Answer:
D. Grilled sandwich
Explanation:
Grilled sandwich is a kind of hot sandwich.
(25 POINTS)Which statement best reflects the importance of following safety guidelines?
Workplace injuries can result in losses to an organization’s profits.
OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.
Every year, thousands of people die as a result of workplace injuries.
Using equipment safely is faster and makes work more efficient.
Answer:
I think, Every year, thousands of people die as a result of workplace injuries.
Answer:
B
Explanation:
Help! ASAP! 1 Question.........°○°
Answer: I think D)?
Explanation: Or B)
Where do animators work?
How do companies use web sites?
What is an operating system?
What is a database?
What is an app?
In what way do graphs and charts help in decision-making? Select the most important point.
A.
They identify errors in the data.
B.
They can be included in slideshow presentations.
C.
They reveal patterns in data.
D.
They automate calculations.
E.
They can be inserted into documents.
fill in the blanks with correct pronounce
i like watches.The nice watch is for ________
Answer:
I like watches. This nice watch is for me.
Need answer ASAP!!!!
Hi,
I tried answering this. Lol. Look at the image.
Question 6 [10 marks] a) How does a company's use of information systems affect its corporate strategies? (7 marks) b) Provide an example. (3 marks)
Answer:
following are the responses to the given question.
Explanation:
The capability to successfully utilize IT is mutually dependent on its ability to execute strategic strategy and set business goals. The ability to compete more and more relies on the capacity of an organization of using technology. In the future, what a company wants to do will rely on what its technologies can do. It may be an example of a company investing in information technology that allows a company to manufacture new products or improve the efficiency of the distribution system to the corporation's economic efficiency.
Select all the correct answers.
John travels all over the country visiting various clients. He needs to access his documents and services on the go. Which of these technologies
allows him to access documents and software while on the move?
A:cloud computing
B: grid computing
C:mobile computing
D:green computing
E:virtualization
Answer:
acd
Explanation:
i cant explain
Answer:
A
C
D
Explanation:
Plato
edhesive assignment 2: room area?
Explanation:
a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ')
print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))
a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ') print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))
What is program?The program is an illustration of functions. Functions are groups of code segments that are executed when called or evoked
The calendar program
The calendar program in Python, where comments are used to explain each line is as follows:
#This checks for leap year
def leap_year(y):
if y % 4 == 0:
return 1 else return 0
#This returns the number of days in the month
def number_of_days(m,y):
if m == 2:
return 28 + leap_year(y)
elif m == 1 or m == 3 or m == 5 or m == 7 or m == 8 or m ==10 or m == 12:
return 31
elif m == 4 or m == 6 or m == 9 or m == 11:
return 30
#This returns the number of days left in the month
def days(m,d):
dayList = [0,31,59,90,120,151,181,212,243,273,304,334]
return dayList[m-1] + d
#This returns the number of days left in the year
def days_left(d,m,y):
if days(m,d) <= 60:
return 365 - days(m,d) + leap_year(y) else:
return 365 - days(m,d)
#The main begins here
#This next three lines gets input for date
day=int(input("Day: "))
month=int(input("Month: "))
year=int(input("Year: "))
#This gets the choice from the user
menu=int(input("Press 1 to calculate the number of days in the given month.\nPress 2 to calculate the number of days left in the given year.\nChoice: "))
#This prints the number of days in the month
if menu == 1:
print(number_of_days(month, year))
#This prints the number of days left in the year
elif menu == 2:
print(days_left(day,month,year))
Read more about Python functions at:
brainly.com/question/14284563
#SPJ7
The complete part of the question will be:
Assignment 3: Chatbot
What the code for assignment 3: chatbot Edhesive.
what is a cell address in xsl sheet
Answer:
cell address is the exact location of a particular cell of ms-excle
Explanation:
A1 refers to first row and first column.
A2 refers to second row first column.
i.e.
in 'A1' : 'A' indicate column { A= first column, B= second
column, C= third column. and soon.....}
'1' indicate row { 1 = first row, 2 = second row, 3= third row..... soon .......}
Francesca wants to create a program that will produce the phrase “Hello, world” on the screen. Which of these functions should Francesca use?
Answer:
It would be print.
Explanation:
If you want to execute a function it should be print so it will show up in the output box.
How do we calculate the BMI in python?
the formula is kg/m²
Answer:
height = float(input("Enter your height in m: "))
weight = float(input("Enter your weight in kg: "))
BMI = weight / (height/100)**2
print(f"You BMI is {BMI}")
Explanation:
The python code for calculating BMI is as follows -
height = float(input("Enter your height in m: "))
weight = float(input("Enter your weight in kg: "))
BMI = weight / (height/100)**2
print(f"You BMI is {BMI}")
Some conditions can also be added such as
if BMI <= 15:
print("You are underweight.")
elif BMI <= 30:
print("You are healthy.")
elif BMI <= 40:
print("You are over weight.")
If you are worried that team members will not keep sensitive information private, you could ask them to sign a ________ agreement.
A. Non-confidentiality
B. Security
C. Non-disclosure
Answer:
C
Explanation:
It has legal reproduction if you break it, many nannys that work for a famous person/people have to sign a non-disclosure before they're hired.
Los organos de los sentidos perciben de la misma manera un estimulo?porque?
Espero que te ayude!!!!
What is the difference between manual and computer typesetting?
Answer:
Manual typesetting: The form was placed in a press, inked, and an impression made on paper. During typesetting, individual sorts are picked from a type case with the right hand, and set into a composing stick held in the left hand from left to right, and as viewed by the setter upside down.
Computer typesetting: Computerized typesetting, method of typesetting in which characters are generated by computer and transferred to light-sensitive paper or film by means of either pulses from a laser beam or moving rays of light from a stroboscopic source or a cathode-ray tube (CRT).
Pleaseeee hellppp!!!!!
Answer:
credit card info and delivery address
Explanation:
A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called
Answer: Posture assessment
Explanation:
Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.
Posture assessment has to do with how the system security is evaluated based on the applications and the settings.
which processor is compatible with an AM2+ socket
Answer:
Amd phenom x4 9950 black edition
Explanation:
Which statement best describes a database?
Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.
I think it's a. A collection of related tables
In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the remaining 70 students are 12 or older. How many students are 10?
Answer: 10 students
Explanation:
Students younger than 10 = 50%
Students that are 10years old = 1/20 = 1/20 × 100 = 5%
Students that are older than 10 but younger than 12 = 1/10= 1/10 × 100 = 10%
Students that are 12 years or older
= 100% - (50% + 5% + 10%)
= 100% - 65%
= 35%
This means that 35% of the students are 12 years or older and we've been given the number as 70.
Let's say the total number of students is x. Therefore,
35% of x = 70
0.35 × x = 70
0.35x = 70
x = 70/0.35
x = 200
The total number of students is 200.
Therefore, the number of students that are 10years will be:
= 1/20 × 200
= 10 students
Therefore, 10 students are 10 years.
Chlorine has two naturally occurring isotopes that are 35cland 37cl, the accurate masses and abundance are 34.96 and 75.6%and 36.97 and 24.4% respectively calculate the relative atomic mass of cl.
[tex] \implies \huge \tt \underline \red{answer}[/tex]
Hlo
Pascal system . write the program that will calculate the perimeter of a rectangle if its area is A (m²) and one of its sides has a length of B (m). A and B are entered from the keyboard.
Answer:
The program in Pascal is as follows:
Program Perimeter;
Uses Crt;
Var
Length : Real;
Width : Real;
Area : Real;
Perim : Real;
Begin
Clrscr;
Write('Area: ');
Readln(Area);
Write('Length : ');
Readln(Length);
Width := Area/Length;
Perim := 2 * (Length + Width);
Write('Perimeter: ' ,Perim:5:2,'.');
End.
Explanation:
This declares all variables as real
Var
Length : Real;
Width : Real;
Area : Real;
Perim : Real;
The program execution begins here
Begin
This clears the screen
Clrscr;
This prompts the user for Area
Write('Area: ');
This gets input for Area
Readln(Area);
This prompts the user for Length
Write('Length : ');
This gets input for Length
Readln(Length);
This calculates the width
Width := Area/Length;
This calculates the perimeter
Perim := 2 * (Length + Width);
This prints the calculated perimeter
Write('Perimeter: ' ,Perim:5:2,'.');
This ends the program
End.
Andy is working on a project to build an accounting software program for his firm. He uses old programming modules that contained code to perform various processes and links them to create a complete system. Which approach does he apply to the program design?
A.
structured programming
B.
non-structured programming
C.
top-down approach
D.
bottom-up approach
E.
modular programming
Answer:
E. modular programming
Explanation:
Andy is applying a design known as modular programming. This is basically a design in which the entire project is broken down into various parts known as modules. Each one of these modules performs a very different and unique task. As the modules are created they are linked together like pieces of a puzzle in order to form the entire project. This makes tackling a large project much easier and makes debugging problems much easier as well.
explain what the hexadecimal code in a MAC address represents
Answer:
An Ethernet MAC address consists of a 48-bit binary value. Hexadecimal is used to identify an Ethernet address because a single hexadecimal digit represents 4 binary bits. Therefore, a 48-bit Ethernet MAC address can be expressed using only 12 hexadecimal values.
Which occurs when private details of a class are hidden from other classes or parts of the program that uses instances of the class?
inheritance
polymorphism
encapsulation
operation overloading
Answer:
Encapsulation
Explanation: got it right
Answer:
Encapsulation
Explanation:
I took the quiz.
An application programming interface (API) is ________. (1 point) the code the application software uses to take advantage of code written by others the currently active part of an application the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM
Answer:
an interface
Explanation:
(API) is an interface that defines interactions between multiple software applications or mixed hardware-software intermediaries.
Sanjay has 38 blue beads. And 26 red beads. He needs 8 beads to make 1 wrist band. How many wristbands can Sanjay make if he uses all of his beads?
Answer:
8
Explanation:
In total, Sanjay has 64 beads. if you divide the 64 beads by the amount of beads it takes to make one band (8) the answer would be 8.
Answer:
make the top answer brainly
Explanation:
Debug the following program.
REM "Program to generate 2 2 4 6 10. 16... up to 10th terms" CLS
A=2
B=3
For I=1 to 10
Display A; B;
A=A+B
B=A+B
NEXT X
END
Answer:
The debugged program is as follows:
A=2
B=2
For I=1 to 10
PRINT A
TEMP = A
A=B
B=TEMP+A
NEXT I
END
Explanation:
First, the value of B should be changed to 4 (because the second term of the sequence is 2
Next, change Display to Print because Q-basic uses the print keyword to display output
The sequence is not properly generated. So, I update that part of the program to:
For I=1 to 10
PRINT A
TEMP = A
A=B
B=TEMP+A
NEXT I
Lastly, the loop is controlled by variable I (not X).
So change NEXT X to NEXT I
Why are message board discussions moderated?
A.
to rectify spelling and grammar
B.
to delete irrelevant or offensive posts
C.
to facilitate communication between group members
D.
to ensure that discussions topics are interesting
You are designing an ecommerce web application that will scale to hundreds of thousands of concurrent users. Which database technology is best suited to hold the session state in this example
Answer: Amazon DynamoDB
Explanation:
The database technology that is best suited to hold the session state in this example is the Amazon DynamoDB.
Amazon DynamoDB is a document database which helps in delivering high quality and fast cperformance at any scale. It can be used to scale to hundreds of thousands of concurrent users as it's multi-active, and has a durable database that has built-in security.