Answer: must have public properties that match the names of the bound fields
Explanation:
When a business class is used with an object data source, the business class must have public properties that match the names of the bound fields.
Having an attribute which match the names of the bound fields isn't necessary as well as having a constructor with parameters that match the names of the bound fields
Therefore, the correct option is B.
statement
Looping
WAP to display
name 50 times.
Answer:
can you specify what program you're doing this in? I can do qbasic and maybe python
we use _____command to get data from the user? (python)
Answer:
INPUT
Explanation:
EXAMPLE PYTHON CODE
_______________________________________________________
INPUT CODE:
_______________________________________________________
foo = input('foo: ')#Have some text printed before the input field
bar = foo
print(bar)
_______________________________________________________
OUTPUT CODE:
_______________________________________________________
foo: Hello World!
Hello World!
>>> bar
'Hello World!'
>>>foo
'Hello World!'
You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15 cubicles where employees work with their mobile devices. You test connectivity from all locations and find that signal strength is good throughout the room. Several months later, you are called to troubleshoot connectivity problems at the site. You find that the large room was divided into two smaller rooms by a floor to ceiling wall with metal studs. What is the most likely reason for the connectivity problems
Answer:
interference
Explanation:
The most likely reason for the connectivity problems is interference. This interference can be caused by many factors but in this scenario the most likely factor would be the metal studs and all the metal used to create the ceiling/floor. Metal is a huge interference when it comes to wifi signals. Depending on the type of metal and the amount it can greatly diminish the signal strength or even completely prevent the signal from passing to it's destination, regardless of how close the destination device is located.
Ethan wants to change the font in his document. He should _____.
delete the text, select a font, and type
select a new font and highlight the text
highlight the text and select a new font
zoom in on the text, click on style, and make a selection
Answer:
C because it will work. I tried that a lot of time with documents.
Explanation:
Answer:
Ethan wants to change the font in his document. He should _____.
A. delete the text, select a font, and type
B. select a new font and highlight the text
C. highlight the text and select a new font
D. zoom in on the text, click on style, and make a selection
It is highlight the text and select a new font
Explanation:
When numbers are formatted in percent format, they are multiplied by _______ for display purposes.
1000
100
10
20
39 POINTS !
Okay so basically I have a 60 percent keyboard, and it’s LED perfect in shape jkeyboard okay.
I try connecting it to my ps4 and it’s detected but it won’t light up nor will any of the keys respond.
I have tried resetting my ps4
Iv’e tried unplugging and replacing in
I’ve tried holding FN and N to disable the n rollkey
I be tried plugging it into a pc
But nothing wors does anyone know how to fix it?
Answer:
Contact a service center electronics managementAnswer:
take it back to the store with your the receipt and get a new one
Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations running public websites. In risk management language, what term is used to describe a hacking group? Group of answer choices Risk Threat Actor Vulnerability Standard
Answer:
Threat
Explanation:
In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.
Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.
Rinaldo and his game design team have
Answer:
HAVE DA baby
Explanation:LLLLLLLLLLLLLLLLLLLLLETS GOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
If you have an ordered list of all the states in North America, and you want to add a title "States of North America", what tag will you use?
A.
B.
C.
D.
Answer:
B
Explanation:
I think that is the answer
A dictionary is also known as
Answer:
wordbook, lexicon or vocabulary
Explanation:
learned, dunno what lesson ur doing tho
Explain how the use of the internet has allowed people to achieve some
normalcy during the Current Pandemic
I don't know if this is going to help you or not because I'm only 13 but let me know if it helps people can now talk to one another more effectively because of things like zoom and it's become more efficient to work at home because we can have online meetings
Write a half page summary on how to clean a Gaming PC properly.
Answer:
As a responsible PC gaming enthusiast, you simply cannot wait for spring to do a little routine cleaning on your PC. Regardless of whether you casually play or professionally game, all gaming computers are susceptible to dirt, dust, and other contaminants that can severely impact performance. Dust buildup can cause PC components to retain heat, making it difficult for internal fans to keep the system cool. As a result, the system can become less efficient and unusually slow. However, there are steps you can take to keep your gaming computer in great condition. In this article, we explain how to clean the inside of your gaming computer, so you can keep on fighting the good fight in digital worlds.Assemble the Right ToolsGaming desktops are very complex pieces of technology. Be smart by assembling the necessary tools and supplies before you begin the deep-clean process. Most of the products you need might already be sitting around the house, including compressed air cans, rubbing alcohol, white vinegar, distilled water, microfiber cloths, ear swabs, and tape.How to Clean a Gaming PCFollow these 10 steps to get back on good terms with your gaming rig.1. Disconnect the power cable, USB peripherals, as well as any audio equipment attached to your computer and safely discharge the remaining power.2. Take the computer case outside, so the dust doesn’t settle in the same room that your gaming setup is located.3. Wipe the exterior and interior of the computer case.4. Detach the dust filters and wipe away any accumulated dust. We recommend using compressed air for full coverage. If you have foam filters, gently rinse with water and leave them to dry.5. Wipe down the inside of the case by hand after disconnecting the graphics cards and RAM modules.6. If possible, remove the heatsink entirely to scrub away any gunk or debris.7. Clean off any dust hidden between the cracks of the graphics cards, so you can easily clean the motherboard.8. Remove any big clumps of dust by using a cloth dampened with rubbing alcohol.9. Use the compressed air can to clean nooks, crannies, and the motherboard. For stubborn dust spots, just dampen an ear swab with rubbing alcohol or use a gentle toothbrush to clean.10. Once the case interior is completely clean and free of dust, you can put each component back where it belongs.Routine cleaning and maintenance are important to the health of your gaming PC. We recommend using compressed air every three to six months to prevent dust buildup from impacting your PC components. You should also make an effort to clean your mouse, headphones, keyboard, and monitor to keep your gaming setup looking like new.
Explanation:
What do you suggest for Father's Day?
Which of the following is recalling the main points of a text?
Answer:
Option A< Rote learning
Explanation:
Options for given question
a) Rote learning
b) memorizing
c) Adapting
d) Seeming
Recalling of facts is associated with rote learning in which the education is de-emphasized in the form of science
Hence, option A is correct
The part of an HTML document where the CSS file is linked is the..?
A) body
B) footer
C) header
D) paragraph
Answer:
C) header
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head.
The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.
On the other hand, the body of a HTML document contains the contents or informations that a web page displays.
Hence, the part of an HTML document where the cascaded style sheet (CSS) file is linked is the header. A style sheet can be linked to an HTML document by three (3) main methods and these are;
I. External style.
II. Inline style.
III. Embedded (internal) style.
Match each with the correct answer.
1. Practice 4.2
Match the CPU part to its definition.
1. ________ arithmetic logic unit. (ALU)
2. ________ bus unit.
3. ________ cache.
4. ________ control unit.
5. ________ decode unit.
6. ________ regular unit.
-options
A. Decodes instructions and data and transmits the data to other areas in an understandable format.
B. Contains many separate, smaller storage units.
C. Connects all the other major components together, accepts data, and sends data through the input and output bus sections.
D. Control of the overall operations of the CPU.
E. Performs mathematical functions on data stored in the register area.
F. Small temporary memory area that separates and stores income data and instructions.
Answer:
1. E
2. C
3. F
4. D
5. A
6. B
Explanation:
CPU: this is known as the central processing unit and it is considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.
A. Decode unit: decodes instructions and data and transmits the data to other areas in an understandable format.
B. Register unit: contains many separate, smaller storage units. Modern CPUs need only a few nanoseconds to execute an instruction when all operands are in its registers.
C. Bus unit: it is used to connect all the other major components together, accepts data, and sends data through the input and output bus sections.
D. Control unit: control of the overall operations of the CPU. The component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit how to respond to informations sent to the processor.
E. Arithmetic logic unit (ALU): performs mathematical functions on data stored in the register area.
F. Cache: small temporary memory area that separates and stores income data and instructions.
is monitor is a television
Answer: Can you rephrase the question
Explanation:
1. PIN
Create a program that asks the user to enter his or her PIN. The program displays a
message if the PIN is correct. Else, it displays another message if the PIN is incorrect.
Answer:
pin the answer you fakoma
Explanation:
Who did Connie Macpherson think her visitor was?
Connie Macpherson thought that her visitor was her husband,Jim!
I hope it will helps you!
5.What is returned by the call go(30)?
public static String go ( int x)
{
String s = "";
for (int n = x; n > 0; n = n - 5)
S = S + x +
return s;}
Answer:
The string returned is: 303030303030
Explanation:
Given
The above method
Required
The returned string
The method returns a string that is repeated x/5 times.
Take for instance;
x = 30
The method will return a string that contains x in 30/5 (i.e. 6) times
Hence, the result of go(30) is 303030303030
Dan is a nature photographer who wants to share his pictures on his blog site. He wants to retain the high quality of the pictures, regardless of file size. Which file format is best suited for this purpose?
Answer:
JPEG or jpg
Explanation:
JPEG maintains almost 100% quality and reduces file size to up to 90 or 100% of the original
Please help! Why is my windows homepage like this with no desktop pictures for apps? It has like a mail logo for everything. How do I fix it?
What tab appears that allows for charts to be formatted when a chart is selected?
Help please!!!!! Drivers ed
Answer:
Away from the curb
Explanation:
by turning your wheels away from the curb if your breaks fail your car will roll back into the curb instead of into traffic.
13) When developing film, how do you dispose of fixer as opposed to developer?
A) Fixer is poured down the drain while developer can be reused.
B) Developer is poured down the drain while fixer can be reused.
C) Both developer and fixer can be poured down the drain.
D) I don't know.
Answer:
B) Developer is poured down the drain while fixer can be reduced
Explanation:
The effluents produced during photographic processing includes, wash water, bleach, fixer, and developer
The developer is an alkaline solution, with a pH of approximately 10.0, while the pH of the fixer is about 4.3, it is therefore, acidic
The rate of discharge of the developer to the fixer is 2 to 1, and the exhausted developer, fixer and process effluents combined are neutral and can be handle by the the treatment works and the drain pipes
Fixer which remain clear can be reused for more than a day, while the spent basic Developer and the acidic Spent Stop Bath can be combined to form a neutral solution, having a pH of approximately 7, which make them less hazardous to be disposed off down the sink into the drain
Therefore, developer is poured down the drain while fixer can be reused
for my assignment 2: Room area assignment, I keep getting a negative number for room 2, and I don't know why I'm getting the wrong answer because i copied a girl that got 100.
Answer:
The program in Python is as follows:
A = int(input("Side A: "))
B = int(input("Side B: "))
C = int(input("Side C: "))
D = int(input("Side D: "))
E = int(input("Side E: "))
A1 = A * B
A2 = (D - B - E)*(A - C)
A3 = 0.5 * E * (A - C)
Area = A1 + A2 + A3
print("Area:",Area)
Explanation:
One reason, you're getting a negative answer is that you probably entered a greater value for side C than A. Side A is meant to be greater than side C. Since the program do not need to be validated, you have to be careful with your inputs.
Another reason could be that your program is incorrect.
Get input for sides A to E
A = int(input("Side A: "))
B = int(input("Side B: "))
C = int(input("Side C: "))
D = int(input("Side D: "))
E = int(input("Side E: "))
Calculate rectangle area 1 (A1)
A1 = A * B
Calculate rectangle area 2 (A2)
A2 = (D - B - E)*(A - C)
Calculate the triangle area 3 (A3)
A3 = 0.5 * E * (A - C)
Calculate the total area
Area = A1 + A2 + A3
Print the calculated area
print("Area:",Area)
Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to read the file and display its contents in a ListBox control.
Answer:
Kindly check explanation
Explanation:
(1.)
n = 0
While n < 10 :
n+=1
print('fichoh')
# initiate counter n = 0 ; set condition, while n is not equal to 10 ; it print 'fichoh' and counter is increased by 1. This terminates once it reaches 10.
(2.)
for number in range(1,50):
if number%2 != 0 :
print(number)
#An odd number won't have a remainder of 0 when Divided by 2 ; so, for numbers 1 to 49 using the range function, if the number is divided by 2 and leaves a remainder other Than 0, such number is displayed
(3.)
for number in range(0,101,5):
print(number)
# Using the range function, starting from 0 to 100; it is number in the for loop is incremented by 5 and displayed.
(4.)
outfile = open('my_file.txt', 'w')
for n in range(0,11):
outfile.write(str(n))
outfile.close()
#open, 'w' creates a text file, my_text.txt and writes into it ; using the range function, numbers 0 to 10 is written into the created file.
5.)
name_file = open('People.txt', 'r')
While name_file:
out_file = name_file.readline()
if out_file = ' ' :
break
name_file.close()
names = name
#Open, 'r' ; opens and read from the file People.txt ;
#readline reads the content of the opened text file into a list out_file ; using the if ' ', the loop terminates once an empty content is read.
the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m.
The computers that communicate with each other are called [tex]\sf\purple{transmission \:control\: protocol\: (TCP)}[/tex].
[tex]\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{!}}}}}[/tex]
describe the third generation of computers
Answer:
The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry.
The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.
Third Generation
The main features of third generation are −
IC used
More reliable in comparison to previous two generations
Smaller size
Generated less heat
Faster
Lesser maintenance
Costly
AC required
Consumed lesser electricity
Supported high-level language
Some computers of this generation were −
IBM-360 series
Honeywell-6000 series
PDP (Personal Data Processor)
IBM-370/168
TDC-316