

valArray: On each iteration, create a column vector, index, from the array's succeeding columns. For instance, index = valArray on iteration one (:,1). The maximum number of times the loop can run is n, where n is the number of columns in the valArray, which is returned by numel(valArray(1,:)). Any MATLAB® data type, such as a character vector, cell array, or struct, may be used as the input valArray.

Learn more about array here-

https://brainly.com/question/19570024

#SPJ4

After launching the Mail Merge task pane,
the first step is to:
(A)Identify the data source
(B) Identify the main document
(C) Specify the letter size
(D)Specify the envelope size

Answers

After launching the Mail Merge task pane, the first step is to

B. Identify the main document

What is mail merge?

Mail merge is a method of building  letters or emails with a bit of automation.  

It requires two components

a template of a letter or an email with specific placeholders And a spreadsheet with a set of dataThese can be names, addresses or any other custom data.Form letters, mailing labels, envelopes, directories, and bulk e-mail and fax distributions. Mail Merge is most commonly used to print or email multiple recipients form lettersCustomize form letters for particular on mass-produce covers and labels.

Hence, Identifying the main document is the first stage in Mail Merge Task.

To learn more about Mail Merge from the given link

https://brainly.com/question/21677530

#SPJ13

What term or phrase can be used to describe the process of networks linking to one another using a variety of tools and strategies? broadband network connectivity tunneling protocol

Answers

Answer:

The appropriate term would be Network Connectivity.

Explanation:

Which audio is used to create chip tunes?

A. MIDI
B. MOD
C. Tracked audio
D. FM sythisis

URGENT ASAP

Answers

The audio that is used to create chip tunes is FM synthesis. The correct option is D.

What are chip tunes?

A type of synthesized electronic music created utilizing the programmable sound generator (PSG) sound chips or synthesizers in vintage arcade machines, computers, and video game consoles is known as chiptune, sometimes known as chip music or 8-bit music.

A sine wave carrier oscillator and a modulator oscillator are used in FM synthesis. In order to create new harmonics, the modulator oscillator modifies the carrier oscillator's waveform's frequency within the audio range.

Therefore, the correct option is D. FM synthesis.

To learn more about chip tunes, refer to the link:

https://brainly.com/question/16231644

#SPJ1

turn to code m36.8 in the tabular list. you will found a code first notation under code m36.8. under the code first notation, what is the code associated with ochronosis?

Answers

According to the scenario, the code associated with ochronosis is E70.2.

What is meant by a Tabular list?

A tabular list may be defined as a type of list that is systematically arranged in chronological order. This list consists of ICD-10-CM codes that are divided into chapters on the basis of the body system or condition.

According to the context of this question, a tabular list is essential for representing the alphabet index in the ICD-10-CM along with their assigned code. This is because The Alphabetic Index does not always provide the full code.

Therefore, the code associated with ochronosis is E70.2.

To learn more about Tabular list, refer to the link:

https://brainly.com/question/9442380

#SPJ1

use drag and drop to show the different types of media which can be easily integrated into a site and which ones cannot.

Answers

Site Page integration: Chart, Image, Video, and Document

Integration not possible: Flash animation and Game

What is website integration?When your website communicates or receives data from another program, system, or website, this is referred to as website integration. Website integrations are helpful for connecting data from many sources. Combining this data can help you comprehend your clients' needs and behaviors, fill in any operational gaps, and lessen human mistake.You may better manage sales and marketing efforts by integrating your website. Through conversion rate optimization, you may monitor the success of your marketing initiatives when an application is incorporated into your website.The fundamentals of integration revolve around making it easier for your website and another application to exchange data. The two apps can connect thanks to an API (application programming interface). An API key is frequently required in order to access data from another system.

To learn more about website integration, refer to

https://brainly.com/question/13110523

#SPJ4

hich iot devices can be used to improve workplace safety in mining, heavy industries, and construction?

Answers

IoT seismic sensors are the devices that can be used to improve workplace safety in mining, heavy industries, and construction.

The mining sector can be hazardous. Miners can be put in danger by risky working conditions, demanding manual labor, and proximity to powerful machines, but the internet of things (IoT) can be helpful. The Internet of Things (IoT) can be used to improve mining safety and potentially save lives.

In 2020 alone, there were over 3,000 occupational accidents in the mining sector that cost workers days off. Even while that number has steadily decreased over the previous few years, it is still quite high. Given how frequently these accidents occur, mines must to take every precaution to safeguard their workers.

Here are some ways in which IoT devices can assist mining companies in doing that.

To know more about IoT click here:

https://brainly.com/question/25703804

#SPJ4

a(n) reviews the log files generated by servers, network devices, and even other idpss looking for patterns andsignatures that may indicate an attack or intrusion is in process or has already occurred.

Answers

Log file monitor (LFM) that may indicate an attack or intrusion is in process or has already occurred.

What is log files?

An event that happened at a specific time and may have contextual metadata is recorded in a log file. The events that take place within a system, including transactions, mistakes, and intrusions, are recorded historically in log files.

What is context metadata?

The web of relationships between data points is known as the data context. Those associations may be made as metadata or could just be found and correlated. The ability to extract information from data is fundamentally made feasible by contextual metadata, which adds value. A single data point is meaningless by itself.

What is intrusion?

A security incident is a security event, or collection of related security events, in which an unauthorized person gains access to, or makes an attempt to gain access to, a system or system resource.

Learn more about Log file monitor click here:

https://brainly.com/question/4595770

#SPJ4

you want to update all packages in your system as well as their dependencies. which command should you use?

Answers

To update all packages in your system as well as their dependencies.  You can use  yum update .YUM is a graphical-based package management tool for RPM

What is the yum update command?For Linux systems using RedHat Package Manager (RPM), YUM (Yellowdog Updater Modified) is an open-source command-line and graphical package management tool.On a system, it makes it simple for users and system administrators to install, update, remove, or search software packages. Red Hat Enterprise Linux uses YUM as its main package management tool for setting up, deleting, and managing software packages.When installing, upgrading, and uninstalling software packages, YUM resolves dependencies.YUM may handle packages from either the system's installed repositories or from. yum update will update all of the installed packages if you run the command without any packages.Yum will only update the listed packages when one or more packages or package globs are given.Yum will make sure that all dependencies are met while updating packages.

To learn more about yum update refer

https://brainly.com/question/13107800

#SPJ4

please help 2.7.8 auto fill

Answers

Using the knowledge of the computational language in JAVA it is possible to write a code that write a variables that store personal information that you often need to fill various forms.

Writting the code:

public class FormFill

{

private String fName;

private String lName;

private int streetNumber;

private String streetName;

private String aptNumber;

//create varieables

// Constructor that sets the first and last name

// streetNumber defaults to 0

// the others default to an empty String

public FormFill(String firstName, String lastName)

{

fName = firstName;

lName = lastName;

}

//give meaning to some varieables

// Sets streetNumber, streetName, and aptNumber to the given

// values

public void setAddress(int number, String street, String apt)

{

streetNumber = number;

streetName = street;

aptNumber = apt;

}

//give meaning to some varieables

// Returns a string with the name formatted like

// a doctor would write the name on a file

//

// Return string should be formatted

// with the last name, then a comma and space, then the first name.

// For example: LastName, FirstName

public String fullName()

{

String fullName = lName + ", " + fName;

return fullName;

}

//give meaning to some varieables

// Returns the formatted address

// Formatted like this

//

// StreetNumber StreetName

// Apt AptNumber

//

// You will need to use the escape character \n

// To create a new line in the String

public String streetAddress()

{

String fullstret = streetNumber + " " + streetName + "\n" + "Apt " + aptNumber;

return fullstret;

}

//give meaning to some varieables

// Returns a string with the credit card information

// Formatted like this:

//

// Card Number: Card#

// Expires: expMonth/expYear

//

// Take information as parameters so we don't store sensitive information!

// You will need to use the escape character \n

public String creditCardInfo(int creditCardNumber, int expMonth, int expYear)

{

String credi = "Card Number: " + creditCardNumber + "\n" + "Expires: " + expMonth + "/" + expYear;

return credi;

}

//compile variables

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

When navigating the design process do you have to follow each stage in order or is it possible to jump across the different stages dynamically?

Answers

Answer:Not all navigation mechanisms on a site are equal.

Your job is to sort them out. You must determine the purpose and importance of the navigation within your site, bringing similar options together and presenting them as a cohesive unit. Of course, there are conventions to get you started—bars and tabs are commonly used for the main navigation, vertical mechanisms on the left for local navigation—but there are no set usage rules, and many variations exist.

Explanation:

Marcus wants to create a spreadsheet with names, street addresses, city, and state for a mailing list. all those on the list will have the same city and state. which tool would be the best to use to quickly enter that information? flash fill autocomplete autofill tell me bar

Answers

Autofill

You can learn more through link below:

https://brainly.com/question/8284022#SPJ4

a bitwise operator affects each pair of significant bits in the operands. the bitwise or operation result for decimals 610 (01102) or 510 (01012) is 710 (01112). what is the bitwise and operation result for decimals 510 and 910?

Answers

When the corresponding bits of one or both operands are 1, the bitwise OR operator (|) returns a 1 in each position. 510=(0101)2 910=(1001)2

Why it is called bitwise operator?In operating systems and driver software, flag values are typically defined using bitwise operators.For instance, the operating system's conceptual representation of the read-only mode in a file property is as a flag bit, and the bitwise operator is used to switch between the true and false values. Programming at the bit level makes use of them.These operators are used to change the bits in an expression for integers.Three different categories of bitwise operators are logical, shift, and complement.Reversing the bits in an expression is done using the bitwise complement operator. Each bit in the operands is examined separately by the bitwise logical operators, who then compute the result's corresponding bit value.Binary operators with a left and right operand include the bitwise operators and, or, and xor.The unary operator with only a right operand that makes up the bitwise operator not is.

To learn more about bitwise operator refer

https://brainly.com/question/14675288

#SPJ4

by default, the count function uses the distinct keyword when counting the values contained in a column. (true or false?)

Answers

the count function uses the distinct keyword when counting the values contained in a column is False.

What is count function?

The COUNT function counts the number of arguments in the list as well as the number of cells that contain numbers. Get the number of entries in a number field that is part of a range or array of numbers by using the COUNT function.

If we want to keep track of the number of cells in a particular range, it is helpful as a financial analyst when analyzing data.

Formula:

=COUNT(value1, value2,...)

Where:

Value1 is the initial item, cell reference, or range for which we want to count numbers (mandatory argument).

Value2... (optional parameter) - We can specify up to 255 extra items, cell references, or ranges to count numbers in.

Keep in mind that this function will just count numbers and disregard all other input.

Learn more about count function click here:

https://brainly.com/question/2945487

#SPJ4

the what went wrong feature in chapter 9 focuses on devver, a 2008 startup that helped software developers use cloud-based services to test their code in an expedient manner. according to the feature, what was one of the primary reasons devver failed?

Answers

The primary reason was that the founders of the companies are unable to transition into their new roles quickly enough, and the companies lack a "track record" with outside buyers and sellers.

Building software that satisfies user needs requires the use of programming and design skills by software developers. They typically meet with a client who needs software built before building, testing, and deploying the program in accordance with the companies they have been given.

In many facets of the economy today, software engineers are among the most important professionals. Software is the power behind every digital device in the world, not only codes, games, and apps. Software developers use a variety of tools and skills to design, program, create, deploy, and maintain software. Additionally, they contribute to the creation of software systems that power devices and networks and maintain the functionality of those systems.

To know more about software click here:

https://brainly.com/question/985406

#SPJ4

question 1 an analyst notes that their data is formatted as euros, but it should be formatted as pesos. what spreadsheet tool can help them select the right format?

Answers

The format as currency tool can be used the change the currency format from Euros to Pesos.

What is Currency tool ?

Numerous currencies are frequently associated with large universes. It might be challenging at times to keep track of their values, particularly their comparative values. Hopefully, this currency tool will be useful in that regard. The tool will automatically update once you enter the names of your currencies, their exchange rates to the first currency, and, optionally, the amount you want to see altered. just like that.

The "Add a currency" button allows you to add new currencies, and the corresponding buttons let you save and load your data. Everything will be saved in your browser, allowing you to easily close your browser, return at a later time, and reload your prior work. Keep in mind that only modern browsers and not using them will make this function.

To learn more about Currency Exchange , refer :

https://brainly.com/question/21263954

#SPJ4

suppose that list is an array of 10 components of type int. which of the following codes correctly outputs all the elements of list?

Answers

In C++ suppose that list is an array of 10 components of Type int. The codes that correctly outputs all the elements of list is (Option C) given below:

for (int j = 0; j <= 9; j++)

cout << list[j] << " ";

cout << endl;

What is an Array?

Array programming in computer science refers to methods that allow operations to be applied to a whole collection of values at once. These kinds of solutions are frequently employed in scientific and technical contexts.

Arrays are utilized when several variables of the same type must be used. It is defined as a succession of items of the same data type. It is used to hold a group of data, and it is more practical to conceive of an array as a group of variables of the same class.

Learn more about codes:
https://brainly.com/question/1603398
#SPJ1

Full Question:

In C++ suppose that list is an array of 10 components of type int. Which of the following codes correctly outputs all the elements of list?

A)

for (int j = 1; j < 10; j++)

cout << list[j] << " ";

cout << endl;

B)

for (int j = 1; j <= 10; j++)

cout << list[j] << " ";

cout << endl;

C)

for (int j = 0; j <= 9; j++)

cout << list[j] << " ";

cout << endl;

D)

for (int j = 1; j < 11; j++)

cout << list[j] << " ";

cout << endl;

Which best describes what the yellow pencil icon represents on the table below?

a. The record is ready for new data that will automatically save as it is typed.
b. The record is ready for new data and will not automatically save.
c. The record is being edited and has not been saved.
d. The record is complete and has been saved.

Answers

The best description of the yellow pencil icon represents in the table below is the record is being edited and has not been saved. The correct option is c.

What is editing?

The editing tool is generally denoted by a pencil in computer different programs. Selecting and preparing written, visual, audio, and video material to convey information is known as editing.

In order to produce correct, consistent, accurate, and comprehensive work, the editing process may comprise correction, condensation, organizing, and other alterations.

Therefore, the correct option is c. The record is being edited and has not been saved.

To learn more about editing, refer to the link:

https://brainly.com/question/21263685

#SPJ1

Other Questions
which characteristic was common across the many tribes inhabiting north america at the dawn of european colonization? Samuel is taking a multiple choice test with a total of 100 points available. Each question is worth exactly 5 points. What would be Samuel's test score (out of 100) if he got 9 questions wrong? What would be his score if he got xx questions wrong? In a dentists x-ray machine, electrons may be subjected to a net force of 1X10-13 The mass of an electron is about 1X10-30 kg. What is the acceleration of the electrons? How long does it take the electrons to be accelerated from rest across a gap of 10 cm? true or false: changing the background color of a jframe must be done in the event dispatch thread (edt). A therapist helps a client by focusing on her misguided thinking patterns. The therapist believes that by modifying how someone is processing information about the world, that this will help the person's overall mental health. For this therapist, there is an emphasis on thinking and processing.With which of psychology's major perspectives does this therapist most closely align?A. cognitiveB. psychoanalytic theoryC. behavioristD. humanistic if a peregrine falcon dove at its maximum speed for half a mile to catch prey, how many seconds would the dive take? (round your answer to the nearest second.) When is an equation true? Which of the following best describes Native American societies? Pls HELPPPPPPPP GIVING BRAINLIST!!!Native Americans lived in large city-states. Native Americans created societies only in river valleys. Native Americans were monotheistic. Native Americans lived in tribes, clans, or bands Answer all parts (french) This is not who we are. Written by Naomi Shihab NyeWhich statement describes the author's main purpose in the text?A To highlight how she has been treated negatively for her cultural identityB To emphasize her difficulty choosing between her Arab and American IdentitiesC To share her experiences as an Arab-American in the current social climate dentify capital budgeting decisions. multiple select question. employee attainment decisions equipment replacement decisions expansion decisions product costing decisions 2) according to your notes, which of the following are true about the business cycle? a) as output falls, unemployment rises. b) economic fluctuations are irregular and unpredictable. c) most macroeconomic quantities fluctuate together. d) all of the above. Which answer option best evaluates how well the following summary reflectsthe original passage?People in the past slept in two stretches, with some time awake in themiddle of the night, rather than getting one long block of sleep likemost people do today. PRETTY PLS HELP 30 POINTS!!!!!! PLSSSSSSSPANISH 1B: Unit 2 Writing Assignment 1Go to Slide 4 in the Expressing Thoughts and Feelings Tutorial and listen to the conversationbetween the group of friends in the video (**there is a transcript of this conversation that youshould read as you listen**) Answer the following questions from the conversation in completeSpanish sentences.1. Cmo se llaman los tres amigos?2. Qu idioma (language) estudia Victor? Qu lengua estudia Marta?3. Qu deporte juega Emily?4. A Victor le gusta basquetbol o ftbol? Cundo juega el ftbol?5. A Marta, qu le gusta hacer todos los das? A bowling ball is pushed with a force of 22. 0 N and accelerates at 5. 5 m/s2. What is the mass of the bowling ball? 7. Hannah invests 750 and after 4 years has 844.13. Find the compound interest rate. the initial number of views for a reader board was 25. the number of views is growing exponentially at a rate of 18% per week. what is the number of views expected to be four weeks from now? round to the nearest whole number. sage hill technologies inc. applies manufacturing overhead based on machine hours. budgeted manufacturing overhead cost for the coming year is $759000 and budgeted machine hours are 330000 hours. actual manufacturing overhead totaled $96000. manufacturing overhead was overapplied by $36020. how many machine hours were actually used during the year? 330000 machine hours 57400 machine hours 759000 machine hours 33000 machine hours a company is planning to have a booth at a job fair to recruit for landscapers. in order to help potential applicants decide whether they are a good fit for the job, the company should: On the maturity date of a $9,600, 3-month, 12% note, the borrower sends a check that includes the principal and all the interest due on the note. What is the amount of the borrower's check?