WHY ARE APARTMENTS CALLED APARTMENTS IF THEY ARE TOGETHER LOL

Answers

Answer 1

Answer:

cause architects are weird

Explanation:

Answer 2

Explanation:

Cause apartments is apartments so therefore its called apartments


Related Questions

Identify at least 6 errors from the following program code. Write all the errors and rewrite the correct program.(11 pts)

1. public E2
2. {
3. Public static void main(String )
4. {
5. System.Out.Println(“hello)
6. }

Answers

Answer:The code after rearrange the question segment:

public class Q// Class declaration of Q name.

{// Open the class body.

    public static void main(String[] a) // Main function declaration.

{ //Open the main-function body.

           System.out.println("Q"); // Print statement which print Q.

} //close the main-function body.

}//close the class body.

Output:

Q

Explanation:

Consider the declaration of the struct houseType given in this chapter. Suppose firstHouse and secondHouse are variables of houseType. Write C11 statement(s) to compare the style and price of firstHouse and secondHouse. Output true if the corresponding values are the same; false otherwise. (2, 3)

Answers

Answer:

See Explanation

Explanation:

The question is incomplete as there is no link pointing to the houseType struct of chapter 1.

So, I've answered the question from scratch

See attachment for explanation where I used comments to explain each line.

The program is as follows:

#include <iostream>

using namespace std;  

struct houseType{

   int firstHouse, secondHouse;

};

int main() {

   houseType hT;      

   cout << "Enter the price of both house: ";

   cin>> hT.firstHouse;

   cin>> hT.secondHouse;

   if(hT.firstHouse == hT.secondHouse){ cout<<"true";    }

   else{ cout<<"false";    }  

   return 0;

}


Change the following sentences using 'used to
a. We went to school together.
b. How did you spend the winter evenings?
c. We had our milk delivered.
d. I was in love with him.
e. At one time there were trees in the garden.

Answers

Answer:

a. We used to go to school together.

b. How did you use to spend the winter evenings?

c. We used to have our milk delivered.

d. I used to be in love with him.

e. At one time there used to be trees in the garden.

Select the qualification that is best demonstrated in each example.
Ginny carefully reviews the code in a program to make sure there are no errors.
Walker identifies why a program isn't working correctly and fixes it.
Donnell reviews code to help out a coworker who is in a hurry.
Hisako teaches herself a new programming technique.

Answers

Answer:

1. attention to detail

2.problem solving skills

3. teamwork

4. the ability to learn quickly

Explanation:

Answer:

2, 3, 2, 2

Explanation:

answer above was correct:)

Design a program named GradeDistribution.java that reads in 10 grades from the keyboard, then counts and displays grade distribution as follows:

Grade Range No.
[90 - 100] 2
[80 - 89] 5
[70 - 79] 1
[0 - 69] 1
Others 1

Answers

Answer:

[70 — 79]

Explanation:

hi um... i just wanna say hi :P

Answers

Lol Heyy , how are you

hi hope ur having a good day / night :D

design an algorithm to generate the first n terms of sequence 2,6,10,14​

Answers

Answer:

#Begin

a=2

k=0

temp=0

#Input

k=input()

temp=k

k=0

#Processing

while int(k)<int(temp):

print(a)

a=a+4

k=k+1

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

What is range?

The Python range function is a function native to the Python language that is used to generate a numerical sequence within a given range. It is normally used as an auxiliary to the for function. In Python, we can repeat an action a specified number of times using a for loop with the range function.

We can write the python  as:

a=2

k=0

temp=0

k=input()

temp=k

k=0

while int(k)<int(temp):

print(a)

a=a+4

k=k+1

See more about python at brainly.com/question/13437928

Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input begins with an integer indicating the number of integers that follow. You can assume that the list will have at least 2 integers and fewer than 20 integers. Ex: If the input is: 5 10 5 3 21 2

Answers

Answer:

Follows are the code to the given question:

#include <iostream>//header file  

using namespace std;

int main() //main method

{

int nums[20];//defining an array

int n,i,k;//defining integer variables

cout<<"Enter total number you want to insert: ";//print message

cin>>n;//input value of n  

cout << "Enter array numbers: " << endl;//print message

for (i = 0;i<n;i++) //defining for loop for input values from user-end

{

   cin >> nums[i];//input values

}

for (i = 0; i < n;i++) //defining for loop for count array values

{

   for (k =i+1;k<n;k++)//defining for loop for arrange value in ascending  order  

   {

       if (nums[i] > nums[k])//checking first and second value

       {

           int t = nums[i];//defining integer variable that hold first element value in t

           nums[i] = nums[k];//holding second element value in first element

           nums[k] = t;//assign value in t

       }

   }

}

cout<<"Two smallest number in list are:";//print message

 for (i = 0; i <2; ++i)//defining for loop that prints first two smallest value  

     cout<<nums[i]<<" ";//print value

   return 0;

}

Output:

Enter total number you want to insert: 6

Enter array numbers:  

5

10

5

3

21

2

Two smallest number in list are:2 3  

Explanation:

In this code, an integer array "nums" is defined, and in the next step multiple integer variable is defined, that uses the for loop input value from the user-end, and in the next step, another two for loop is declared, that uses if block to arrange value into the ascending order at which it stores two smallest value in first and second position in the array element, and in the next step, it uses another for loop to print its element value.

Case Study Dr. Thomas Waggoner, an information systems professor at the local university, is at the Will Call window at the Medallion Theatre, trying to pick up tickets he had reserved. However, due to an oversight which turns out to be rather frequent, his tickets were sold to another patron. Fortunately for Dr. Waggoner and his wife, who are celebrating their wedding anniversary, the box office manager finds two box seats which had not been claimed. In talking with the box office manager, Dr. Waggoner starts thinking that he could perhaps help the theatre avoid this type of problem in the future. His students could design and build a system to help keep track of ticket sales, and hopefully help the theatre become more efficient and improve customer satisfaction. Q # 1 Write down the purpose of the given requirements HINT: purpose of a system? Q # 2 Write down the Modules and also extract the functional requirements of the given requirements? Q # 3 Create a use Case Diagram and Use cases of the above requirements? Q # 4 Create a Class Diagram and its GUI interfaces of the system? NOTE: Write down the caption on each interface.

Answers

Answer:

1. The primary purpose of a system is system development, analysis and design to avoid inappropriate and duplicate selling of theatre tickets.

2. The function requirements are development of a system which automatically reserves the ticket when a person books it and marks it appear booked for all the customers.

3. The customers can book the ticket through online system. The system then marks the ticket as unavailable for all the other customers until and unless the original customers cancels the ticket.

Explanation:

Dr. Waggoner had an issue with ticket booking as his booking was sold to another customer. This could lead him to a bad experience at theatre but since the box office manager assisted him with another available seats. This issue has been resolved with good faith but there can be problems in future where many customers can claim a single seat. To avoid this the theatre should introduce online booking system based on computer application which can be accessed by all the customers through website.

~Trivia~

Harry Potter Edition

Answer All Correct For Brainliest



What house does Harry Potter belong to in Hogwarts? __________________

What position does Harry Potter play in Quidditch? _____________________

Who is Fluffy? __________________

What does the Imperius Curse do? ___________

Answers

Answer:

What house does Harry Potter belong to in Hogwarts? Gryffindor __________________

What position does Harry Potter play in Quidditch? Seeker _____________________

Who is Fluffy? Hagrid's old cerberus __________________

What does the Imperius Curse do? ___________ places cursed under sorcer's control

Explanation:

I would like to thank SWANGOADRIANA for this answer and the ten points.

Convert Dec 185 to Binary Byte
Bit Position
8
7
6
5
4
3
2
1
Bit State
O or 1
Bit state
Value
128
64
32
16
00
4.
2
1
Bit Position
Value
Convert Dec 252 to Binary Byte.
Bit Position
8
7
6
5
4
3
2
1
Bit State
O or 1
Bit state
Value
128
64
32
16
8
4
2.
1
Bit Position
Value

Answers

Answer:

185 = 1011 1001

252 = 1111 1100

Explanation:

If you add the decimal values corresponding to the bit positions that are 1, you get your decimal number.

Animations
Animations are !
Blank which can be Applied to blank in a presentation?

Answers

Animation is a graphic element that depicts movement. Animations are visual effects applied to individual items on a slide

a program execution is called ​

Answers

a program execution is called a process

Explanation

In the process, they process the data and also execute the data.

What happen in process?

First the data came from input, then go to the memory. The process take the data from the memory and process it and divide it, if there's arithmetic data thingy it will go to ALU and the rest to CU. After the data finish being proceed, the data will be sent to CU and executed there, then send back to the memory and go to the output to be shown.

#Sorry my grammar sucks

#Moderators please don't be mean, dont delete my answers just to get approval from your senior or just to get the biggest moderation daily rank.

O
O ^__^
o (oo)\_______
(__)\ )\/\
||----w |
|| ||

Answers

Answer:?

Explanation: What is the question

What are the best legendary pokemon?

Answers

PICACHU PICACHUUUUUUUUUU

Answer:

Any EX

Any GX

Pikachu

Raichu

Mew Two

Charizard

Taurus

Gumshoos

Lurantis

Lapras

Incineroar

Dialga

Guzzlord

Lugia

Darkrai

Sigilyph

Xerneas

Explanation:

There are more but it takes a little while to get them all

Traffic flow analysis is classified as which?

Answers

Answer:

c. An active attack

d. A passive attack​

Explanation:

Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.

Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.  

Discuss the important role of remote sensing application in agriculture. Do you think that the use of remote sensing is applicable in the Philippines scenario? Why? Give some of the pros and cons of remote sensing.​

Answers

Answer:

Remote sensing gives the soil moisture data and helps in determining the quantity of moisture in the soil and hence the type of crop that can be grown in the soil. ... Through remote sensing, farmers can tell where water resources are available for use over a given land and whether the resources are adequate.

Pulling out specific differences


Answers

Answer:

Terms in this set (24) abstraction. Pulling out specific differences to make one solution work for multiple problems. algorithm. A list of steps to finish a task. binary. A way of representing information using only two options. bug. code. command. computational thinking. conditionals.

will give brainlyist

Which sentence in the following paragraph correctly describes mobile technology?
Mobile devices have become the main source of communication for many people around the world. However, businesses are still to capitalize on the wide reach mobile communication. Social media is being increasingly used in marketing research. Customized advertising can be integrated based on specific users' location. Smartphones do not have videoconferencing capabilities that is becoming a major business tool.

Answers

i think its the first sentence: Mobile devices have become the main source of communication for many people around the world

if im wrong im dum ;-;

Answer:

Customized advertising can be integrated based on specific users location.

Explanation:

Right for Plato/edmentum

Do you know the energy unit question?

Answers

Answer:

Fossil Fuels

Explanation:

Liquid-liquid extraction is best suited to separate a mixture of compounds when:
A. The mixture contains compounds with similar polarities but different solubilities.
B. The mixture contains compounds with similar solubilities but different molecular weights.
C. The mixture contains compounds with similar melting points but different polarities.
D. The mixture contains compounds with similar molecular weight but different polarities.
E. The mixture contains compounds with similar molecular weight but different melting points.

Answers

Answer:

A. The mixture contains compounds with similar polarities but different solubilities.

Explanation:

Liquid – Liquid (LLE) extraction is a process for the isolation of compounds or metal complexes, also known as solvent extraction and partitioning, based on their relative solubility in two distinct liquids, generally water- (polar) liquids and an organic solvent (non-polar). Net transition from a liquid to a liquid process of one or more species, normally from aqueous to organic.

In MIPS, all operation codes (op-codes) use ______ only.

A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits

Answers

Answer:

5 bits

Explanation:

ue82ijevw8ey जभछतड।णृबदजठणब

how can you say that a painting is real? ​

Answers

Answer:Know the Artist. Prior to buying an artist's work, become familiar with their oeuvre. ...

Use a Magnifying Glass. Looking at the surface of a painting with a magnifying glass is one of the best ways to spot a print. ...

Turn the Painting Over.

Explanation:brainliest

See from the way they paint. You can see from the picture that its way different. Each artist has different way to paint. see the colour also

Suppose the message 111010 is to be transmitted (beginning with the leftmost bit) using
CRC with generator polynomial X 4 +X+1.
Determine the entire message that would be transmitted. Show all your work. Also show how receiver will check and confirm that there is no transmission error.

Answers

Answer:

Explanation:

Given that:

generator polynomial = x⁴ + x + 1

This form can be expressed in binary form as:

[tex]= 1 *x^4 + 0*x^3 +0*x^2 + 1*x^1 + 1*x^0[/tex]

= 1             0           0           1            1

=10011

The given message = 111010

Now, we can see that the length of the polynomial generator = 5

The next thing to do is to add (5-1) = 4 0's to the given message end

i.e. message = 1110100000

The next process is to divide the message with the generator to deduce the remainder which ill be added to the message for us to create a transmitted message

10011║1110100000║111

          10011              

           1 1 100

          1 0011              

              1 1 1 1 0

             1 001 1                  

                1 1 0 1 0

                1 0 01 1              

                  1 0 010

                 1 0 01 1              

                     0 010     → Remainder

∴ Transmitted message = 1 1 1 0 1 0 0 0 0 0

                                                           0 0 1 0

                                           [tex]1 \ 1 \ 1 \ 0 \ 1 \ 0 \ 0 \ 0 \ 1 \ 0[/tex]

To check and confirm that the message transmitted is correct at the receiver's end, we have to divide the transmitted message with the generator.

So, if the end result of the remainder is 0, then the message is correct, otherwise incorrect.

10011║1110100000║1111

          10011              

           1 1 100

          1 0011              

              1 1 1 1 0

             1 001 1                  

                1 1 0 1 0

                1 0 01 1              

                  1 0 010

                 1 0 01 1              

                     00000     → Remainder

Hence, the received message is correct.

write the html to place an image called prime logo.gif on a web page. The image is 100 pixel high by 65- pixel wide

Answers

Answer:

Um, HOW??????????????¿??

Cloud computing security risks

Answers

Answer:

Risks:

Network issues or outages caused by attackers can limit or completely deny access to data stored in the cloud

Attackers could find an exploit and steal company data without ever physically touching the company's computer.

That's what I can think of.

Explanation:

Example of vector image format​

Answers

Answer:

JPEGs, GIFs and PNGs are common raster image types. ...

Vector images, alternatively, allow for more flexibility. Constructed using mathematical formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF* are excellent for creating graphics that frequently require resizing.

1.2.6: Anonymity Reflection

1) What are some reasons a person might choose to remain anonymous on the Internet?

2) What are some harmful outcomes that stem from Internet anonymity?

3) Do you think that people have a “right” to remain anonymous online? Why or why not?

Answers

Answer:

1. they are too afraid to say it in person or are afraid of getting in trouble if they give their identity.

2.more cyber crimes committed and no filter for what is okay to say or not as they have the security no one knows who they are.

3. yes because you may not want your full personal info out there even though negative outcomes could occur from anonymity

There are several reasons why a person might choose to remain anonymous on the internet, including: privacy, security, Whistleblowing, etc.

What is Internet anonymity?

Internet anonymity is the capacity of a person to remain unidentified and anonymous online, generally through concealing or obfuscating their real identity.

A person could decide to remain anonymous on the internet for a number of reasons, such as:

Concerns about privacy: People might prefer to keep their internet activities or personal information hidden, especially if they are discussing sensitive or divisive viewpoints.Safety worries: Some people could feel unsafe or vulnerable if they reveal their identify online, especially if they have previously been the target of abuse or threats.Whistleblowing: In order to protect themselves from retaliation, those who seek to bring attention to wrongdoing or unlawful activity may decide to remain anonymous.

Internet anonymity can have a number of negative effects, such as:

Online bullying and harassment.Misinformation and hate speech propagation.Absence of responsibility.

Some contend that anonymity is an essential part of free speech and expression and that people should have the freedom to share their thoughts without worrying about being judged or subjected to retaliation.

Thus, these are some harmful outcomes that stem from Internet anonymity.

For more details regarding internet anonymity, visit:

https://brainly.com/question/13264093

#SPJ2

A computer connected to the internet that ask for data is a

Answers

Answer:

Client

Explanation:

When your computer is connected to the internet it is always asking and sending data. Your computer is the client which recieves the data from the sever.

In what way, if any, is a model different from a simulation?


Models are types of simulations that transform data sets into scenarios.

Models and simulations are completely different in that they achieve different results.

Models and simulations are essentially identical—they are two terms that describe the same thing.

Models are types of simulations that create ideal workers and members of leadership.

Answers

Answer:

Models and Simulations are completely different in that they achieve diffenet results.

Explanation:

Modeling is the act of building a model. A simulation is the process of using a model to study the behavior and performance of an actual or theoretical system. In a simulation, models can be used to study existing or proposed characteristics of a system. ... Simulating is the act of using a model for a simulation.

Answer:

Models are types of simulations that transform data sets into scenarios

Explanation:

Model - computer models take complex data sets and transform them into real-life simulations

Other Questions
A person riding a bike has a mass of 55kg. They are moving with a velocity of 2m/s. What is the Kinetic Energy of the person? Transforma los siguientes nmeros cardinales en ordinales.Quatre ______________________Dix neuf _____________________Huit ________________________Quinze ______________________Vingt _______________________porfis ayuda Of the flowers in Bellas garden, 5/8 are tulips. What percent of the flowers in the garden are tulips? hurry i need help plz What would be the final temperature if you mixed a liter of 40C water with 2 liters of 20C water? In a study of 16 couples, the wives had to lie in an MRI machine, periodically receiving a mild but stressful electric shock on the ankle. During the procedure, some women held the hand of a stranger; others held hands with their husbands. The women who held their husbands' hands, compared to the women who held a stranger's hand, had A mouse ran 25 meters in 5 seconds, stopped for 10 seconds to eat a piece of cheese, and finally ran another 5 seconds a distance of 15 meters to its home. Calculate the average speed of the mouse. Part B: which of the following quotations supports the answer to part A it takes Joaquin 1/3 hour to hike 1/2 mile. What is Joaquin's speed in miles per hour?PLEASE DO IT FAST I WILL GIVE FIVE SATR AND BRAINLIEST ?? Please help Im confused Based on the absolute dating of the rock layers in this photograph, whatcould a scientist conclude about a fossil found in area A? 1.4 millionyears2.1 millionyearsDA. It is between 1.4 million and 2.1 million years old.B. It is less than 1.4 million years old.0 C. It is more than 2.1 million years old.D. It is exactly 1.4 million years old. Based on both the article "Private! Keep Out!" and the Supreme Court case summary, evaluate the Supreme Court's reasoning. Do you think the ruling is just? Why or why not? Use information from the sources to support your answer. 8 Roj bought some sweets. He gave 2/3of the sweets to his friendsand had 5 sweets left. How many sweets did Raj buy?units = I NEED THIS NOW 20 PTS Irene's family enjoys camping in southern California. One winter week they camp at Newport Beach, where they need to wear light jackets at night. The next week, they camp at Big Bear in the mountains and need to wear heavy jackets at night. and the climate region of each location. 9.Write an application that computes and displays the day on which you become (orbecame) 10,000 days old. Save the application as Ten ThousandDaysOld.java.TI i will give brainliest and also 10$ Three friends go to a book fair. Allen spends $2.40. Maria spends 4 times as much as Allen. Akio spends $3.45 less than Maria. How much does Akio spend? Akio spends $ at the book fair. porfavor aydame no entiendo esto trabaj* en el siguiente problema anteriormente en la unidad ahora utiliza el proceso de seis pasos para resolver problemas deber configurar un sistema de ecuaciones utilic un enfoque grfico para resolver sistemas.* tienes 14 monedas en tu bolsillo que son 25 centavos o 5 centavos el valor total de las monedas es de $2.50 cuantas monedas de cada tipo tienes? Jason is preparing to write a persuasive argument paper on the treatment of female characters Oftentimes you will need to infer theof information. Select all that apply.meaningimplication purposemain ideas