helpppp me please..
........​

Helpppp Me Please..........

Answers

Answer 1

Answer:

The employer's monthly salary (X)


Related Questions

Which of the following is step two of the Five-Step Worksheet Creation Process?

Answers

Answer:

Add Labels.

As far as i remember.

Explanation:

Hope i helped, brainliest would be appreciated.

Have a great day!

   ~Aadi x

Add Labels is step two of the Five-Step Worksheet Creation Process. It helps in inserting the data and values in the worksheet.

What is label worksheet in Excel?

A label in a spreadsheet application like Microsoft Excel is text that offers information in the rows or columns around it. 3. Any writing placed above a part of a chart that provides extra details about the value of the chart is referred to as a label.

Thus, it is Add Labels

For more details about label worksheet in Excel, click here:

https://brainly.com/question/14719484

#SPJ2

2. Write a Python regular expression to replace all white space with # in given string “Python is very simple programming language.”

Answers

Dear Parent, Please note that for your convenience, the School Fee counter would remain open on Saturday,27th March 2021 from 8am to 2 pm. Kindly clear the outstanding amount on account of fee of your ward immediately either by paying online through parent portal or by depositing the cheque at the fee counter to avoid late fee charges.For payment of fee the following link can also be used Pay.balbharati.org

8) What is the address of the first SFR (1/O Register)?​

Answers

Answer:

The Register A is located at the address E0H in the SFR memory space. The Accumulator is used to hold the data for almost all the ALU Operations. Some of the operations where the Accumulator is used are: Arithmetic Operations like Addition, Subtraction, Multiplication etc.

Overheating of a computer can be easily prevented. Explain how​

Answers

Here are a few examples:

•] Keep away from windows or vents to prevent it from turning warm.

•] Clean off dust that’s on the computer.

•] Remove all the things that are blocking air to pass to let it cool down.

•] Putting a soft item below the computer is a action that is prohibited as it blocks the airways which causes it to overheat instead put it on a sturdy flat surface to prevent the aforementioned information.

•] To never overcharge your computer too 100% overnight or any time of the day since it overheats and causes battery life to be short, instead put it to charge when you’re conscious while keeping an eye on it, perhaps set a timer/alarm to notify you if you forget.

Which functions do you use to complete Step 3e? Check all that apply.

Animations tab
Animation styles
Design
Lines
Motion Paths
Reordering of animations

Answers

Answer: Animations tab

Animation styles

Lines

Motion paths

Explanation: Edg2021

Suppose you decide to use the number of times you see any of the area codes of the places Yanay has been to in 50 spam calls as your test statistic. Question 7. Write a function called simulate_visited_area_codes that generates exactly one simulated value of your test statistic under the null hypothesis. It should take no arguments and simulate 50 area codes under the assumption that the result of each area is sampled from the range 200-999 inclusive with equal probability. Your function should return the number of times you saw any of the area codes of the places Yanay has been to in those 50 spam calls. Hint: You may find the textbook section on the sample_proportions function to be useful. For model_proportions, under the null hypothesis, what's the chance of drawing one of the area codes Yanay has recently been to

Answers

Answer:

In Python:

import random

def simulate_visited_area_codes():

   area_codes = []

   for i in range(51):

       num = random.randint(200,1000)

       area_codes.append(num)

   visited_codes = [289, 657, 786, 540]

   count = 0

   for i in range(51):

       for j in range(len(visited_codes)):

           if area_codes[i] == visited_codes[j]:

               count+=1

   return count

print("Visited Areas: "+str(simulate_visited_area_codes()))

Explanation:

So many incomplete details in your question, so I will fill in the gap (i.e. make assumptions)

The assumptions are:

The 50 area codes is stored in area_codes list; the codes are randomly generatedThe visited area codes is stored in visited_codes list, the list is initializes with [289, 657, 786, 540]

The program and explanation is as follows: (comments are written in bold)

#This imports the random module

import random

#This defines the function

def simulate_visited_area_codes():

#Thie initializes area_codes to an empty list

   area_codes = []

#This iterates from 1 to 50 and generate 50 random numbers to the area_codes list

   for i in range(51):

       num = random.randint(200,1000)

       area_codes.append(num)

#This initializes the visited_code

   visited_codes = [289, 657, 786, 540]

#This initializes count variable to 0

   count = 0

#This iterates through the list and looks for matching code between the area_code and the visited_code lists

   for i in range(51):

       for j in range(len(visited_codes)):

           if area_codes[i] == visited_codes[j]:

#The count variable is incremented by 1 for matching codes

               count+=1

#This returns the count

   return count

#The main begins here and prints the number of area code visited

print("Visited Areas: "+str(simulate_visited_area_codes()))

Simulate Function:

Simulate one or more responses from the distribution corresponding to a fitted model object.

The code is shown below:-

visited_test_statistics_under_null = make_array()

repetitions = 20000

for i in np.arange(repetitions):

  new_sum_of_correct_area_code = simulate_visited_area_codes()

  visited_test_statistics_under_null = np.append(visited_test_statistics_under_null, new_sum_of_correct_area_code)

visited_test_statistics_under_null( )

Learn more about the topic Simulate Function:

https://brainly.com/question/14492046

What may make it easy for cybercriminals to commit cybercrimes? Select 2 options.

Cybercrimes are not classified as real crimes, only as virtual crimes.

They operate from countries that do not have strict laws against cybercrime.

They are not physically present when the crime is committed.

The United States has no law enforcement that acts against them.

Law enforcement agencies lack the expertise to investigate them.

Answers

Answer: They operate from countries that do not have strict laws against cybercrime.

They are not physically present when the crime is committed.

Explanation:

edg

Answer:

They operate from countries that do not have strict laws against cybercrime.

They are not physically present when the crime is committed.

Explanation:

what is a case in programming​

Answers

Answer:

A case in programming is some type of selection, that control mechanics used to execute programs :3

Explanation:

:3

Write a SELECT statement that returns these columns from the Orders table: The CardNumber column The length of the CardNumber column The last four digits of the CardNumber columnWhen you get that working right, add the column that follows to the result set. This is more difficult because the column requires the use of functions within functions. A column that displays the last four digits of the CardNumber column in this format: XXXX-XXXX-XXXX-1234. In other words, use Xs for the first 12 digits of the card number and actual numbers for the last four digits of the number.selectCardNumber,len(CardNumber) as CardNumberLegnth,right(CardNumber, 4) as LastFourDigits,'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumberfrom Orders

Answers

Answer:

SELECT

CardNumber,

len(CardNumber) as CardNumberLength,

right(CardNumber, 4) as LastFourDigits,

'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumber

from Orders

Explanation:

The question you posted contains the answer (See answer section). So, I will only help in providing an explanation

Given

Table name: Orders

Records to select: CardNumber, length of CardNumber, last 4 digits of CardNumber

From the question, we understand that the last four digits should display the first 12 digits as X while the last 4 digits are displayed.

So, the solution is as follows:

SELECT ----> This implies that the query is to perform a select operation

CardNumber, ---> This represents a column to read

len(CardNumber) as CardNumberLength, -----> len(CardNumber) means that the length of card number is to be calculated.

as CardNumberLength implies that an CardNumberLength is used as an alias to represent the calculated length

right(CardNumber, 4) as LastFourDigits, --> This reads the 4 rightmost digit of column CardNumber

'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumber --> This concatenates the prefix XXXX-XXXX-XXXX to the 4 rightmost digit of column CardNumber

as FormattedNumber implies that an FormattedNumber is used as an alias to represent record

from Orders --> This represents the table where the record is being read.

By using your own data, search engines and other sites try to make your web experience more personalized. However, by doing this, certain information is being hidden from you. Which of the following terms is used to describe the virtual environment a person ends up in when sites choose to show them only certain, customized information?

A filter bubble

A clustered circle

A relational table

An indexed environment

Answers

I believe it is a filter bubble

Answer:

A filter bubble

Explanation:

Create an array of doubles to contain 5 values Prompt the user to enter 5 values that will be stored in the array. These values represent hours worked. Each element represents one day of work. Create 3 c-strings: full[40], first[20], last[20] Create a function parse_name(char full[], char first[], char last[]). This function will take a full name such as "Noah Zark" and separate "Noah" into the first c-string, and "Zark" into the last c-string. Create a function void create_timecard(double hours[], char first[], char last[]). This function will create (write to) a file called "timecard.txt". The file will contain the parsed first and last name, the hours, and a total of the hours. See the final file below. First Name: Noah

Answers

Solution :

[tex]$\#$[/tex]include [tex]$<stdio.h>$[/tex]  

[tex]$\#$[/tex]include [tex]$<string.h>$[/tex]    

void parse[tex]$\_$[/tex]name([tex]$char \ full[]$[/tex], char first[tex]$[],$[/tex] char last[tex]$[])$[/tex]

{

// to_get_this_function_working_immediately, _irst

// stub_it_out_as_below._When_you_have_everything_else

// working,_come_back_and_really_parse_full_name

// this always sets first name to "Noah"

int i, j = 0;

for(i = 0; full[i] != ' '; i++)

  first[j++] = full[i];

first[j] = '\0';  

// this always sets last name to "Zark"

j = 0;

strcpy(last, full+i+1);

// replace the above calls with the actual logic to separate

// full into two distinct pieces

}

int main()

{

char full[40], first[20], last[20];

double hours[5];

// ask the user to enter full name

printf("What is your name? ");

gets(full);

// parse the full name into first and last

parse_name(full, first, last);

// load the hours

for(int i = 0; i < 5; i++)

{

   printf("Enter hours for day %d: ", i+1);

   scanf("%lf", &hours[i]);

}

// create the time card

FILE* fp = fopen("timecard.txt", "w");

fprintf(fp, "First Name: %s\n", first);

fprintf(fp, "Last Name: %s\n", last);

double sum = 0.0;

for(int i = 0; i < 5; i++)

{

   fprintf(fp, "Day %i: %.1lf\n", i+1, hours[i]);

   sum += hours[i];

}

fprintf(fp, "Total: %.1f\n", sum);    

printf("Timecard is ready. See timecard.txt\n");

return 0;

}

# 1) Complete the function to return the result of the conversion
def convert_distance(miles):
km = miles * 1.6 # approximately 1.6 km in 1 mile

my_trip_miles = 55

# 2) Convert my_trip_miles to kilometers by calling the function above
my_trip_km = ___

# 3) Fill in the blank to print the result of the conversion
print("The distance in kilometers is " + ___)

# 4) Calculate the round-trip in kilometers by doubling the result,
# and fill in the blank to print the result
print("The round-trip in kilometers is " + ___)

Answers

Answer:

See explanation

Explanation:

Replace the ____ with the expressions in bold and italics

1)          return km

 

return km returns the result of the computation

2)  = convert_distance(my_trip_miles)

convert_distance(my_trip_miles) calls the function and passes my_trip_miles to the function

3)  + str(my_trip_km)

The above statement prints the returned value

4)  +str(my_trip_km * 2)

The above statement prints the returned value multiplied by 2

Which of the following cannot be used in MS Office.
Joystick
Scanner
Light Pen
Mouse

Answers

Answer:

A.

Explanation:

A Joystick is a control device that is connected to the computer to play games. A joystick is similar in structure to a control stick used by pilots in airplanes and got its name from the same. A joystick contains a stick, base, extra buttons, auto switch fire, trigger, throttle, POV hat, and a suction cup. A joystick also serves the purpose of assistive technology.

The device which can not be used in MS Office is a joystick. Therefore, option A is correct.

what does the
command do

Answers

Please specify your question.

What techniques overcome resistance and improve the credibility of a product? Check all that apply.
Including performance tests, polls, or awards
Listing names of satisfied users
Sending unwanted merchandise
Using a celebrity name without authorization

Answers

Answer: Including performance tests, polls, or awards.

Listing names of satisfied users

Explanation:

For every business, it is important to build ones credibility as this is vital on keeping ones customers and clients. A credible organization is trusted and respected.

The techniques that can be used to overcome resistance and improve the credibility of a product include having performance tests, polls, or awards and also listing the names of satisfied users.

Sending unwanted merchandise and also using a celebrity name without authorization is bad for one's business as it will have a negative effect on the business credibility.

importance of information
literay to the society

Answers

Explanation:

Information literacy is important for today's learners, it promotes problem solving approaches and thinking skills – asking questions and seeking answers, finding information, forming opinions, evaluateing sources, and making decisions fostering successful learners, effective contributors, and confident individuals.

How are BGP neighbor relationships formed
Automatically through BGP
Automatically through EIGRP
Automatically through OSPF
They are setup manually

Answers

Answer:

They are set up manually

Explanation:

BGP neighbor relationships formed "They are set up manually."

This is explained between when the BGP developed a close to a neighbor with other BGP routers, the BGP neighbor is then fully made manually with the help of TCP port 179 to connect and form the relationship between the BGP neighbor, this is then followed up through the interaction of any routing data between them.

For BGP neighbors relationship to become established it succeeds through various phases, which are:

1. Idle

2. Connect

3. Active

4. OpenSent

5. OpenConfirm

6. Established

1. P=O START: PRINT PP = P + 5 IFP
<=20 THEN GOTO START: * what is output​

Answers

Answer:

0

5

10

15

20

Explanation:

P=O should be P=0, but even with this error this is the output.

When P reaches 20 it will execute the loop once more, so 20 gets printed, before getting increased to 25, which will not be printed because then the loop ends.

5. In an array-based implementation of the ADT list, the getEntry method locates the entry by a. going directly to the appropriate array element b. searching for the entry starting at the beginning of the array working to the end c. searching for the entry starting at the end of the array working to the beginning d. none of the above

Answers

Expert Answer for this question-

Explanation:

Answer- C

Computer programming

Answers

Here is the answer for the question
Other Questions
Can 3 over 11/2 and 6 over 11 be a proportion?? Please explain!!! ASAP the slope of a line is 1, and the y-intercept is -1. what is the equation of the line written in slope-intercept form? I NEED HELP NOWWWWWThroughout the reflection, make sure you have a copy of the Student Guide and your data tables. Fill in the terms that complete the statements.In this lab, you dissected a flower. The modified leaves that surround the reproductive parts are called ____. These structures help attract pollinators to the flower. The ___ is the female reproductive organ, which contains three segments: the stigma, style, and ovary. April 23, 2013There are so many opportunities to make a difference in another persons life. As life gets busy, we tend to lose sight of whats important, like giving back to the community. Here are some ideas to participate in public service. Local soup kitchens and food pantries are always looking for volunteers. There are also many nursing homes that welcome volunteers. Additionally, many nonprofit businesses, like the YMCA, offer opportunities for people to donate their time. I have included many links throughout my blog that guide people to volunteer opportunities in their area. Think about how you would like to give back. Sometimes getting friends involved can make the experience even more meaningful. Get involved today; its never too late!How could Ameena better develop her claim?Read the entry from Ameenas blog about the importance of community service.How could Ameena better develop her claim?Include a fact about how nursing homes are run.Include an interview with someone who has never volunteered.Include an image of a YMCA building. Include a quote from someone who has volunteered. During WWI, the Ottoman Empire carried out genocide against which group? In a poll, 417 students voted. Nominee D received 2/3 of the votes. How many did nominee D receive? In a chemical reaction between copper metal and silver nitrate, 12.7 g of copper(II) and 64.5 g of silver nitrate react, and 38.1 g of Silver is produced. 21) Predict the products and write the balanced equation and include the physical state of each. 22) What type of chemical reaction is this? 23) Which is the limiting reactant? You must include the work for this to receive full credit. 24) What mass of excess is used up, and what mass is left over? 25) Calculate the percent yield. if the income tax rate is 4%, determine the amount of income tax paid on income of $20,000. first person to answer all of these questions gets brainliest, also upping points to 50 Lucas is making 12 jumbo muffins to sell at his class bake sale . He has 2 bowls full of batter what fraction of a bowl of batter should Lucas put in each muffin cup ? Answer quick and correctly for brainliest (remind me to give brainliest i usually forget.) PLEASE ANSWER ITS MY LAST QUESTION AND IM ABSELOUTELY CLUELESSMarine plants, such as algae, use CO2 to make energy. Ocean fertilization is the introduction into oceans of nutrients that encourage the growth of these plants. How can this technique affect the pH in oceans that already have higher than normal CO2 readings? what measurement is equal to 3,000 meters The arc length of this circle is 9.42 inches. Determine the length of the radius.Complete your work in the space provided. Republic of Texas Significant Events Timeline How did diet play a role in the expansion of Europe? a subwoofer is a type of speaker which plays only the very low notes in a song or movie, which following frequencies would you expect to be able to hear from a subwoofer10hz25hz750hz1,050hz Solve the equation.Start Fraction b over negative 6 End Fraction = 3 Which of the following would NOT be an example of GeneticEngineering? A.Gene TherapyB.Natural SelectionC.Genetically Modified OrganismsD.Cloning A projectile is thrown with a velocity of 40 m/s, 45 degrees above the +x-axis. Determine its initial x-velocity and its initial y-velocity. Question 1: What is the power observed in the energy analyzer when the rated voltage(U1) is applied to the primary of the transformer, and there is no load at the secondary? Question 2: Find the transformation ratio of the transformer using the values U1,U2 recorded in the experiment.Question 3: Sketch the no-load operation graph of the transformer using the values U1, I2 and the values read in the energy analyzer.Question 4: How can we find the number of turns of transformer?Question 5: Explain the operation principle of the transformer.Question 6: State your final observations about the experiment.