Answer:
Print the sum of the squares of the n numbers
Print the percentage of numbers greater than the average of the n numbers
Print the median f n numbers
Explanation:
The computer programs have different configurations based on the assigned tasks. The constant amount of memory is used by the cache. This is the new technology in the computer software which consumes only small amount of memory and activates once the task is assigned to it.
Lola wants to install an add-in in Excel.She has to unblock the add-in to allow Excel to open the add-in file automatically.To do this,she right clicks on the add-in file and selects an option from the menu. What could the option be?
A) Copy
B) Delete
C) Rename
D) Properties
Answer:
The correct answer is:
Properties (D)
Explanation:
First of all, option D (Properties) is the option that makes the most sense in this scenario, because the other options: Copy, Delete, and Rename are unrelated commands to what is to be achieved.
Secondly and more practically, an add-in file may not load in excel, and most of the time it is blocked by default and has to be unblocked. The following steps are used:
1. close Excel if it is open
2. open the folder where the add-in file is located, right-click on the add-in file, and select "properties"
3. a display tray will appear, having the attributes: Read-only, Hidden, Advanced, and unblock. Click the checkbox against "unblock" and make sure it is checked.
4. click Apply and Click Ok
Voila, your add-in file is unblocked.
N:B The Images are for steps 2 and 3
Olivia wants to send a report to her boss concerning an upcoming project. Which communication format should she use to send a formal message to her boss? A. email B. chat C. forum D. blog
Answer:
A. Email. It is formal
Explanation:
Answer:
Explanation:
Find the max and min of a set of values using recursion Find the max and min of a set of values using recursion. First input the values. The first value inputted is the number of additional data items to input. For instance, if the input is: 3 1 2 3
Answer:
This question is answered using Python programming language
def MaxSet(mylist, count):
if (count == 1):
return mylist[0]
return max(mylist[count - 1], MaxSet(mylist, count - 1))
def MinSet(mylist, count):
if (count == 1):
return mylist[0]
return min(mylist[count - 1], MinSet(mylist, count - 1))
count = int(input("Length of set: "))
mylist = []
for i in range(count):
inp= int(input("Input: "))
mylist.append(inp)
print("Minimum: "+str(MinSet(mylist, count)) )
print("Maximum: "+str(MaxSet(mylist, count)) )
Explanation:
This defines the recursion that returns the maximum
def MaxSet(mylist, count):
This following checks for the maximum using recursion
if (count == 1):
return mylist[0]
return max(mylist[count - 1], MaxSet(mylist, count - 1))
This defines the recursion that returns the minimum
def MinSet(mylist, count):
This following checks for the minimum using recursion
if (count == 1):
return mylist[0]
return min(mylist[count - 1], MinSet(mylist, count - 1))
The main begins here
This prompts user for length of set
count = int(input("Length of set: "))
This defines an empty list
mylist = []
The following iteration gets user input
for i in range(count):
inp= int(input("Input: "))
mylist.append(inp)
This calls the minimum function
print("Minimum: "+str(MinSet(mylist, count)) )
This calls the maximum function
print("Maximum: "+str(MaxSet(mylist, count)) )
Which of the following will increase the level of security for personal information on a mobile device if the device is lost or stolen
Answer:
this is a very cool day for me yeah know
According to a survey of hikers on a trail, 50% of the hikers like Gatorade (G) and 40% like energy bars (E). 20% like both. Assume random selection:____________ a. Find the probability that a hiker likes Gatorade or energy bars b. If a hiker likes Gatorade, find the probability that he likes energy bars c. If a hiker likes energy bars, find the probability that he likes Gatorade.
Answer:
Explanation:
As per given data
Probability hikers like Gatorade (G) = P(G) = 50% = 0.5
Probability hikers like energy bars = P(E) = 40% = 0.4
Probability hikers like both = P(G and E) = 20% = 0.2
a)
To find the probability that a hiker likes Gatorade or energy bars use the following formula
P(G or E) = P(G) + P(E) - P(G and E )
P(G or E) = 0.5 + 0.4 - 0.2
P(G or E) = 0.7
b)
To find the probability that a hiker likes Gatorade or energy bars use the following formula
P(E|G) = P(E and G)/P(G)
P(E|G) = 0.2/0.5
P(E|G) = 0.4
c)
The probability that he likes Gatorade.
P(G|E) = P(G and E) / P(E)
P(G|E) = 0.2 / 0.4
P(G|E) = 0.5
Write code that generates a random odd integer (not divisible by 2) between 50 and 99 inclusive.
import random
nums = [x for x in range(50,100) if x%2!=0]
print(random.choice(nums))
We use a list comprehension to create a list of the odd numbers between 50 and 99. Then we randomly choose one of those numbers using the random module.
Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color vision for identifying differences in colored wires critical thinking and reasoning skills for analyzing information stress management for handling urgent tasks mechanical knowledge and ability to drive and operate machinery working well with customers and being friendly
Answer:
a, c, d
Explanation:
Answer:
it is just A
Explanation:
on edge. unit test review
how do i change my desktop theme on my chromebook?
Answer:
open Chrome.
At the top right, click More. Settings.
Under "Appearance," click Themes. You can also go to the gallery by visiting Chrome Web Store Themes.
Click the thumbnails to preview different themes.
When you find a theme you'd like to use, click Add to Chrome.
Explanation:
Best of Luck
for your work and
d
Best wishes for you
.
oh, why thank you same to you
The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting.
Answer:
The correct approach is "Presence awareness".
Explanation:
The willingness, at designated occasions, to see which one is available on the internet. When using the IM framework, that very many IM systems show a list of user groups attached to the system. A current model of the IGI Social website is being used by oneself. With either the growing prevalence of Internet chat apps, a Presence Awareness model has been proposed by German IT professionals.Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management strategy? An indirect benefit? Provide examples.
Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.
It gives an illustration of the relationship of the National preparedness mission elements of risk.
Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.
However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.
Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.
When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.
THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.
"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.
Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.
Aubrey is on a Windows machine. She wants to back up her Halloween pictures on an external hard drive. Which of the following tasks is she likely to perform as part of a sequence of actions do that? Right-click the file and choose the Copy option. Open the application and select the File menu. Right-click the file and select the Delete option. Go to the location where you want to save the file. Right-click an empty area and select the Paste option.
Answer:
Right-click the file and choose the Copy option, Go to the location where you want to save the file, Open the application and select the File menu, and Right-click an empty area and select the Paste option.
Explanation:
You would not need to Right-click the file and delete it to back up her Halloween photos, but you would need to upload them to an external application. To do that, you would basically do every step besides right-clicking and deleting the file (Right-click the file and select the Delete option)
Answer: A, D, E
Explanation: correct on Plato, plus you wouldn’t select the file menu or delete the files.
Is the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction
Answer:
customer-serious orientation
Explanation:
Customer-serious orientation can be defined as the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction.
This ultimately implies that, a customer-serious oriented business firm or company puts the needs, wants and requirements of its customers first without considering their own needs in a bid to satisfy and retain them.
Hence, customer-serious orientation requires the employees working in an organization to show and demonstrate positive attitudes and behaviors at all times.
The "persistent interrupt" is a bug in the code that exhibits a behavior that’s similar to an infinite loop. The ISR exits and gets called back immediately an infinite amount of times even though the interrupt event occurred once. The persistent interrupt occurs when three conditions are met. What are these conditions? How do we avoid a persistent interrupt from occurring?
Answer:
1. the 3 conditions have been listed below
2. to avoid persistent interrupt, we break any of the 3 conditions.
Explanation:
The persistent interrupt occurs when these three conditions below are met.
They are as follows:
1. GIE=1
2. xIE=1
3. xIFT=1
in avoidance of the persistent interrupt from occurring, we break any of these 3 conditions that I have listed above.
in order To break any one of the 3 conditions, we clear the flag that corresponds to the associated
we can also avoid the persistent interrupt occurrence by having the Interrupt Service Routine (ISR) clear maybe one or all of the three bits mentioned above before the ISR terminates, so it wouldn't get called back again. clearing any of the bits will not allow the ISR to be called again.
select all the apply. Effective presentations
Answer:are influenced by their setting, are consistent in their message, and are tailored to their audience.
Explanation:
Correct on Edge 2020
Which program will have the output shown below?
15
16
17
>>> for count in range(17):
print(count)
>>> for count in range(15, 17):
print(count)
>>> for count in range(15, 18):
print(count)
>>> for count in range(18):
print(count)
Answer:
>>> for count in range(15, 18):
print(count)
is the correct answer
Explanation:
Create a formula for sheet Inventory that highlights any rows where the Reorder level is below the On Hand level in yellow on excel 2016. Will mark brainliest if you can tell me how.
Answer:
Highlight the actual inventory level column and click on condition formatting, click on the drop-down button and select "Formula is" to input the formula "=B4 <= C4", select the color pattern to format the row if the condition is met and click ok.
Explanation:
Assuming the reorder level (column C4 and the on-hand level or actual inventory (column B starting at row 4) are columns in the Excel worksheet. The reorder level is the minimum level of inventory before inventory is populated. So the formula compares the value of the actual level with the reorder level, if any row is less than or equal to the reorder level, the row is formatted with the selected color.
Answer:
Highlight the actual inventory level column and click on condition formatting, click on the drop-down button and select "Formula is" to input the formula "=B4 <= C4", select the color pattern to format the row if the condition is met and click ok.
Explanation:
A technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called:_______
a. assistive instruction.
b. UDL technology.
c. hypertext software.
d. adaptive instruction.
Answer:
c. hypertext software.
Explanation:
In Computer science, a hypertext can be defined as textual informations that are being displayed on a computer system and these texts usually links to other informations (texts) that the user can easily have access to in real-time.
Basically, some developers include encyclopedias and dictionaries in their software database, which makes other necessary informations or contents easier and immediately accessible to the users through the use of hypertexts that is activated by pointing and clicking on the link with a mouse, keypress set or soft touching the screen.
Hence, a technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called hypertext software.
Network Access Protection (NAP) analyses the ________ of a computer.
Answer:
virus in a virus
Explanation:
If a system's instruction set consists of an 8-bit opcode, what is the maximum number of output signal lines required for the control unit?
A) 8 B) 64C) 128 D) 256
Answer:
D. 256
Explanation:
Given
[tex]Instructions = 8\ bit[/tex]
Required
Determine the maximum number of output
To get the required value, we make use of the following:
[tex]Maximum = 2^n[/tex]
Where n is the bits of the opcode.
i.e.
[tex]n = 8[/tex]
Substitute 8 for n in [tex]Maximum = 2^n[/tex]
[tex]Maximum = 2^8[/tex]
[tex]Maximum = 256[/tex]
Hence, option D answers the question
Describe two circumstances where access services might get implemented by organizations please.
Answer:
Answered below
Explanation:
Remote access enables access to an organisations network from remote places. Certain conditions require such access. An organisation might require their workforce to work from home especially in this coronavirus health pandemic situation. Therefore remote access is necessary.
Also attending to customers needs, virtual meetings and connections to workers and clients all over the world, can only be made possible by the implementation of secured remote access, by the organisation.