Answer:
Ownership is the legal right to possess something. An example of ownership is possessing a specific house and property. The total body of rights to use and enjoy a property, to pass it on to someone else as an inheritance, or to convey it by sale.
What are some settings you can control when formatting columns? Check all that apply.
Answer:
1,3,4,6,7, hope that helps'
Explanation:
(50 POINTS)
Write a repl program that does the following....
Asks the user to input their score for their science test (out of 100),
If the score is less than or equal to 50, print ("You failed, I think you need to study more"),
Elif the score is greater than 50, print ("You passed, well done!").
Else print, you have not selected the right number
Note that this does not need to be in a loop.
Answer:
nope ;v
Explanation:
you cannot create a folder within a folder true or false
the answer is false :))
correct me if I'm wrong
Answer:
true
Explanation:
The current annual interest rate is 5 percent, and you are taking out a 20-year loan with a monthly end-of-month payment. If you can afford monthly payments of $3000 per month, what is the most you can borrow?
Answer:
720k.
Explanation:
what identifies a cell or a range of cells on a worksheet, and tells excel where to look for values or data you to use in a formula
The landing page of a web site has just been edited. Some users are complaining they do not see the updated content being displayed. What could be the possible reason(s)? (Select TWO responses)
In Software Engineering, when dealing with UI, there are a lot of attribute particular to text view that if not properly formatted may affect the users experience.
Two possible things that comes to my mind as a software developer are
The text colour may have be altered such that it matches that of the background so that it cannot be seen anymoreThe text View visibility may have been set to "INVISIBLE " or "GONE"A little more checkup and tweaking or a search from online repository can go a long way to help the situation and the right user experience will be delivered.
Learn more about web design here:
https://brainly.com/question/25941596
Victor and Ellen are software engineers working on a popular mobile app. Victor has been in his position for 10 years longer than Ellen, who is a recent graduate. During the development of a new feature, Ellen expressed her concern that VIctor's proposed code would create instability in the app. Victor told Ellen he would address her concern with their supervisor. When Victor met privately with his supervisor, he claimed that he had discovered the problem, and that Ellen had dismissed it. Which principle of the Software Engineering Code of Ethics has Victor violated
Victor violated principle 7: Colleagues of the Software Engineering Code of Ethics
A code of ethics reaffirms an organization's ethical conducts and morals so that workers, as well as, third parties are aware of the expectations they must meet.
A code of ethics' objective is to instruct persons functioning on behalf of an organization on how they should act.
The attitude of Victor towards her junior colleague (Ellen) is unjust and dishonest since Victor has claimed the credit meant to be for Ellen.
Therefore, we can conclude that Victor has violated principle 7: Colleagues of the Software Engineering Code of Ethics.
Learn more about the code of ethics here:
https://brainly.com/question/18401975
what is the keyboard shortcut to display formulas on the worksheet : a. CTRL+ B. CTRL+: C. CTRL+; D. ALL THE ABOVE
g Tonya recognizes that one example of the impact of censorship on Internet service providers (ISPs) is that
Type the correct answer in the box
How is it possible to understand the flow of data in an organization?
Conducting ______ with each team member makes it possible to understand the flow of data in an organization.
Please answer the questions.
Answer:
10 days
Explanation:
because they have to go through all your history to see if any of that could of caused it
Answer to questions 1 is option D, answer to question 2 is option B, answer to question 3 is option D
Write a class definition line and a one line docstring for the class Dog. Write an __init__ method for the class Dog that gives each dog its own name and breed. Test this on a successful creation of a Dog object. >>> import dog >>> sugar
Write an if statement that assigns 0.2 to commission if sales is greater than or equal to 10000.
How does critical thinking relates to peer assessment?
Answer:
Peer review is a critical component of the life of the mind and an effective teaching strategy for nurturing students' critical thinking skills. ... peer review of writing is most effective when students have an opportunity to revise their writings prior to submitting a grade. Is it true that peer assessment helps students develop their critical thinking skills?
The students' perceptions of the peer evaluation activity were later elicited in interviews and a short written survey. The findings of the study indicate that peer evaluation activities did help in developing critical thinking skills, thus improving their academic writing performance.
Explanation:
Each JavaScript command line ends with a(n) ____ to separate it from the next command line in the program.
Write a python program to calculate and print the electric bill for Ethiopian Electricity Corporation. (consumer name meter number(mno),last month reading(Imr)and current month reading(cmr) of 50 customers and calculate the net bill amounts as follows: Number of unit(Nou)=cmr-lmr If Nou200 then bill =Nou*2 tax=bill*0.15 netbill=bill+tax Print all the details in the bill for all customers
The electric bill program illustrates the use of loops (i.e. iteration)
Loops are used to execute repetitive operations
The electric bill program in Python where comments are used to explain each line is as follows:
#This iteration shows that the process is repeated for 50 consumers
for i in range(50):
#This gets input for the consumer name meter number
mno = input("Consumer name meter number: ")
#This gets input for last month reading
lmr = int(input("Last month reading: "))
#This gets input for current month reading
cmr = int(input("Current month reading: "))
#This calculates the number of units
Nou = cmr - lmr
#This calculates the bills
bill = Nou*2
#This calculates the tax
tax = bill*0.15
#This calculates the netbills
netbill = bill+tax
#This next four lines print the electric bills
print("Number of units:",Nou)
print("Bills:",bill)
print("Tax:",tax)
print("Netbill:",netbill)
Read more about loops at:
https://brainly.com/question/19344465
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string in c++
The second last character in a String str can be accessed by
a) str[-3]
b) str[-2]
c) str[2]
d) str[3]
Answer:
B.
Explanation:
-1 is the last element in a string. Starting from -1, count backwards and you get your answer.
"1. What sorts of problems does this declaration imagine being solved through science and technology?"
why the computer is known as versatile and diligent device ? explain.
Answer:
Computer is called versatile and diligent device because it is used in almost all the fields for various purposes and it can perform the task repeatedly without loosing its speed and accuracy for long time.
Question #2
Dropdown
Complete the sentence.
A_____
number is composed of only zeros and ones.
What are the answer choices? If none then i say "A prime
number is composed of only zeros and ones."
Answer: Binary
Explanation: Binary numbers use the base-2 numeral system (binary). This system uses only two symbols: "0" (zero) and "1".
Project planning output is :
A. Top-down planning
B. Bottom up planning
C. Waterfall planning
D. Iterative planning
Answer:
A
Explanation:
The main output of Project palnning is project plan.
how does the internet bring people farther apart
use a paragraph to answer the question
Answer:
First of all you may not be able to see your friend in person and it gets very sad. Sometimes you call them but they don't answer you because they don't have enough time to talk or they have something else to do. They won't always want to be on the internet you know, they want to go outside and get a life and not be like the FRE-KIN T-I-K T-O-K-E-R-S WHO ARE CHILDREN AND BEING VERY STU-PID AND ARE TOTAL IDIOTS AND SAY STUFF THAT MAKE NO SENSE AND TRY TO GET ATTENTION. OH DON'T BRING TOWARDS THE GA-CHA IT SO TRASH. I still hate gacha :) and I am happy. Another thing is what some people post, you see you meet friends in real life and sometimes you get to know them but you don't know what they might be doing on the internet and another thing is that they post stuff that makes you feel uncomfortable and disgusted.
Which source would provide the best way to find valid information about climate change
The primary source would provide the best way to find valid information about climate change.
What is Climate change?Climate change may be defined as the change in the average conditions such as temperature and rainfall in a region over a long period of time. In more simple words, climate change refers to the long-term shifts in temperatures and weather patterns.
The burning of fossil fuels like coal, oil, and gas for electricity, heat, and transportation is the primary source of human-generated emissions. A second major source is a deforestation, which releases sequestered (or stored) carbon into the air.
Both of these sources are significantly responsible for the causation of climate change in the specific region over a long period of time.
Therefore, the primary source would provide the best way to find valid information about climate change.
To learn more about Climate change, refer to the link:
https://brainly.com/question/24793273
#SPJ2
Declare and define a function called displayConcat that displays the concatenation of the first parameter with the second. Ex: displayConcat("After", "noon") displays "Afternoon".
Explain in detail what it means to synchronize computers and mobile devices and include at least two strategies for keeping your files in sync in your answers
Answer:
Explanation:
To synchronize computers and mobile devices means to use a cloud service that constantly checks to see if local files are up-to-date with the files in the cloud. These services update the cloud files with the local files if they are overwritten for maximum convenience.
Two strategies for keeping files in sync are using Dropbox. Another way is using iCloud if one has Mac/iOS devices.
¿Cuál es la capacidad pulmonar del hombre y la mujer?
Answer
El RV promedio en hombres es 1.2 L y para las mujeres es 1.1 L.
Explain the difference between the = symbol in Java and in mathematics.
Answer:
In maths the '=' sign tells us that the two integers or variables on either side are the same, wheras in Java the '=' sign means that you are assigning the variable on the left hand side it's value which will be on the right
What is the purpose behind the Three Phase Commit? It improves upon the two phased commit by requiring that locks be acquired at the start of a transaction. It allows for coordination even in the event of unreliable network connections. It ensures that no shared locks are help by other connections in the event of a write operation. None of the above.
You're researching a recent XSS attack against a web
application. The developer showed you the JavaScript code
used to sanitize and validate input in the browser; even if
you're not a coder, it seems like it would have prevented the
attack. What is the most likely reason the web application
was vulnerable? Choose the best response.
A. Client-side validation can be easily bypassed.
B. Input validation doesn't reliably protect against XSS
attacks.
C. Server-side validation can be easily bypassed.
D. The attacker performed an injection attack to bypass
input validation.
The most likely reason the web application was vulnerable to a cross-site scripting (XSS) attack is: A. Client-side validation can be easily bypassed.
Cross-site scripting (XSS) attack can be defined as a security vulnerability through which malicious scripts are injected by an attacker into benign and trusted web application or website.
This ultimately implies that, a cross-site scripting (XSS) attack makes it possible for an attacker to inject malicious client-side scripts into benign and trusted web application or website that are viewed by others. Also, an XXS attack doesn't target server-side scripting languages such as:
PythonPHPGenerally, a cross-site scripting (XSS) is used by an attacker to easily bypass client-side validation and the "same-origin-policy" of web application or website, in order to gain unauthorized access to information.
Read more on XXS attack here: https://brainly.com/question/15979218