Answer:What is the sandwich tech
Explanation:
Margie has found a stock template to use. She changes a few things about the formatting and then saves the
template in the Templates Folder to use again. The next time Margie wants to access this template, she will go to
File, New, Sample templates.
File, New, My templates.
File, Open, My Documents.
File, Open, New Folder
Answer:
file open my documents
Explanation:
because if she saved it she would have to go to her documents to open it
Answer:
I listened to the other person and got the question WRONG. Had I gotten that question right I would have ended with all A's this semester. So thanks a lot and the answer is File, New, My Templates
Explanation:
10. Differentiate between equity share & preference share.
Answer:
Equity Shares are commonly called Common shares and have both advantages and disadvantages over Preference shares.
Equity shareholders are allowed to vote on company issues while preference shareholders can not.Preference shareholders get paid first between the two in the case that the company liquidates from bankruptcy. Preference shareholders get a fixed dividend that has to be paid before equity share dividends are paid. Preference shareholders can convert their shares to Equity shares but equity shareholders do not have the same courtesy.Preference shares can only be sold back to the company while equity shares can be sold to anybody.The image classification technology (Darknet) shown in the video is
free for anyone to use.
Select one:
a. proprietary
b. web-based
C. shareware
d. open source
Answer:
Open Source
Explanation:
Darknet is an open source custom neural network framework written in C and CUDA
What is the major difference between the intranet and extranet?
Question 36 options:
Intranets hold more importance
The major difference between the two, however, is that an intranet is typically used internally.
Extranets improve internal communications
None of the above
Explanation:
Iinternet is hudge graphicla network and intranet is small network as compare to internet
Which code segment results in "true" being returned if a number is odd? Replace "MISSING CONDITION" with the correct code segment.
a) num % 2 == 0;
b) num % 2 ==1;
c) num % 1 == 0;
d) num % 0 == 2;
Answer:
b) num % 2 ==1;
Explanation:
Which code segment results in "true" being returned if a number is odd? Replace "MISSING CONDITION" with the correct code segment.
Can software work without Hardware? Why?
Answer:
No
Explanation:
Software requires hardware to run. Think about a computer, you can't have windows without having the computer. Software is programmed to run on hardware.
widow in respect to word processing
Answer:
To use the word widow.
Explanation:
She became a widow at the age of 95, due to the passing of her husband by natural causes.
if 100 KB file is stored in 2 MB folder how many files can be stored in the folder
Answer:
20 files.
Explanation:
Given the following data;
Size of file = 100 kilobytes.
Folder size (memory) = 2 megabytes.
Method 1
1000 kilobytes = 1 megabytes.
100 kilobytes = x megabytes
Cross-multiplying, we have;
1000x = 100
x = 100/1000
x = 0.1 mb
Now, to find the number of files that can be stored;
[tex] Number \; of \; files = \frac {Memory}{Size \; of \; each \; file} [/tex]
Substituting into the equation, we have;
[tex] Number \; of \; files = \frac {2}{0.1} [/tex]
Number of files = 20 files.
Method II
We know that;
1 kilobytes = 0.001 megabytes. 100 kilobytes = 0.1 megabytes. 1000 kilobytes = 1 megabytes. 2000 kilobytes = 2 megabytes.Substituting into the formula, we have;
[tex] Number \; of \; files = \frac {Memory}{Size \; of \; each \; file} [/tex]
Substituting into the equation, we have;
[tex] Number \; of \; files = \frac {2000}{100} [/tex]
Number of files = 20 files.
hot components or sharp edges of computer is an example of what hazard
Answer:
hot components or sharp edges of computer is an example of a mechanical hazard
true or false Encryption prevents hackers from hacking data?
Answer:
The answer here is False.
Explanation:
Encryption protects the data and not access to data.
In some cases, the hacker may not necessarily be trying to access or decrypt the data. They may prevent one from accessing it by placing a Ransomeware virus on it.
What a Ransomeware virus would do is to prevent the legal and rightful owner from accessing such data (whether encrypted or not) until their demands are met.
In many cases, they would ask for monies or cryptocurrencies.
Another way hackers attempt to get encrypted files is to try to get the decryption keys instead. The best practice against this is to keep decryption keys manually or in a password manager. Another way to protect very sensitive information is to have sensitive systems isolated from the internet.
Cheers
Read the following statement and state whether True or False.
A. Fateh Burj is located in Mohall (Punjab).__________
8. Pongal is celebrated in West Bengal.__________
C. Chand minar is also known as the Tower of Moon'.________
D. Rabindra Nath Tagore stared the 'Shanti Niketan' school.__________
E The national sport of India is football.________
Answer:
A. false
8. false
c. true
d. true
e false
Answer:
A. False
B. False
C. True
D. True
E. False
Word processing package allow users to?
Explanation:
allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters from the keyboard, and print it.
Create a text file content.txt and copy-paste following text (taken from Wikipedia) into it: A single-tasking system can only run one program at a time, while a multi-tasking operating system allows more than one program to be running in concurrency. This is achieved by time-sharing, dividing the available processor time between multiple processes that are each interrupted repeatedly in time slices by a taskscheduling subsystem of the operating system. Now, write a C program that opens content.txt file for reading and calls fork() function. The child process in the program will print first 150 characters from the file and the remaining characters will be printed by the parent. However, at the
Answer:
s0 you should figure that out because I don't know how to
Explanation:
good luck
45. Our goals are a reflection of our:
O values
O standards
O obstacles
O resources
beliefs
values and beliefs
(4 points.) Write an algorithm (i.e., step-by-step instructions) via which someone could walk or drive from some origin to some destination, perhaps a path that you yourself tend to travel. Take care to specify what the origin and destination that you have in mind. And take care to use loops and conditions as needed, particularly if there might be obstacles (e.g., red lines). Assume that your algorithm will be executed by a robot (or lost friend) who will follow your directions precisely, so avoid ALL ambiguity!
Answer:
The algorithm is as follows :
1. Record Current Position, Final Destination
2. While Current Position is not Final Destination, repeat the following:
2.1 If destination location is up then:
2.1.1 If an obstacle is directly above you then:
2.1.1.1 Look for alternate position (left, right, down)
2.1.1.2 If alternate position is found then
2.1.1.2.1 Move there
2.1.1.2.2 Record Current Position
2.1.1.3 If no alternate position is found then
2.1.1.3.1 Call for help
2.1.1.3.2 End
2.1.2 If no obstacle is directly above you then:
2.1.2.1 Move up
2.1.2.1 Record Current Position
2.2 If destination location is down then:
2.2.1 If an obstacle is directly below you then:
2.2.1.1 Look for alternate position (left, right, up)
2.2.1.2 If alternate position is found then
2.1.1.2.1 Move there
2.2.1.2.2 Record Current Position
2.2.1.3 If no alternate position is found then
2.2.1.3.1 Call for help
2.2.1.3.2 End
2.2.2 If no obstacle is directly below you then:
2.2.2.1 Move down
2.1.2.1 Record Current Position
2.3 If destination location is right then:
2.3.1 If an obstacle is directly by your right then:
2.3.1.1 Look for alternate position (down, up, left)
2.3.1.2 If alternate position is found then
2.3.1.2.1 Move there
2.3.1.2.2 Record Current Position
2.3.1.3 If no alternate position is found then
2.3.1.3.1 Call for help
2.3.1.3.2 End
2.3.2 If no obstacle is directly by your right then:
2.3.2.1 Move right
2.3.2.1 Record Current Position
2.4 If destination location is left then:
2.4.1 If an obstacle is directly by your left then:
2.4.1.1 Look for alternate position (down, up, right)
2.4.1.2 If alternate position is found then
2.4.1.2.1 Move there
2.4.1.2.2 Record Current Position
2.4.1.3 If no alternate position is found then
2.4.1.3.1 Call for help
2.4.1.3.2 End
2.4.2 If no obstacle is directly by your left then:
2.4.2.1 Move left
2.4.2.1 Record Current Position
Explanation:
The algorithm is straight forward.
All it does is to check for available position and move into the position if there is any available.
It keeps checking and moving until an obstacle prevents it from moving.
1-5. Discuss briefly the function and benefits of computer network. (5pts
Computer networks allow an unlimited amount of computers to communicate with each other. This is especially useful in enterprise environments, as technicians have to deal with hundreds of computers at a time. Computer networks make it easier to share files, increase storage capacity, better communication, easier to to control computers remotely, easier to share resources, ability to share a single internet connection on multiple devices. Computer networks also have a lot of cost benifits too, as network administration is centralised, meaning that less IT support is required, and you can cut costs on sharing peripherals and internet access.
Hopefully this helps you out!
In this lab, you use the flowchart and pseudocode found in the figures below to add code to a partially created C++ program. When completed, college admissions officers should be able to use the C++ program to determine whether to accept or reject a student, based on his or her test score and class rank.
start input testScore,
classRank if testScore >= 90 then if classRank >= 25 then output "Accept"
else output "Reject" endif else if testScore >= 80
then if classRank >= 50 then output "Accept" else output "Reject" endif
else if testScore >= 70
then if classRank >= 75 then output "Accept"
else output "Reject"
endif else output "Reject"
endif
endif
endif
stop
Study the pseudocode in picture above. Write the interactive input statements to retrieve: A student’s test score (testScore) A student's class rank (classRank) The rest of the program is written for you. Execute the program by clicking "Run Code." Enter 87 for the test score and 60 for the class rank. Execute the program by entering 60 for the test score and 87 for the class rank.
[comment]: <> (3. Write the statements to convert the string representation of a student’s test score and class rank to the integer data type (testScore and classRank, respectively).)
Function: This program determines if a student will be admitted or rejected. Input: Interactive Output: Accept or Reject
*/ #include using namespace std; int main()
{ // Declare variables
// Prompt for and get user input
// Test using admission requirements and print Accept or Reject
if(testScore >= 90)
{ if(classRank >= 25)
{ cout << "Accept" << endl; }
else
cout << "Reject" << endl; }
else { if(testScore >= 80)
{ if(classRank >= 50)
cout << "Accept" << endl;
else cout << "Reject" << endl; }
else { if(testScore >= 70)
{ if(classRank >=75) cout << "Accept" << endl;
else cout << "Reject" << endl; }
else cout << "Reject" << endl; } } } //End of main() function
Answer:
The equivalent program in C++:
#include<iostream>
#include <sstream>
using namespace std;
int main(){
string Score, Rank;
cout<<"Enter student score and class rank: ";
cin>>Score>>Rank;
int testScore = 0, classRank = 0;
stringstream sstream(Score);
sstream>>testScore;
stringstream tream(Rank);
tream>>classRank;
if (testScore >= 90){
if(classRank >=25){cout<<"Accept";}
else{cout<<"Reject";}
}
else if(testScore >= 80){
if(classRank >=50){cout<<"Accept";}
else{cout<<"Reject";}
}
else if(testScore >= 70){
if(classRank >=75){cout<<"Accept";}
else{cout<<"Reject";}
}
else{cout<<"Reject";}
return 0;
}
Explanation:
This declares Score and Rank as string variables
string Score, Rank;
This prompts the user for score and class rank
cout<<"Enter student score and class rank: ";
This gets the user input
cin>>Score>>Rank;
This declarees testScore and classRank as integer; and also initializes them to 0
int testScore = 0, classRank = 0;
The following converts string Score to integer testScore
stringstream sstream(Score);
sstream>>testScore;
The following converts string Rank to integer classRank
stringstream tream(Rank);
tream>>classRank;
The following conditions implement the conditions as given in the question.
If testScore >= 90
if (testScore >= 90){
If classRank >=25
if(classRank >=25){cout<<"Accept";}
If otherwise
else{cout<<"Reject";}
} ---
If testScore >= 80
else if(testScore >= 80){
If classRank >=50
if(classRank >=50){cout<<"Accept";}
If otherwise
else{cout<<"Reject";}
}
If testScore >= 70
else if(testScore >= 70){
If classRank >=75
if(classRank >=75){cout<<"Accept";}
If otherwise
else{cout<<"Reject";}
}
For testScore less than 70
else{cout<<"Reject";}
Service and software companies typically have a high return-on-assets ratio because they require lower blank as compared to manufacturing companies.
Answer:
So whats the question here? Your just saying a statment ...
Explanation:
Answer:
Resources
Explanation:
The logical answer would be resources. As someone who has ran both, a software company requires less physical resources such as materials, tools, a large labor force, etc. With a manufacturing company, it requires a lot more tangible resources to be successful. Not sure if that is the correct answer, but it is the most logical one.
visual media that gives the appearance of a movement can be a collection of graphics
its called animation, a collection of a movement of graphics.
A hard drive cannot be partitioned until the device
is set.
A five-year prospective cohort study has just been completed. the study was designed to assess the association between supplemental vitamin a exposure and mortality and morbidity for measles. the rr for incidence of measles was 0.75 and the rr for measles mortality was 0.5. Assume these RR are significant. Regarding the RR reported above, which statement is correct?
a. Exposure to vitamin A appears to protect against morbidity and mortality for measles.
b. Exposure to vitamin A appears to be a risk factor for morbidity and mortality for measles.
c. Exposure to vitamin A is not associated with morbidity and mortality for measles.
d. Exposure to vitamin A is a risk factor for morbidity and a protective factor for mortality for measles.
Answer:
Exposure to vitamin A appears to be a risk factor for morbidity and mortality for measles.
Explanation:
Suppose we want an error correcting code that will allow all single-bit errors to be corrected for memory words of length 15. 1. How many check bits are necessary?2. Assuming we are using the Hamming algorithm presented to design our error-correcting code, find the code word to represent the 12-bit information word: 100100011010
Answer:
15
Explanation:
01234567891011121314
What can you use to make sure that you have no errors in Word Online?
Answer:
You can use grammarly. It woks amazingly!
Explanation:
The Westfield Carpet Company has asked you to write an application that calculates the price of carpeting for rectangular rooms. To calculate the price, you multiply the area of the floor (width times length) by the price per square foot of carpet. For example, the area of floor that is 12 feet long and 10 feet wide is 120 square feet. To cover that floor with carpet that costs $8 per square foot would cost $960. (12 × 10 × 8 = 960.) First, you should create a class named RoomDimension that has two FeetInches objects as attributes: one for the length of the room and one for the width. (You should use the version of the FeetInches class that you created in Programming Challenge 11 with the addition of a multiply member function. You can use this function to calculate the area of the room.) The RoomDimension class should have a member function that returns the area of the room as a FeetInches object. Next, you should create a RoomCarpet class that has a RoomDimension object as an attribute. It should also have an attribute for the cost of the carpet per square foot. The RoomCarpet class should have a member function that returns the total cost of the carpet. Once you have written these classes, use them in an application that asks the user to enter the dimensions of a room and the price per square foot of the desired carpeting. The application should display the total cost of the carpet.
Answer:
Answered below
Explanation:
#program is written in Java
class RoomDimension{
double length;
double width;
RoomDimension (double length, double width){
this.length = length;
this.width = width;
}
public double roomArea ( ){
return length * width;
}
}
class RoomCarpet{
RoomDimension rd;
double price;
RoomCarpet ( RoomDimension rd, double price){
this.rd = rd;
this.price = price;
}
public double totalCost( ){
double area = rd.roomArea();
return area * price;
}
}
what is the impact of technology to the mankind
Modern technology has revolutionized the way people all over the world communicate and interact. This revolution has led to a system of globalization which has fundamentally changed modern society in both good and bad ways.
The most important technological change over the past 20 years is the advent and popularization of the Internet. The Internet connects billions of people around the globe and allows a type of connectivity in ways which the world has never seen. Companies are able to do business with consumers from other countries instantaneously, friends and families are able to talk to one another and see each other regardless of location, and information sits at the fingertips of every person with a computer, tablet or phone.
Outside of the digital world, modern advances in machinery and science have also impacted everyday life. The modernization of travel has allowed humans to span more miles in their lifetime than at any point in history, and the advancement of medicine has given people longer lifespans.
While these changes have certainly been for the better, there are also plenty of negative results of modernization and globalization. Because the Internet streamlines massive amounts of information, it can easily be exploited. The loss of privacy is one of the most pressing issues in the modern world.
Technology has also had an impact on the natural world. Industrialization has led to the destruction of natural life and has possibly caused negative effects on our climate.
Passive devices _____ require any action from the occupants. A. Do not B.Sometimes C.Rarely D.Occasionally
Answer:
D:
Explanation:
I think, but double check!
Have a nice life and I hope you get full marks on your test/paper/work!
:)What is the importance of larger fonts? Explain with the help of examples.
Answer: See explanation
Explanation:
The importance of larger fonts is that we should note that when words are being presented in the larger font size, such words are considered to be more memorable and also such words are typically rated with judgments of learning that is high.
It is believed also that people the size of the fonts affect the memory of people. The larger the font size, the larger the importance of such word that is being portrayed.
Ram and Hari can finish a piece of work in 6 days and 12 days respectively in how many days will they finish it working together
Answer:
4 days
Explanation:
Given - Ram and Hari can finish a piece of work in 6 days and 12 days
respectively.
To find - In how many days will they finish it working together
Proof -
As given,
Ram and Hari can finish a piece of work in 6 days and 12 days respectively.
⇒1 day work of Ram done in = [tex]\frac{1}{6}[/tex]
1 day work of Hari done in = [tex]\frac{1}{12}[/tex]
If they work together,
1 day work of both together done in = [tex]\frac{1}{6}[/tex] + [tex]\frac{1}{12}[/tex] = [tex]\frac{2 + 1}{12} = \frac{3}{12}[/tex] = [tex]\frac{1}{4}[/tex]
As we know Work is inversely proportional to efficiency
And efficiency = Person's 1 day work
As we have ,
1 day work of both together done in = [tex]\frac{1}{4}[/tex]
⇒ Total work done in 4 days if they work together.
Extend the functionality of cout by implementing a friend function in Number.cpp that overloads the insertion operator. The overloaded insertion operator returns an output stream containing a string representation of a Number object. The string should be in the format "The value is yourNum", where yourNum is the value of the integer instance field of the Number class.Hint: the declaration of the friend function is provided in Number.h.Ex: if the value of yourNum is 723, then the output is:
Answer:
// In the number.cpp file;
#include "Number.h"
#include <iostream>
using namespace std;
Number::Number(int number)
{
num = number;
}
void Number::SetNum(int number)
{
num = number;
}
int Number::GetNum()
{
return num;
}
ostream &operator<<(ostream &out, const Number &n)
{
out << "The value is " << n.num << endl;
return out;
}
// in the main.cpp file;
#include "Number.cpp"
#include <iostream>
using namespace std;
int main()
{
int input;
cin >> input;
Number num = Number(input);
cout << num;
return 0;
}
Explanation:
The main function in the main.cpp file prompts the user for the integer value to be displayed. The Number file contains defined functions and methods of the number class to set, get and display the "num" variable.
Use the drop-down menus to complete the sentences about the Calendar view Arrange command group.
Under the Calendar view, you will see your calendar as
by default.
When you create an appointment, you are creating an activity that will not send
to other people.
A meeting is an activity where individuals are invited and
are shared.
is an all-day incident placed on the calendar.
Answer:
Use the drop-down menus to complete the sentences about the Calendar view Arrange command group.
Under the Calendar view, you will see your calendar as
✔ monthly
by default.
When you create an appointment, you are creating an activity that will not send
✔ an invitation
to other people.
A meeting is an activity where individuals are invited and
✔ resources
are shared.
✔ An event
is an all-day incident placed on the calendar.
Explanation:
edge 2021
The complete sentences about the calendar view arrange command group are as follows:
Under the Calendar view, you will see your calendar as monthly by default. When you create an appointment, you are creating an activity that will not send an invitation to other people.A meeting is an activity where individuals are invited and resources are shared. An event is an all-day incident placed on the calendar.What do you mean by Calender view?Calendar view may be characterized as a type of feature within calendar software in which the user can choose from various formats in order to view the calendar more accurately and interestingly.
A calendar view lets a user view and interacts with a calendar that they can navigate by month, year, or decade. A user can select a single date or a range of dates. It doesn't have a picker surface and the calendar is always visible.
Command and control functions are performed through an arrangement of personnel, equipment, communications, facilities, and procedures employed by a commander in order to execute its functions.
Therefore, the complete sentences about the calendar view arrange command group are well mentioned above.
To learn more about Calendar view, refer to the link:
https://brainly.com/question/17524242
#SPJ2