Answer:
Word Processing refers to the act of using a computer to create, edit, save and print documents. ... Text can be inserted, edited, moved, copied or deleted within your document and the appearance of the text can be modified in numerous ways.
Diane, a developer, needs to program a logic component that will allow the user to enter a series of values
Your job is to protect your company's information assets. What security objectives
should you address?
1) Assets, liabilities, and threats
2) Common vulnerabilities and exposures
3) Confidentiality, integrity and availability
4) Risks, threats and vulnerabilities
Answer:3
Explanation: The CIA Triangle is the basis of all Security related needs.
list 3 things needed in order to complete mail merge process.
pls help me!
What is the result of the following code?
x=7//2+10%2**4
print(x)
Answer:
3
Explanation:
We can split the expression into two sections
First Section:
7 // 2 = 3. Using the floor division we only utilize the integer part.
Second Section:
10 % 2**4 = 0**4 = 0
Bringing back the full version expression we have
3 + 0 = 3
Where is the option to set Conditional Formatting rules found?
O Insert tab in the Formatting group
O Page Layout tab in the Styles group
O Home tab in the Styles group
Formulas tab in the Formatting group
Answer:
C
Explanation:
the person above me is correct, you should mark them brainliest
x = 9 % 2
if (x == 1):
print ("ONE")
else:
print ("TWO")
Answer:
Hewo There!!
_______________________
Simplify 9 % ⋅ 2 .
x = 0.18
_______________________
“One’s life has value so long as one attributes value to the life of others, by means of love, friendship, indignation and compassion.” — Simone De Beauvoir
_______________________
Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn
Every device connected to the public Internet is assigned a unique number known as: a. an Internet Protocol (IP) addres
Answer:
yes
Explanation:
its the number used to identify the devise connected to the internet
b) What is system software? Write its importance.
Answer:
System software is software designed to provide a platform for other software. Examples of system software include operating systems like macOS, Linux, Android and Microsoft Windows, computational science software, game engines, search engines, industrial automation, and software as a service applications.
Explanation:
• R7.9 Write enhanced for loops for the following tasks.
a. Printing all elements of an array in a single row, separated by spaces.
b. Computing the maximum of all elements in an array.
2. Counting how many elements in an array are negative.
Answer:
a is the correct answer
Explanation:
correct me if I'm wrong hope it's help thanks
So has anyone opened the link/file those people are giving out as answers? Like what are they, viruses, answers, nothing??? Someone that has opened one tells me what it was and what happened because I am to scared to open it.
Answer:
They're viruses that why they answer so quick and get deleted quickly
list different examples of models
Answer:
Planet 3D model
Chemical reactions on a computer simulation
Flowchart of how science has changed over time
Tectonic plate movement in a drawing or picture
Making an Atom cake (i've done it and it was fun)
Earth foam Structure with a quarter or it cut out to show the inside
what are organization tools?
what is a survey? plz hel
Answer:
The act of seeing and recording information.
Answer:
a method of collecting data tell me if i'm wrong or right plz
Explanation:
Arrange the following steps in an appropriate order for program execution:
- Step A: translates the source code into the target machine code
- Step B: preprocesses the source code
- Step C: writes the source code
- Step D: links object code to other library files
Which one is correct:
A) D, C, B, A
B) C, A, D, B
C) A, B, C, D
D) C, B, A, D
The best arrangement of the following steps in an appropriate order for program execution is:
D) C, B, A, DAccording to the given question, we are asked to give the best arrangement of the following steps in an appropriate order for program execution
As a result of this, we can see that when a person is writing a code, he would have to first write the source code, then preprocess it, before he translates it into the target machine code before finally linking the object code to other library files
Therefore, the correct answer is option D
Raad more about source code here:
'https://brainly.com/question/4593389
Meenakshi has created a presentation of six slides. The slides have the same background, but s wants to change the background of each slide. Which option can help her in doing so?
VPN or Proxy is safer?
I really need help with this question! Please help!
Answer:
(C) Emma goes to sleep late and does not set an alarm.
Explanation:
Decomposing a problem is setting a back drop inference as to (WHY?) something happens . So Emma woke up late , the only reasonable (WHY?) in this question would be (C)
13) You notice that the row labels in your spreadsheet are 1, 2, 3, 8, 9.
Row labels 4 through 7 are missing. What could cause this?
Possible reasons for missing out row 4 to 7 are as follows,
Chance of rows from 4 to 7 contain incorrect/ non formatted data.Chance of rows from 4 to 7 are in hidden state.Chance of rows from 4 to 7 are assigned to some other user which does not belongs to your current user.Chance of rows from 4 to 7 were deleted from the sheet.These are all the possible reasons for missing of row 4 to 7.
Learn more: https://brainly.com/question/24504878
Explain if a company is responsible for using computer components manufactured using fair trade practices. [9 marks]
Answer:
Fair trade practices aims at promoting the fair relationships between the buyers and producers. It is a kind of a social movement that makes the producers to provide the better conditions and humane working environment in case of developing countries.
• It also favors and supports the proper and substantial payment to the manufacturers and wages to the labors.
• It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.
Explanation:
can you mark me as brainlist
Answer:
It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.
a
2 A car is fitted with the latest GPS navigation system. This device is controlled
by an embedded system in the form of a microcontroller.
Describe the inputs needed by the embedded system and describe which
outputs you would expect it to produce.
b Since updates to the GPS device are required every six months, explain how
the device is updated without the need to take the car to the garage every six
months.
Answer:
It probaly connected to the internet in some way to resieve updates
Hope This Helps!!!
check image dont answer if you dont know please
Answer:
Explanation:
1-2nd option
2-1st option
3-last option
hope this helps!! have a good rest of ur day!! <3
Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of them are odd.
Answer:
import random
numbers = []
even = 0
odd = 0
for i in range(100):
numbers.append(random.randint(1, 200))
for i in range(100):
if numbers[i] % 2 == 0:
even += 1
else:
odd += 1
print("Even:", even)
print("Odd:", odd)
Explanation:
Gg ez.
Responsible manner in video and audio conferencing
Answer:
1.Mute yourself when not speaking.
2.Be on time.
3.Ensure your technology works correctly.
4.Use technology to fully engage remote participants.
Explanation:
C++
see attached file for quesion
please write an Introduction on intrusion detection system and prevention system
PLEASE
Answer:
An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.
(a) Explain what the following Java components are used for.JListJFrameFLowLayoutJpanelJFrameEventListener(b) Write simple Java codes to illustrate how each one of the above components are implemented.
Answer:
Welcome to Gboard clipboard, any text you copy will be saved here.
You are given an array of integers. Your task is to create pairs of them, such that every created pair has the same sum. This sum is not specified, but the number of created pairs should be the maximum possible. Each array element may belong to one pair only.
Write a function
class Solution public int
solution (int[] A); }
that, given an array A consisting of N integers, returns the maximum possible number of pairs with the same sum.
Examples:
1. Given A = [1, 9, 8, 100, 2], the function should return 2. The pairs are (A[0]. A[1]) and (A[2], A[4]); the sum of each pair is 10.
2. Given A = [2, 2, 2, 3], the function should return 1. Although, for instance, A[0]+A[1] = A[0]+A[2], the pairs (A[0], A[1]) and (A[0], A[2]) cannot exist at the same time, because they both contain a common element, A[0].
state an application that would be better to write c++ than java and give a rationale for your answer
Matching parentheses. An math expression may have a number of parentheses like (, ), [, ], { and }. Each openning parenthesis (, or [, or { must be macthed by a corresponding closing parenthsis ), or ] or }. For example, 12 { 34 / [ 6 * ( 55 - 10 ) / ( 100 20 ) ] } has matched pairs of parentheses, while 12 { 34 / ( 6 * ) ] } does not. Write a function to check whether an input math expression has matched parentheses. The header of the function is given as follows:
bool match( const char exp [ ], const int s);
The input math express is store in the char array exp, and the size of exp is s. It returns true if all parentheses are matched or false otherwise.
When defining a system
landscape, the following are all
necessary to operate the ERP
system,
except
Select one:
O a. Techincal expertise.
O b. Computer hardware.
O c. Networking hardware.
O d. None of the above.
O e. All of the above.
All of the given answer options are necessary to operate the enterprise resource planning (ERP) system when defining a system landscape.
Enterprise resource planning (ERP) can be defined as a business strategy process through which business firms manage and integrate the main parts of their day-to-day business activities by using software applications.
The main objective and purpose of an enterprise resource planning (ERP) system is to significantly reduce costs by integrating all the operations of a business firm.
In Computer science, when defining a system landscape, all of the following are necessary to operate the enterprise resource planning (ERP) system:
Technical expertiseComputer hardwareNetworking hardwareRead more on ERP system here: https://brainly.com/question/25752641