Answer:
1.
2.
4.
Explanation:
Had the same question
List and describe 3 parts (often referred to as 'elements') of a web page?
Answer:
Content
Design
Development
Explanation:
The design and management of sites is internet explorer; it is the research that takes place over time to make a site look fantastic, work quickly and function well with a smooth user interface.
Which of the following programming languages were initially developed to teach programming techniques to students? Choose all that apply.
Answer:
BASIC programming language
Pascal programming language
Explanation:
C++ programming language
Java programming language
BASIC programming language
Pascal programming language
Answer:
it's C and D
Explanation:
How much mail can be
stored in each mail box?
Answer:
Most mailboxes are 1 - 4 GB with one or two larger.
Explanation:
Megan wants to post a picture of her and her friend Jennifer on her social media page. What should Megan do before she posts the picture?
A. Add a caption.
B. Ask her friend for permission.
C. Make sure she looks good.
D. Edit the picture using Photoshop.
Answer:
B. Ask her friend for permission.
Explanation:
Answer: B ask her friend for permission
hope you do good on the test or quiz.. it would mean alot to be brainlEst
HEEEEELPPP!!!BRAINLIEST!!! THIS IS URGENT!!!
Read the following code:
count in range(80):
leo.forward(count * 2)
leo.left(count + 2)
There is an error in the for loop. What should be fixed?
Add a colon to the end of the statement
Begin the statement with the proper keyword to start the loop
Place the loop condition outside the parentheses
Replace the parentheses around the range with quotation marks
Answer:
Begin the statement with the proper keyword to start the loop
Explanation:
Given
The code segment
Required
Fix the code
The first line of the code segment is meant to be a for loop, but it does follow the right syntax.
This is so because the for keyword is missing.
The first line should be corrected and replaced with:
for count in range(80):
Hence, option (b) is correct
In which TWO cases would you need to format a cell in a spreadsheet that contains a number? to make sure a formula includes it in calculations to change its appearance to make it easy to visually locate it to ensure no-one can use the number in calculations to ensure no-one can hide the column that contains it
Answer:
to make sure a formula includes it in calculations to change its appearance to make it easy to visually locate it
Explanation:
Microsoft Excel is a spreadsheet application used for data analysis and visualization. The worksheet of the excel file is tabular with rows and columns. A single block of the worksheet is called a cell and holds a single item located by the row and column label.
The particular cell can be referenced in a formula using the absolute reference operator '$' with the syntax "$column-label $ row-number". The background of the cells can also be formatted to have a different color.
You created a two-dimensional array with the following code.
>>> A = [21, 'dog', 'red']
>>> B = [35, 'cat', 'blue']
>>> C = [12, 'fish', 'green']
>>> E = [A, B, C]
How do you refer to 'cat'?
E[1, 2)
E[1,2]
E[1][2]
E[1,2]
Explanation:
My answer is E[1][1]
but I don't see it here
Answer:
E[1][2] that is correct I just took t
In Outlook 2016, the Tell Me function can be accessed by
O pressing F1 on the keyboard.
clicking on the File tab, then the question mark button.
typing a query in the textbox on the ribbon.
typing "help" in the search box in the message pane.
In Outlook 2016, the Tell Me function can be accessed by
O pressing F1 on the keyboard.
clicking on the File tab, then the question mark button.
typing a query in the textbox on the ribbon.
typing "help" in the search box in the message pane.
Explanation:
I think it should be typing a query in the textbox on the ribbon.
In Outlook 2016, the Tell Me function can be accessed by clicking on the File tab, then the question mark button. The correct option is B.
What is Outlook?The preferred email client for sending and receiving emails from Microsoft Exchange Server is Microsoft Outlook. Accessibility to contact, email, calendar, and task management tools is also provided by Outlook.
You can send and receive emails, manage your calendar, save the names and phone numbers of your contacts, and keep track of your projects using Outlook.
Even if you utilize Outlook on a daily basis, you might not be aware of all the wonderful things it can do to boost your productivity.
By selecting the File tab, then the question mark button in Outlook 2016, you may open the Tell Me feature.
Thus, the correct option is B.
For more details regarding Microsoft outlook, visit:
https://brainly.com/question/26695071
#SPJ2
Based on the following passage on construction technology during the Middle Ages, why might a worker not be allowed to join a guild?
During the Middle Ages, a family worked in a trade for generations, with fathers training sons and passing knowledge along bloodlines.
Masons learned how to carve elaborate gargoyles; glaziers made intricate stained-glass windows. These skilled workers were organized into
guilds, and on a construction site, guild workers were highly esteemed while lower-level unskilled workers completed simple routine tasks.
All laborers were paid.
He did not pass the necessary exams to qualify for guild membership
He had signed a contract forgoing payment in exchange for on-the-job training.
He was not born into a family of skilled laborers
His specialty did not fall under masonry or glazing.
Answer:
He was not born into a family of skilled laborers
Explanation:
a deque is a type of collection,but it is not automatically available when you open IDLE. What is missing that allows you to use the deque class?
Answer:
Import
Explanation:
The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.
The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.
What is Import instructions?When you transition to Shopify from another platform or need to make several adjustments to your products or inventory, importing products into your Shopify store using a CSV file might be helpful.
The data from the CSV file is transformed into products when you import products, and you can choose whether to publish your new products to all sales channels or only your web store.
You have the ability to overwrite any existing goods with the same handle when importing a CSV file. For any columns that are absent, the current values will be used.
Therefore, The import instruction does what it sounds like it imports a file class from file function from file it's very flexible.
To learn more about CSV file, refer to the link:
https://brainly.com/question/29242949
#SPJ2
How important is the knowledge of ICT to a pupil like you?
Consider the following code: x = 5 x = x * 3 print (x) What is output
Answer:
Output: 5
Explanation:
It will print 5 on the screen
I need help with this program. I need code for this . Java if statements Determine the amount of discount a person should receive. If the bill is more than 2000, then the person should receive a 15% discount. If the bill is 2000 dollars or less, the person does not receive a discount of any kind. Sample Data: 500 2500 4000 333.33 95874.2154 Sample Output= Enter the original bill amount :: 500 Bill after discount :: 500.00 Enter the original bill amount :: 2500 Bill after discount :: 2125.00 Enter the original bill amount :: 4000 Bill after discount :: 3400.00 Enter the original bill amount :: 333.333 Bill after discount :: 333.33 Enter the original bill amount :: 95874.2154 Bill after discount :: 81493.08
Answer:
The program in Java is as follows:
import java.util.Scanner;
public class MyClass {
public static void main(String args[]) {
double bill;
Scanner input = new Scanner(System.in);
System.out.print("Enter the original bill amount : ");
bill = input.nextDouble();
if(bill>2000){
bill-=0.15*bill;
}
System.out.println("Bill after discount: " + bill);
}
}
Explanation:
This declares bill as double
double bill;
This lets the program accept input
Scanner input = new Scanner(System.in);
This prompts user for the original bill amount
System.out.print("Enter the original bill amount : ");
This gets the bill from the user
bill = input.nextDouble();
This checks if the input bill is greater than 2000
if(bill>2000){
If yes, the bill after discount is calculated as follows:
bill-=0.15*bill;
}
This prints the bill after discount
System.out.println("Bill after discount: " + bill);
Allows input/output of audio info to and from the computer.
A. Central Processing Unit
B. Sound Card
C. Video Card
D. Audio Player
Answer:
sound card
.............
An application's certificate indicates the application -
A is regularly updated
B cannot be removed
C is installed
D is authentic
Answer:
D. is authentic
Explanation:
Authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.
Biometrics, smart cards, digital certificates, and picture passwords are various methods that can be used to perform an authentication.
Hence, an application's certificate indicates the application is authentic. These certificates are generally referred to as digital certificates.
When an end user installs a software application or program, the computer or mobile device would automatically verify the digital signature contained in the software. If the authentication process is successful, the software would be installed. Else, the installation process would be terminated.
Please help w/ Java, ASAP!!!!
Answer:
B
Explanation:
When you have a method that is copying values from one array into another, you first have to initialize a new array which you can copy the values into. This is done by using the provided value "count".
int [ ] nums = new int [count];
Second, you have a "for each" loop that iterates over each index in the first array, and assigns the value at that index to the same index location in the copy array. In a "for each" loop, the variable "val" represents the content of an index, not an iterated value itself. This is why we can just do this inside the loop:
nums[ j ] = val;
That said, you still need "j" to be there and increment because we still need a tracking value for the current index in the copy array.
int j = 0;
for (int val: array)
{
copyArray[j] = val;
j++;
}
Third, you return the copy version of the array.
return nums;
Source:
I am currently a second year Java student.
For which of the following situations would it be best to use a heuristic in order to find a solution that runs in a reasonable amount of time?
A Appending a value to a list of n elements, which requires no list elements be examined.
B Finding the fastest route that visits every location among n locations, which requires n! possible routes be examined.
c Performing a binary search for a score in a sorted list of n scores, which requires that fewer than n scores be examined.
D
Performing a linear search for a name in an unsorted database of n people, which requires that up to n entries be examined.
Answer:
The answer is "Option B".
Explanation:
In this question, determining the optimal path between several locations, which requires n!. It's also examining possible routes. It could just suggest here, designers need to do those equations as we have several forms. They have several methods to find the best and efficient path. Its basic idea is to use heuristic approaches for complex or uncertain issues so we do not provide proven solutions for linear programs.
The situation that should be best to use a heuristic in order to find a solution that runs in a reasonable amount of time is option B.
The following information should be considered:
For measuring the optimal path that lies between several locations that needs n!.It also examine the possible routes. It consist of various methods for determining the efficient path.Learn more: brainly.com/question/17429689
Merle wants to change the formatting of all bold cells to be non-bolded. Shania wants to copy the cell color,
border, and font from cell E12 to all of column D. Which best describes what each person should do?
A. Merle should use Find and Replace, and Shania should use the Format Painter.
B.Merle should use the Rules Manager, and Shania should use Find and Replace.
C.Merle should use the Format Painter, and Shania should use the Rules Manager.
D. Merle should use the Format Painter, and Shania should use Find and Replace.
Answer:
Merle should use Find and Replace, and Shania should use the Format Painter.
Explanation:
It's the most logical to me.. And that's what I'm gonna do on my test. =) hope it helps.
A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a later item.
greater than
less than
equal to
Answer:
greater than
i think
A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is greater than a later item. Thus, option A is correct.
What happens in a binary sort?Such a binary sort, in which we keep comparing the pairs of items, swapping them if they are not in order, until the smallest item bubble to the top of the list, therefore creating a sorted list which is known as bubble sort.
A Binary search tree (BST) is a type of data structure used in computer science that consists of nodes arranged in a hierarchical structure. Each node in a BST contains a value, and the left child node contains a value that is smaller than its parent, while the right child node contains a value that is larger than its parent.
This makes BSTs ordered, as the elements are arranged in a specific order. They are also sometimes called sorted binary trees, as the values are sorted in a specific order. BSTs are commonly used in computer algorithms, as they allow for efficient searching, insertion, and deletion of elements.
Thus, option A is correct.
Learn more about algorithms on:
https://brainly.com/question/22984934
#SPJ3
HELP!!!!!!!!!!!
A program that converts a program to binary all at once and runs the entire program when finished with the conversion
Group of answer choices
Complication
Compiler
Function
No answer text provided.
Answer: Compiler
Explanation:
A histogram titled Greeting card sales has date on the x-axis and cards (millions) on the y-axis. January is 1 card, February: 11, March: 1, April: 1, May: 9, June: 7, July: 1, August: 1, September: 1, October: 9, November: 7, December: 12. The histogram shows the monthly sales for a greeting card company in one year. Which best describes the data for May–June and October–December? clusters no frequency gaps symmetry
Answer:
Clusters
Explanation:
Given
The histogram
Required
What does May-June and October-December represents
The data for May-June is:
[tex]May: 9[/tex]
[tex]June: 7[/tex]
For October-December, it is:
[tex]October: 9[/tex]
[tex]November: 7[/tex]
[tex]December: 12[/tex]
Notice that these data are close to each other.
This implies that they are clusters
Answer:
the answer is a
Explanation:
Explicar en qué sectores están divididos los procesos de producción y su importancia para el desarrollo tecnológico y económico del país. Indique dos ejemplos en cada sector
Answer:
Un sector económico es una rama de la economía en específico, caracterizada por englobar dentro de sí una serie de actividades interrelacionadas según cómo cada una contribuye al desarrollo económico del país. Una clasificación general popular de la economía es la división en los siguientes cuatro sectores:
1) Sector primario. El sector primario es el sector económico que abastece de materias primas y alimentos. Este sector abarca los sectores de agricultura, ganadería, caza, pesca y extracción de minerales. El procesamiento de estas materias primas se realiza en el sector secundario.
2) Sector secundario. Este sector se conoce como industria. Esto incluye todas las empresas y actividades que procesan las materias primas del sector primario. Los productos suelen ser revendidos al consumidor por el sector terciario.
3) Sector terciario. Este sector incluye los servicios comerciales: empresas que quieren obtener ganancias vendiendo sus servicios. El sector terciario incluye tiendas, catering, teatros, peluquerías, mayoristas, empresas de transporte, arrendadores, agencias de empleo, contables, abogados, consultores y empresas TIC.
4) Sector cuaternario. El sector cuaternario es el de servicios no comerciales, el único sector económico sin ánimo de lucro. Este sector incluye los servicios gubernamentales y los servicios subvencionados por el gobierno. Los ejemplos son hospitales, hogares de ancianos, cuerpos de bomberos, defensa, salud, trabajo social, educación y cultura.
Answer:
hola
Explanation:
a man takes 30 step to cover 18 metre l,how many step he will needed to cover 3003m distance
Identify and summarize the features of the Windows 7 backup utility.
Answer:it is slow
Explanation: slow
Answer:
IT can create a backup it can restore a backup and probably more
Explanation:
An eReader has a 956-pixel x 1290-pixel grayscale display with each pixel able to display 32 shades of gray. What is the KiB size of the display memory for the device
Answer:
752.71 kilobytes
Explanation:
Given ;
956-pixel x 1290-pixel
Shades of gray, = 32
Bit depth (n) = 2^n
32 = 2^5
Bit depth, n = 5 bits / pixel
The size of display memory :
Pixel dimension * n
(956 Pixel * 1290 pixel) * 5 bits /pixel
= 6166200 pixel * bits / pixel
= 6166200 bits
Converting bits to kilobytes :
1 bit = 1/8 bytes
1 byte = 1/1024 kilobytes
Hence,
1 bit = 1/(8 * 1024) kilobytes
1 bit = 1/8192 kilobytes
6166200 bits = (1/8192 * 6166200) kilobytes
= 752.7099609375 kilobytes
= 752.71 kilobytes
Application software consists of programs that perform a specific task for users. Examples include microsoft word internet explorer and micro type 5.
A.true
B.false
Answer: verdadero
Explanation:
Any device that uses light to read and write information.
A. Optical Drive
B. Peripheral Device
C. Laser Device
D. Optical Device
Answer:
Optical Storage Device
What should you do first when designing a program?
Answer: talk about da progrm
Explanation:
Answer:
Step-by step Explanation:
I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how to do that. Help would be greatly appreciated.
PS: Reposting my question because the answers I got previously were both only made for points, not to help in any way. :(
Answer:
You need to first use the Sum function to add up all the costs of September.
Then divide each September cost by the grand total that you got. After that format the last column to be percentages.
Look at the attached file for the formulas used.
.Explain how encrypting data during transmission protects it from being read by an unauthorised person who intercepts the transmission.
Answer:
Encryption is an effective and efficient technique used to prevent unauthorized access to informations transmitted over the internet.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
SSL/TLS are standard protocols that provides link encryption for the transmission of messages over the internet such as electronic mail (e-mail).
SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.
In the case of TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.
This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.