Answer:
His opportunity cost for doing it himself is the lost wages for four hours of work. $1,600-$1,000 = $600 opportunity cost
Explanation:
write a program using if condition and print fail and try again if student marks are less than 33 using if condition and print fail and try again if student marks are less than 33
Answer:
Following are the program to this question:
#include <iostream>//defining a herader file
using namespace std;
int main()//defining main method
{
int marks, i=35;//defining integer variables
cout<<"enter your marks in a percent: ";//print message
cin>>marks;//input marks value
if(marks<i)//defining if block that checks marks less then i
{
cout<<"fail and try again";//print message
}
else//defining else block
{
cout<<"You are qualified";//print message
}
return 0;
}
Output:
enter your marks in a percent: 33
fail and try again
Explanation:
In the above-given, C++ language code inside the main method "marks and i" two integer variable is declared, in which the "i" variable holds a value.
In the next step, if block is defined, that checks "marks" value is less than "i", if the value is true, it will print "fail and try again".
Otherwise, it will go to the else block, in this, it will print "You are qualified".
Which line of code will allow a decimal point to be stored in a variable?
Answer:
a float value u mean right?Explanation:
Answer: the answer is A
Explanation:
I got it right on my flvs 3.01 test!!!!!!!!!!!!!
You are trying to create a user from the command line on a Linux computer. You get an error that permission is denied. What should you do?
Answer:
preface the command with sudo
Explanation:
In the scenario being described, the best course of action would be to preface the command with sudo . This is because sudo is a program Linux operating system that allows the individual user to run programs with the security privileges of another user, which usually applies to the superuser. In this scenario, this would allow the user to bypass the error message and gain access to such a task.
Which is a solution that represents the majority of VPNs on the market and is commonly referred to as a VPN appliance?
Answer:
Remote access VPN
Explanation:
The solution that represents the majority of VPN's on the markets and is commonly referred to as a VPN appliance is the Remote access VPN
A remote access VPN is a type of VPN that works by creating a virtual channel (appliance ) between different devices for the purpose of exchanging data in an encrypted form. although this Tunnel passes through the public internet the Data exchanged are only accessible by the devices connected via the tunnel only .
The remote access VPN is mostly used to connect an employee to the company's network therefore it represent the majority of VPNs in the market.
pseudocode is a good choice to communicate a _____ of a process
is it?!
1.step
2.summary
3.close up
Answer:
close up
Explanation:
you could also say deatiled view, i believe. hope this helps
Answer:
detailed view
Explanation:
A detailed view provides the complete picture of a problem and it explains how the problem is solved using algorithm.
Write the difference between:
a) RAM and hard disk
b) RAM and ROM
c) Volatile memory and non-volatile memory
d) DVD and floppy disk
Answer:
RAM is used to store computer programs and data that CPU needs in real time. ... RAM data is volatile and is erased once computer is switched off. HDD,hard disk has permanent storage and it is used to store user specific data and operating system file
Answer:
RAM is used to store computer programs and data that CPU needs in real time. RAM data is volatile and is erased once computer is switched off.
Hard disk has permanent storage and it is used to store user specific data and operating system files
RAM = Random access memory ;is volatile memory that temporarily stores the files you are working on
ROM = Read-only memory ;is non-volatile memory that permanently stores instructions for your computer
Similarities : They are present in the computer.
Volatile memory and non-volatile memory is RAM and ROM
(d.) Floppy disk is a magnetic storage medium with only a 1.44 M capacity, while a CD is an optical disc that can store 700M CDs are based on physical dimples on the disk surface.
Floppies cannot store much at all A CD will hold more than 450 floppies.
Explanation:
A few of the company's employees do not want to upgrade their smart watches. They explain that it took them a long time to learn to use the current ones and do not understand why they cannot continue to use it. How would you respond to these concerns?
I would respond by saying if they wanted me to set up a meeting to explain how to use them. I would also explain that the new upgrade will be more helpful to track the health of the employees and will be more accurate.
A major advancement in electric lights was the invention of the____
light before World War II.
Answer:
A major advancement in electric lights was the invention of the fluorescent light before World War II
Explanation:
The ongoing research on phosphor coated neon tubes that produce visible white light from ultraviolet light in Europe, resulted in research programs into fluorescent lamp lighting in the U. S., which had reached demonstration stage in the mid and towards the late 1930s, such as the World's fair demonstration in New York, 1939.
The fluorescent proved to be more efficient and long lasting than the incandescent bulbs that were in use back then.
When making changes to existing font, the user must first _____
Tornado Alley is located in the middle of the United States, extending from Texas up through the Dakotas. The above statement is a(n) ________________.
Answer:
fact
Explanation:
because it is a information
Which is an advantage that electronic scheduling tools have over paper calendars?
O Electronic scheduling tools work better for people who are highly visual.
o Electronic scheduling tools require additional supplies to be used.
Electronic scheduling tools have automatic reminders that can be set up.
Electronic scheduling tools contain days and weeks that can be color coded.
Answer:C. Electronic Scheduling tools have automatic reminders that can be set up
Explanation:edge2020
Answer:
C. on Edge 2021
Explanation:
3. Ethnocentrism can be overcome by
how can we lock pubg game from Play Store???
Answer:
You can't necessary lock it, it is impossible to do so.
Answer:
i dont think it is possible :((
Explanation:
I use ios
To save a document as a new file name select A. File New B. Save C. Save as D. File open
Answer:
C
Explanation:
To save a document as a new file name select we need to Save as
An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems analysts. E. sending data.
Answer:
C. receiving data.
Explanation:
An information system interacts with its environment by receiving data in its raw forms and information in a usable format.
Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.
Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.
Additionally, an information system comprises of five (5) main components;
1. Hardware.
2. Software.
3. Database.
4. Human resources.
5. Telecommunications.
Hence, the information system relies on the data it receives from its environment, processes this data into formats that are usable by the end users.
How can Mario complete his task without leaving the word application?
Answer:Use the Thesaurus feature to find a synonym of the word.
Explanation:i just got the same question.
Answer:Use the Thesaurus feature to find a synonym of the word.
Explanation:
__________ is the current federal information processing the standard that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the National Defense infrastructure.
a. AES
b. DES
c. 2DES
d. 3DES
Answer:
FIPS 140-2 es el acrónimo de Federal Information Processing Standard (estándares federales de procesamiento de la información), publicación 140-2, es un estándar de seguridad de ordenadores del gobierno de los Estados Unidos para la acreditación de módulos criptográficos. ... El Instituto Nacional de Estándares y Tecnología (NIST)
Explanation:
What did you do over the Summer?
Answer:
I studied for SAT the whole 2 months, studying 18 hours a day...
I honestly didn't do anything because of Corona
The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * symbol represents multiplication. Fix the errors so that the code works correctly: input ("Enter a number: ") print (num * 8) The code above is pre-populated in your code editor. Hint: Remember that to think about the data type that the user will input. How can you make sure that their input is entered as a number?
Let's check sample input and output
[tex]\tt num=int(input("Enter\:a\:number:"))[/tex]
[tex]\tt print(num*8)[/tex]
Sample run
[tex]\tt Enter\:a\: number:6[/tex]
[tex]\tt 48[/tex]
Why is Copyright important?
Copyright protects those words from being used in any form without the author's approval. They're your words, your product.
Write a VB program to convert a temperature from Celsius to Fahrenheit and vice versa.
Answer:
Dim c As Double
Dim f As Double
Private Sub CmdClr_Click()
TxtInput.Text = “”
TxtInput.SetFocus
End Sub
Private Sub Command1_Click()
c = Val(TxtInput.Text)
If Val(c) = 0 And TxtInput = “” Then
MsgBox “Enter Any number”, vbInformation, “Result”
TxtInput.SetFocus
Else
f = 9 * c \ 5 + 32
MsgBox “Fahrenheit :” & ” ” & f, vbInformation, “Result”
End If
End Sub
Private Sub Command2_Click()
f = Val(TxtInput.Text)
If Val(c) = 0 And TxtInput = “” Then
MsgBox “Enter Any number”, vbInformation, “Result”
TxtInput.SetFocus
Else
c = (f – 32) * 5 \ 9
MsgBox “Celsius :” & ” ” & c, vbInformation, “Result”
End If
End Sub
Explanation:
An intrusion prevention system (IPS) is similar to an IDS, except that in addition to detecting and alerting, an intrusion detection system (IPS) can also take action to prevent a breach from occurring.
a. True
b. False
Answer:
The answer is "Option a".
Explanation:
The IPS system is a type of network safety that identifies and recognized threats and prevents them from similar to IDS. It also tracks the network continually, searching for this, and gathering information from potential malicious events.
Its core role is the program of intrusion prevention, which would be to monitor and identify or avoid any malicious activity by the IDS. It attempts its logged and reported to network managers.Select the correct answer from each drop-down menu.
Suzanne wants to use a digital media tool that acts like a journal and facilitates discussion, which digital media tool should Suzanne use for this
purpose?
Suzanne should use a(n)
She needs to download
software, such as Wordpress, for this purpose.
Answer:
Suzanne needs a blog
Explanation:
Because she wants to use a digital media tool that acts as a journal and facilitates discussion, Suzanne would need a blog for this.
A blog is a platform where people can meet and have discussions on the internet sometimes in a diary-like format.
Suzanne would need software like WordPress for her blog.
Answer:
blog, blogging
Explanation:
A machine is having issues, so the user is responsible for getting the machine serviced. Which stage of the hardware lifecycle does this scenario belong to
Answer:
Maintenance, is the right answer.
Explanation:
A stage where the hardware of a machine is replaced due to some issues which make the machine work inappropriately is called the maintenance stage of the hardware. In this phase, some modifications are made in the hardware to support the operational effectiveness of the hardware. The customer executives try to improve the performance of the system and provide better security during replacing the hardware.
Mobile device apps that enable users to pay for things or check-in to hotels or venues use _________ technology. Select one: a. GPS b. GIS c. TCP/IP d. NFC
Answer:
ip
vgfjffffffffvfdxx
Explanation:
fsxqwvetsgsrwfuxhsrwctsdqccdhvxrsbx7shgxfrxvshxrc
how do I make a division sign with my Chromebook keyboard?
Answer: you can't
Explanation: The best way to make one is to search for one then copy and paste
Hope this helps^^
To create a division sign "÷" on a Chromebook, hold "Ctrl" + "Move" + "+". This gets to extraordinary characters on Chromebooks.
How do I make a division sign with my Chromebook keyboard?On a Chromebook keyboard, you'll make a division sign "÷" by utilizing the following steps:
Press and hold the "Ctrl" (Control) key.Whereas holding the "Ctrl" key, press the "Move" key.Without discharging the "Ctrl" and "Move" keys, press the "+" (also) key.This combination of keys will deliver the division sign "÷" on your Chromebook. The "Ctrl + Shift + +" alternate route could be a common way to access special characters, counting scientific images, on Chromebooks.
Keep in mind to guarantee merely are utilizing the console with a US format, as the area of keys might shift slightly totally different formats.
Learn more about the division sign here:
https://brainly.com/question/25289437
#SPJ6
Before school, Kyle could not find his cell phone. Kyle tells his mom that he's already looked everywhere. Mom knows that Kyle sometimes looks at his phone in bed before falling asleep. She decides to look under his bed and finds the phone. What decision-making method did Kyle's mom most likely use?
Answer:
deductive decision-making strategy
Explanation:
In this scenario, it seems that Kyle's mom is most likely using a deductive decision-making strategy. This is when the individual goes through the process of reasoning from one or more statements (premises) in order to reach a logical conclusion. Which in this case Kyle's mom knew that Kyle sometimes sleeps with his phone next to him and that it there is space where it can fall. Using these two premises she deduced that the phone is most likely under the bed.
Answer:
Intuitive
Explanation:
By the way I am not sure this is just what I put and it doesn't tell me the correct answers.
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Question 41 options: A) Availability B) Confidentiality C) Authenticity D) Nonrepudiation
When you open as many links as you want, and still stay in the same browser window instead of cluttering your screen with multiple windows, it's called----- a Tabbed browsing b Same browsing c Decluttering browsing d Multiple browsing
Answer:
a. Tabbed browsing
Explanation:
Tabbed browsing is a feature in the browser that helps in operating several tabs at the same time. It helps in browsing different links without opening different browsers. Multiple pages can be opened and surfed at the same time in one window. Any link can be opened in a different or new tab by clicking right on the link. After this, 'open link in new tab' is to be selected and the link gets opened respectively.
Which HTML tag is formatted correctly?
NEED ANSWER ASAP PLZ HELP ME IDONT UNDERETAND IT
I think the last one is the correct one
Answer:
D
Explanation:
All others don't work