"Write a VBA function that changes the cell value of E3. Create a button on sheet 4 to increase the value by 1. Name this button "Higher". Then create a button below it that will decrease the number by 1 and name it "Lower". Save the function so we can review it."

Answers

Answer 1

Answer:

Please follow the steps

1) Open excel

2) Go to Developer Tools

3) Click on "Insert" and then under "ActiveX Controls", click on command button on extreme left.

4) Create two buttons and name them "Higher" and "Lower"

5) Double click on the button which you have named "Higher".

6) A new window will be opened where you have to put the code "Range("E3").Value = Range("E3").Value + 1".

7) Minimize the window and turn off the "Design View"

8) Put any value in E3 to verify the working and click the button named "Higher".

9) Perform the same steps for the button which you have  named "Lower" and put the code "Range("E3").Value = Range("E3").Value - 1".

N.B: If you don't see the developer tools on the top. Click on the File menu and then select Options from the drop down menu. Excel Options window will appear.click on the Customize Ribbon option which you will see on the left. Click on the Developer checkbox under the list of Main Tabs on the right. Then click on the OK button.

Explanation:


Related Questions

Bernard has a visual disability. Which type of assistive technology would he use to access print on the chalkboard or overhead screen?

Answers

Answer:

a tactile input device

Explanation:

Based on the scenario being described it can be said that the best assistive technology for Bernard would be a tactile input device. Such a device would allow Bernard to physically interact with the print on the chalkboard or overhead screen from the device itself without having to actually get close to the chalkboard or screen. Thus allowing him to view its content from the palm of his hand.

Assume 151 and 214 are signed 8-bit decimal integers stored in two’s complement format. Calculate 151 + 214 using saturating arithmetic. The result should be written in decimal. Show your work

Answers

Answer:

-128

Explanation:

[tex](151)_{10}[/tex]

We have to convert this decimal number into the binary number

[tex](10010111) _{2}[/tex]

Performing the 2's complement number so we have to subtract 1 from this

[tex]10010111 -1 \\=(10010110)_{2}[/tex]

Now to getting the original number we have to complement the previous number it means convert 1 ->0 and 0 -> 1

[tex](10010110)_{2} ---->(01101001)_{2}[/tex]

The previous number is converted binary to decimal we get ,

[tex](01101001)_{2}=(105) _{10}[/tex]

-105(According to the rule of 2's complement )

Similarly same process will apply on the [tex](214)_{10}[/tex]

We have to convert this decimal number into the binary number

[tex](11010110)_{2}[/tex]

Performing the 2's complement number so we have to subtract 1 from this

[tex]11010110 - 1 =(11010101)_{2}[/tex]

Now to getting the original number we have to complement the previous number it means convert 1 ->0 and 0 -> 1

[tex](11010101)_{2}---------> (00100101)_{2}[/tex]

The previous number is converted binary to decimal we get ,

[tex](00100101)_{2}------->(42)_{10}[/tex]

-42(According to the rule of 2's complement )

Therefore the result is

151 + 214

=(-105 + (-42)

=-147

Hence the -147 is smaller then -128 that is smaller 8 bit signed integer is Therefore result is : -128

Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.Sample program:#include const double GAS_CONST = 8.3144621;int main(void) { double gasPressure = 0.0; double gasMoles = 0.0; double gasTemperature = 0.0; double gasVolume = 0.0; gasPressure = 100; gasMoles = 1 ; gasTemperature = 273; gasVolume = ComputeGasVolume(gasPressure, gasTemperature, gasMoles); printf("Gas volume: %lf m^3\n", gasVolume); return 0;}

Answers

Answer:

double ComputeGasVolume(double pressure, double temperature, double moles){

   double volume = moles*GAS_CONST*temperature/pressure;

    return volume;        

}

Explanation:

You may insert this function just before your main function.

Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles

Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?

Answers

Answer:

third ighjojdudjz

ghddduewjj

wkckdjjj

Explanation:

cchmddkhwmx

ndhdnahdd

jruditndjed

Convert +41.50 in a IEEE 754 single precision format.
Convert - 72.125 in a IEEE 754 double precision format.

Answers

Answer:

+41.50 = 0 10000100 01001100000000000000000  [single precision]

-72.125 = 1 10000000101 0010000010000000000000000000000000000000000000000000 [double precision]

Explanation:

(I) +41.50 using single precision

Follow the following steps:

(a) Single precision has 32 bits in total and is divided into three groups: sign (has 1 bit), an exponent (has 8 bits) and a mantissa (also called fraction, has 23 bits)

(b) Divide the number (41.50) into its whole and decimal parts:

Whole = 41

Decimal = 0.50

(c) Convert the whole part to binary:

2    |    41

2    |    20 r 1

2    |    10 r 0

2    |    5 r 0

2    |    2 r 1

2    |    1 r 0

     |    0 r 1

Reading upwards gives 41 = 101001₂

(d) Convert the decimal part to binary:

0.50 x 2 = 1.0  = 1 [number in front of decimal]

0.0 x 2 = 0.0 = 0  [number in front of decimal]

Reading downwards gives 0.5 = 10₂

(e) Put the two parts together as follows;

    101001.10₂

(f) Convert the result in (e) to its base 2 scientific notation:

Move the decimal to just before the leftmost bit as follows;

1.0100110

In doing so, we have moved over 5 numbers to the left. Therefore, the exponent is 5. Moving to the left gives a positive exponent while moving to the right gives a negative exponent.

Altogether we have;

1.0100110 x 2⁵

(g) Determine the sign bit of the number and display in binary: Since the number +41.50 is positive, the sign bit is 0.

(h) Determine the exponent bits.

Since this is a single precision conversion, the exponent bias is 127.

To get the exponent we add the exponent value from (e) to the exponent bias and get;

5 + 127 = 132

(i) Convert the exponent to binary:

2    |    132

2    |    66 r 0

2    |    33 r 0

2    |    16 r 1

2    |    8 r 0

2    |    4 r 0

2    |    2 r 0

2    |    1 r 0

     |    0 r 1

Reading upwards gives 132 = 10000100₂

(j) Determine the mantissa bits:

The mantissa is the rest of the number after the decimal of the base 2 scientific notation found in (f) above.

0100110 from 1.0100110 x 2⁵                  [Just remove the leftmost 1 and the decimal point]

(k) Combine the three parts: sign bit (1 bit), exponent bits (8 bits) and mantissa bits (23 bits)

sign bit = 0                [1 bit]

exponent bits = 10000100        [8 bits]

mantissa bits = 0100110        [7 out of 23 bits]

Then fill out the remaining part of the mantissa with zeros to make it 23 bits.

mantissa bits = 01001100000000000000000        

Putting all together we have

0 10000100 01001100000000000000000 as +41.50 in  a IEEE 754 single precision format.

(II) -72.125 using double precision

Follow the following steps:

(a) Double precision has 32 bits in total and is divided into three groups: sign (has 1 bit), an exponent (has 11 bits) and a mantissa (also called fraction, has 52 bits)

(b) Divide the number (72.125) into its whole and decimal parts:

Whole = 72

Decimal = 0.125

(c) Convert the whole part to binary:

2    |    72

2    |    36 r 0

2    |    18 r 0

2    |    9 r 0

2    |    4 r 1

2    |    2 r 0

2    |    1 r 0

     |    0 r 1

Reading upwards gives 72 = 1001000₂

(d) Convert the decimal part to binary:

0.125 x 2 = 0.25  = 0 [number in front of decimal]

0.25 x 2 = 0.50 = 0  [number in front of decimal]

0.50 x 2 = 1.00 = 1  [number in front of decimal]

0.00 x 2 = 0.00 = 0  [number in front of decimal]

Reading downwards gives 0.125 = 0010₂

(e) Put the two parts together as follows;

    1001000.0010₂

(f) Convert the result in (e) to its base 2 scientific notation:

Move the decimal to just before the leftmost bit as follows;

1.0010000010

In doing so, we have moved over 6 numbers to the left. Therefore, the exponent is 6. Moving to the left gives a positive exponent while moving to the right gives a negative exponent.

Altogether we have;

1.0010000010 x 2⁶

(g) Determine the sign bit of the number and display in binary: Since the number -72.125 is negative, the sign bit is 1.

(h) Determine the exponent bits.

Since this is a double precision conversion, the exponent bias is 1023.

To get the exponent we add the exponent value from (e) to the exponent bias and get;

6 + 1023 = 1029

(i) Convert the exponent to binary:

2    |    1029

2    |    514 r 1

2    |    257 r 0

2    |    128 r 1

2    |    64 r 0

2    |    32 r 0

2    |    16 r 0

2    |    8 r 0

2    |    4 r 0

2    |    2 r 0

2    |    1 r 0

     |    0 r 1

Reading upwards gives 1029 = 10000000101₂

(j) Determine the mantissa bits:

The mantissa is the rest of the number after the decimal of the base 2 scientific notation found in (f) above.

0010000010 from 1.0010000010 x 2⁶                  [Just remove the leftmost 1 and the decimal point]

(k) Combine the three parts: sign bit (1 bit), exponent bits (11 bits) and mantissa bits (52 bits)

sign bit = 1                [1 bit]

exponent bits = 10000000101    [11 bits]

mantissa bits = 0010000010        [10 out of 52 bits]

Then fill out the remaining part of the mantissa with zeros to make it 52 bits.

mantissa bits = 0010000010000000000000000000000000000000000000000000

Putting all together we have

1 10000000101 0010000010000000000000000000000000000000000000000000 as -72.125 in  a IEEE 754 double precision format.

Write code to create a list of numbers from 0 to 67 and assign that list to the variable nums. Do not hard code the list. Save & RunLoad HistoryShow CodeLens

Answers

Answer:

The program written in Python is as follows

nums = []

for i in range(0,68):

-->nums.append(i)

print(nums)

Explanation:

Please note that --> is used to denote indentation

The first line creates an empty list

nums = []

This line creates an iteration from 0 to 67, using iterating variable i

for i in range(0,68):

This line saves the current value of variable i into the empty list

nums.append(i)

At this point, the list has been completely filled with 0 to 67

This line prints the list

print(nums)

Now, search for similar information on at least two other web sites, including Mayo Clinic (mayoclinic.org) and WebMD (webmd). Is the information provided by these sites consistent with what you found on the CDC web site?

Answers

Answer:

No

Explanation:

The other websites provide very detailed information, when you search the same information that is mentioned at CDC website. The information related to causes and symptoms of brain injuries is similar on both the websites. The reliability of information provided on other websites is questioned. These websites provide a lot of information and it is sometimes time consuming to find the relevant information.

In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?

Answers

Answer:

The answer is "It uses the section access with in the qlikview script".

Explanation:

QlikView is now QlikSense, it comes with section access, that protects against this danger. It a way of determining, which can display certain details, it is also known as objects, that can be displayed by whom and out of which domain, etc.

It can also be configured using the publishing of the company. In the data load script, users can use section access to maintain security.  It uses the data for authentication and authorization within segment access and automatically decreases the information, such that users only have their information.

There are different aspect of  security mechanism. The security mechanism that one does find the file containing data of the users/user groups have inbuilt security is that  the section access with in the qlikview script".

There are different mechanisms that is often used to secure the Web.  This is made of the mechanisms that is often used to apply security and they includes virtual private networks (VPNs), encryption, firewalls, routing filters, etc.

Note that a security mechanism in QlikView is often set up in two distinct ways or means, This can be done by building it into the QlikView document script, or by setting it up via the use of QlikView Publisher.

Learn more about Security mechanism from

https://brainly.com/question/14378794

When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate

Answers

Answer:

Verifying digital signature

Explanation:

In order to guarantee authenticity of digital messages an documents, the certificate authority will perform the verification of the digital signature. A valid digital signature indicates that data is coming from the proper server and it has not been altered in its course.

ICMP
(a) is required to solve the NAT traversal problem
(b) is used in Traceroute
(c) has a new version for IPv6
(d) is used by Ping

Answers

Answer:

(b) is used in Traceroute

(d) is used by Ping

Explanation:

ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;

i. Requested service is not available

ii. Host could not be reached

ICMP does not use ports. Rather it uses types and codes. Some of the most common types are echo request and echo reply.

Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as Time Exceeded) to trace a network route.

Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP echo request packets to the host and then waits for an ICMP echo reply from the host.

ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.

I have tried looking for this answer everywhere, and I could not find the answer

I have a Windows 10 Laptop, with a 12GB RAM Card, okay? I also have my 1TB Disk Partitioned so that I have 3 Disks. 2 of them are my primary, both of those are 450GB apiece. The last one ([tex]Z:[/tex]) I named "RAM" and set that one to 100GB.

How do I turn the drive [tex]Z:[/tex] into strictly RAM?
I already did the Virtual Memory part of it, but I was wondering if I can make it strictly RAM so the system uses drive [tex]Z:[/tex] before using the RAM disk? If it is not possible, I'm sorry.

Answers

If my computer has 4 gigabytes of ram memory then I have 4e+9 bytes of memory.  I think-

Answer: That isn't a software problem, its a hardware problem. There is a difference between 12gb of ram versus 100 gb of HDD. Ram is temporary storage, you can not turn SSD or HDD storage into RAM. If you are a gamer, STEER AWAY FROM LAPTOPS, DO NOT BUY A GAMING LAPTOP. Either buy a DESKTOP (or build) or a console. They give more performance for the price and they are easily upgradable. Not many people can open up a laptop and put in more RAM because the hardware is incredibly small.

SONET is the standard describing optical signals over SMF, while SDH is the standard that describes optical signals over MMF fiber.
A. True
B. False

Answers

Answer:

False.

Explanation:

SONET is an acronym for synchronous optical networking while SDH is an acronym for synchronous digital hierarchy. They are both standard protocols used for the transmission of multiple digital bit streams (multiplex) synchronously through an optical fiber by using lasers.

Hence, both SONET and SDH are interoperable and typically the same standard protocols in telecommunication networks. Also, the SONET is a standardized protocol that is being used in the United States of America and Canada while SDH is an international standard protocols used in countries such as Japan, UK, Germany, Belgium etc.

The synchronous optical networking was developed in 1985 by Bellcore and it was standardized by the American National Standards Institute (ANSI). SDH was developed as a replacement for the plesiochronous digital hierarchy (PDH).

Generally, SONET comprises of four functional layers and these are;

1. Path layer

2. Line layer.

3. Section layer.

4. Physical or Photonic layer.

The SDH comprises of four synchronous transport modules and these are;

1. STM-1: having a basic data rate of 155.52Mbps.

2. STM-4: having a basic data rate of 622.08Mbps.

3. STM-16: having a basic data rate of 2488.32Mbps.

4. STM-64: it has a basic data rate of 9953.28Mbps.

These two standard telecommunications protocols are used to transmit large amounts of network data over a wide range through the use of an optical fiber.

Driving is expensive. Write a program with a car's miles/gallon (as float), gas dollars/gallon (as float), the number of miles to drive (as int) as input, compute the cost for the trip, and output the cost for the trip. Miles/gallon, dollars/gallon, and cost are to be printed using two decimal places. Note: if milespergallon, dollarspergallon, milestodrive, and trip_cost are the variables in the program then the output can be achieved using the print statement: print('Cost to drive {:d} miles at {:f} mpg at $ {:.2f}/gallon is: $ {:.2f}'.format(milestodrive, milespergallon, dollarspergallon, trip_cost)) Ex: If the input is: 21.34 3.15

Answers

Answer:

milespergallon = float(input())

dollarspergallon = float(input())

milestodrive = int(input())

trip_cost = milestodrive / milespergallon * dollarspergallon

print('Cost to drive {:d} miles at {:f} mpg at $ {:.2f}/gallon is: $ {:.2f}'.format(milestodrive, milespergallon, dollarspergallon, trip_cost))

Explanation:

Get the inputs from the user for milespergallon, dollarspergallon and milestodrive

Calculate the trip_cost, divide the milestodrive by milespergallon to get the amount of gallons used. Then, multiply the result by dollarspergallon.

Print the result as requested in the question

Answer:

def driving_cost(driven_miles, miles_per_gallon, dollars_per_gallon):

  gallon_used = driven_miles / miles_per_gallon

  cost = gallon_used * dollars_per_gallon  

  return cost  

miles_per_gallon = float(input(""))

dollars_per_gallon = float(input(""))

cost1 = driving_cost(10, miles_per_gallon, dollars_per_gallon)

cost2 = driving_cost(50, miles_per_gallon, dollars_per_gallon)

cost3 = driving_cost(400, miles_per_gallon, dollars_per_gallon)

print("%.2f" % cost1)

print("%.2f" % cost2)

print("%.2f" % cost3)

Explanation:

Write a program that create Employee class with fields id,name and sal and create Employee object and store data and display that data.

Answers

Answer:

Here is the C++ program for Employee class with fields id,name and sal.

#include <iostream>  // to use input output functions

#include <string>  //to manipulate and use strings

using namespace std;   // to access objects like cin cout

class Employee {  //class Employee

private:  

/* the following data members are declared as private which means they can only be accessed by the functions within Employee class */

  string name;  //name field

  int id; //id field

  double sal;   //salary field

public:    

  Employee();  // constructor that initializes an object when it is created

/* setName, setID and setSalary are the mutators which are the methods used to change data members. This means they set the values of a private fields i.e. name, id and sal */

  void setName(string n)  //mutator for name field

     { name = n; }        

  void setId(int i)  //mutator for id field

     { id = i; }        

  void setSalary(double d)  //mutator for sal field

     { sal = d; }  

/* getName, getID and getSalary are the accessors which are the methods used to read data members. This means they get or access the values of a private fields i.e. name, id and sal */

  string getName()  //accessor for name field

     { return name; }        

  int getId()  //accessor for id field

     { return id; }        

  double getSalary()  //accessor for sal field

     { return sal; }  };  

Employee::Employee() {  //default constructor where the fields are initialized

  name = "";  // name field initialized

  id = 0;  // id field initialized to 0

  sal = 0;   }   // sal field initialized to 0

void display(Employee);  

// prototype of the method display() to display the data of Employee

int main() {  //start of the main() function body

  Employee emp;  //creates an object emp of Employee class

/*set the name field to Abc Xyz which means set the value of Employee class name field to Abc Xyz  through setName() method and object emp */

  emp.setName("Abc Xyz");  

/*set the id field to 1234 which means set the value of Employee class id field to 1234  through setId() method and object emp */

  emp.setId(1234);

/*set the sal field to 1000 which means set the value of Employee class sal field to 1000  through setSalary() method and object emp */

  emp.setSalary(1000);    

  display(emp);  }   //calls display() method to display the Employee data

void display(Employee e) {  // this method displays the data in the Employee //class object passed as a parameter.

/*displays the name of the Employee . This name is read or accessed through accessor method getName() and object e of Employee class */

  cout << "Name: " << e.getName() << endl;  

/*displays the id of the Employee . This id is read or accessed by accessor method getId() and object e */

  cout << "ID: " << e.getId() << endl;

/*displays the salary of the Employee . This sal field is read or accessed by accessor method getSalary() and object e */

  cout << "Salary: " << e.getSalary() << endl;  }

Explanation:

The program is well explained in the comments mentioned with each statement of the program.

The program has a class Employee which has private data members id, name and sal, a simple default constructor Employee(), mutatator methods setName, setId and setSalary to set the fields, acccessor method getName, getId and getSalary to get the fields values.

A function display( ) is used to display the Employee data i.e. name id and salary of Employee.

main() has an object emp of Employee class in order to use data fields and access functions defined in Employee class.

The output of the program is:

Name: Abc Xyz                                                                                                      

ID: 1234                                                                                                                  

Salary: 1000

The program and its output are attached.

Identify the spreadsheet tool that is used to determine the optimal solution to a problem with multiple constraints.
a. Excel scenario manager
b. Excel Solver
c. Excel filter
d. Excel chart

Answers

Answer:

Excel Solver

Explanation:

The goal of what technology research is to provide solutions to physical and health related problems

Answers

Answer:Crisis-mapping

Explanation:

Answer:

Crisis Mapping

Explanation:

in java how do i Write a method named isEven that accepts an int argument. The method should return true if the argument is even, or false otherwise. Also write a program to test your method.

Answers

Answer:============================================

//Class header definition

public class TestEven {

   

   //Method main to test the method isEven

   public static void main(String args[ ] ) {

       

       //Test the method isEven using numbers 5 and 6 as arguments

       System.out.println(isEven(5));

       System.out.println(isEven(6));

     

   }

   

   //Method isEven

   //Method has a return type of boolean since it returns true or false.

   //Method has an int parameter

   public static boolean isEven(int number){

       //A number is even if its modulus with 2 gives zero

      if (number % 2 == 0){

           return true;

       }

       

       //Otherwise, the number is odd

       return false;

   }

}

====================================================

Sample Output:

=========================================================

false

true

==========================================================

Explanation:

The above code has been written in Java. It contains comments explaining every part of the code. Please go through the comments in the code.

A sample output has also been provided. You can save the code as TestEven.java and run it on your machine.

Methods are collections of named program statements that are executed when called or evoked

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

   public static void main(String args[ ] ) {

       //This creates a Scanner Object

       Scanner input = new Scanner(System.in);

       //This gets input for the number

       int num = input.nextInt();

       //This calls the function

       System.out.println(isEven(num));

  }

  public static boolean isEven(int num){

      //This returns true, if num is even

      if (num % 2 == 0){

          return true;

      }

      //This returns false, if otherwise

      return false;

  }

}

Read more about methods at:

https://brainly.com/question/20442770

What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation?

Answers

Answer:

Linked lists and arrays are both linear data structures but while an array is a collection of items that can be accessed randomly, a linked list can be accessed sequentially.

A sparse matrix contains very few non-zero elements. For example;

_                        _

|  0   0   3  0  6    |

|   0   5   0  0  4   |

|   2   0   0  0  0   |

|_ 0   0   0  0  0 _|

In the implementation of a sparse matrix, the following are some of the pros and cons of using a linked list over an array;

PROS

i.  Linked lists are dynamic in nature and are readily flexible - they can expand and contract without having to allocate and/or de-allocated memory compared to an array where an initial size might need to be set and controlled almost manually. This makes it easy to store and remove elements from the sparse matrix.

ii. No memory wastage. Since the size of a linked list can grow or shrink at run time, there's no memory wastage as it adjusts depending on the number of items it wants to store. This is in contrast with arrays where you might have unallocated slots. Also, because the zeros of the sparse matrix need not be stored when using linked lists, memory is greatly conserved.

CONS

i. One of the biggest cons of linked lists is the difficulty in traversing items. With arrays, this is just of an order of 0(1) since the only requirement is the index of the item. With linked lists, traversal is sequential which means slow access time.

ii. Storage is another bottle neck when using linked lists in sparse matrix implementation. Each node item in a linked list contains other information that needs to be stored alongside the value such as the pointer to the next or previous item.

Write a program that read two numbers from user input. Then, print the sum of those numbers.

Answers

Answer:

#This is in Python

number1 = raw_input("Enter a number: ")

number2 = raw_input("Enter another number: ")

sum = float(number1) + float(number2)

print(sum)

Explanation:

"Inheritance is the process by which a new class - known as a _________ - is created from another class, called the _____________. "

Answers

Answer:

child class

parent class

Explanation:

"Inheritance is the process by which a new class - known as a __child class__ - is created from another class, called the __parent class__. "

It is acceptable to create two TCP connections on the same server/port doublet from the same client with different port numbers.
A. True
B. False

Answers

the answer is a. true
I think the answer is A

In Web design, What kind of tag is referred to as fixed ?

Answers

Answer:

Most HTML tags are fixed

Explanation:

There are various kind of technology one can use for designing web application. A web designer should know HTML, CSS and other basic building block of web development.

HTML meaning hypertext markup language is used to define the basic structure of a web page . HTML has tags which are used to declare the contents on the web page. The tags includes anchor(<a>), paragraph tag(<p>),header tag(<h1>).

CSS which is known as Cascading style sheet describes the presentation of the web pages.

Other tags in HTML includes <img>, <link>, <ul>  etc and generally this tags are HTML tags which are fixed for a particular kind of job . For example you can't use an image tag <img>   to enclose video instead you use a video tag <video> tag. The header tag <h1> cannot be represented like a paragrapgh tag<p> on the web page. The both of them serve specific purpose and are fixed.  

Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write your code so that it works no matter how many items are in the list.

Answers

Answer:

Following is the program in python programming language

sports = [14, 25, 32, 63, 79, 38, -10] #list sports  

print("The original list is : " + str(sports)) #display original list

last = sports[-3:] #extracts the last 3 items from the list

print("The last 3 elements of list is : " + str(last)) #display the last 3 item

Output:

The original list is  : [14, 25, 32, 63, 79, 38, -10]

The last 3 elements of list is: [79, 38, -10]

Explanation:

Following are the description of program

Declared and initialized the items in the list "sports".After that display the list "sports" by using str function in the python language sports[-3: this will extract the last 3 three items in the list and store the result in the last variable .Finally display the last variable it will print the last 3 element in the list


Enter key is also known as Return key. (True or false)

Answers

Answer:

I think false

hope it helps

Answer:

False

Explanation:

The return key is the backspace or escape key.

Hope it helps.

Write a program that displays the values in the list numbers in ascendingorder sorted by the sum of their digits.

Answers

Answer:

Here is the Python program.

def DigitList(number):  

   return sum(map(int, str(number)))  

 

list = [18, 23, 35, 43, 51]  

ascendList = sorted(list, key = DigitList)  

print(ascendList)

Explanation:

The method DigitList() takes value of numbers of the list as parameter. So this parameter is basically the element of the list. return sum(map(int, str(number)))  statement in the DigitList() method consists of three methods i.e. str(), map() and sum(). First the str() method converts each element of the list to string. Then the map() function is used which converts every element of list to another list. That list will now contain digits as its elements. In short each number is converted to the string by str() and then the digit characters of each string number is mapped to integers. Now these digits are passed to sum() function which returns the sum. For example we have two numbers 12 and 31 in the list so each digit is 1 2 and 3 1 are added to get the sum 3 and 4. So now the list would have 3 4 as elements.

Now list = [18, 23, 35, 43, 51] is a list of 5 numbers. ascendList = sorted(list, key = DigitList)  statement has a sorted() method which takes two arguments i.e. the above list and a key which is equal to the DigitList which means that the list is sorted out using key=DigitList. DigitList simply converts each number of list to a another list with its digits as elements and then returns the sum of the digits. Now using DigitList method as key the element of the list = [18, 23, 35, 43, 51] are sorted using sorted() method. print(ascendList) statement prints the resultant list with values in the list in ascending order sorted by the sum of their digits.

So for the above list [18, 23, 35, 43, 51] the sum of each number is 9 ,5, 8, 7, 6 and then list is sorted according to the sum values in ascending order. So 5 is the smallest, then comes 6, 7, 8 and 9. So 5 is the sum of the number 23, 6 is the sum of 51, 7 is the sum of 43, 8 is the sum of 35 and 9 is the sum of 18. So now after sorting these numbers according to their sum the output list is:

[23, 51, 43, 35, 18]                                                                                                          

Suppose that you have a class called Student that is defined in student.h file. The class is in a namespace called fhsuzeng. Fill in the following blanks for the structure of the header file student.h.

#ifndefine STUDENT_H
______________
namespace _______
{
___________Student
{
};
}
_____________________

Answers

Answer:

u r

Explanation:

dumb

An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours, plus any overtime pay. Overtime pay equals the total overtime hours multiplied by 1.5 times the hourly wage. Write a program that takes as inputs the hourly wage, total regular hours, and total overtime hours and displays an employee’s total weekly pay.

Answers

Answer:

Assuming this is Python, I would do something like the following:

Explanation:

hourWage= float(input ("What is your hourly wage?: "))

regularHours= float(input ("How many regular hours did you work this week?: "))

overtimeHours= float(input ("How many overtime hours did you have this week?: "))

overtimeWage= (1.5*hourWage)

totalWeeklyPay= (hourWage*regularHours)+(overtimeHours*overtimeWage)

print= ("Your total weekly pay is: " ,totalWeeklyPay)

I hope this works!

Following are the program to calculate weeklyPay value:

Program Explanation:

Defining a variable "Wage, Hour, Hours" that uses the float with the input method to take float value from the user-end.After input value, a "weeklyPay" is declared that calculates the value by the formula.After calculating the value a print method is declared that prints its calculated value.

Program:

Wage = float(input("Enter hourly wage: "))#defining a variable Wage that inputs float value

Hour = float(input("Enter total number of regular hours: "))#defining a variable Hour that inputs float value

Hours = float(input("Enter overtime hours: "))#defining a variable Hours that inputs float value

weeklyPay = (Wage*Hour) + (1.5*Wage*Hours)#defining a variable weeklyPay that calculates the values

print (weeklyPay)#defining a print method that prints weeklyPay value

Output:

Please find the attached file.

Learn more:

brainly.com/question/8020777

A distributed system uses a process called _____, where all the connected computers must confirm or agree on the answer or result to a computation before submitting it to a database.

Answers

Answer:

Distributed Consensus

Explanation:

A distributed system refers to a set of connected computers to achieves a goal. They can each work independently and they usually appear as a single computer system to end users.

Database computations usually require each connected computer node to agree on the computations and results  before submitting it to the database.

This process is referred to as a Distributed Consensus.

A distributed consensus makes sure that in a distributed system, the data among nodes all reach an agreement and make confirmations before submitting to a database.

A virus that attaches to an executable program can do anything that the program is permitted to do.
a) true
b) false

Answers

Answer:

a) True

Explanation:

A macro virus infects executable portions of code. A virus that attaches to an executable program can do anything the program is permitted to.

Most use an Email for spreading macro viruses, which is a common method and is rather easy. Although, more advanced softwares trick people into giving personal information.

1. A systems administrator has installed a new UTM that is capable of inspecting SSL/TLS traffic for malicious payloads. All inbound network traffic coming from the internet and terminating on the company's secure web servers must be inspected. Which of the following configurations would best support this requirement?
A. The web servers’ CA full certificate chain must be installed on the UTM
B. The UTM’s certificate pair must be installed on the web servers
C. The web servers’ privet certificate must be installed on the UTM
D. The UTM and web server must use the same certificate authority
2. A company has migrated to two-factor authentication for accessing the corporate network, VPN, and SSO. Several legacy applications cannot support multifactor authentication and must continue to use usernames and passwords. Which of the following should be implemented to ensure the legacy applications are as secure as possible while ensuring functionality?
A. Privileged accounts
B. Password reuse restrictions
C. Password complexity requirements
D. Password history
E. Password recovery
F. Account disablement

Answers

Answer:

1 Option(A) is the correct answer .

2 Option(A) and Option(B) is the correct answer .

Explanation:

1

In this the administrator of the system built the new UTM capable of reviewing the  SSL / TLS flow for the suspicious payloads it see that the both inbound traffic flow originating from both the web and stopping on protected application server of the business .The full CA certificate sequence of web servers should be built on a UTM configuration will solve the problem .

2

The Two-factor authentication is used for the security purpose .In this technique only authorized people will accessing the data  the unauthorized people is not accessing the data.

The main objective of  two-factor authentication it provide the better security then the other security .The  Two-factor authentication is ensuring the security of Privileged accounts as well as the reuse restrictions of the password
Other Questions
please I need help this is important pls Why is development necessary? In cell K2 enter a formula using the IF and OR functions, as well as structured references to determine if Alison Simoneau can be a supervisor A. Tbe IF function should first determine if the staff member's Service Years is greater than 5 OR if the staff member's college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns. B. The function should return the text Yes if a staff member meets one or both of those criteria. C. The function should return the text No if a staff member meets neither of those criteria. tsor and have conlelea Academic Technology training. 1. Click Play ( ). You are looking down on the North Pole of Earth. From this perspective, do Earth and Venus revolve around the Sun in a clockwise or counterclockwise direction? What is the method for removing a single item in History?Select one:a. Open the History list, point to the item, and click the Remove button.b. Open the History list, point to the item, and click the X to its right.c. Open the History list and click the Pin this pane button.d. Open the Favorites list, click the item, and click the X to its right. Find a polynomial with a degree of 3, and the zeros 1,7, & -4 with no other zeros. Which best describes biogeographic isolation? Dr martin luther king jr wrote great speeces. He often included well known american songs and documnets in his writing. These words encouraged listeners to connect his idea to their own experiances. A 0.20-kg block rests on a frictionless level surface and is attached to a horizontally aligned spring with a spring constant of 40 N/m. The block is initially displaced 4.0 cm from the equilibrium point and then released to set up a simple harmonic motion. A frictional force of 0.3 N exists between the block and surface. What is the speed of the block when it passes through the equilibrium point after being released from the 4.0-cm displacement point Micah attends a preschool where there is a high teacher/child ratio and ample opportunity for creative expression. He is engaged in a long-term art project that he chose in which he is making dinosaurs out of clay. Which child-centered approach does Micah's preschool most closely resemble describe why Hitler blamed the Jews for Germany's problems. Which expressions are equivalent to 10 over 10 3/4? In the diagram, what is the perimeter of polygon $PQRST$? How to find the scale factor, ratio of area, & ratio of volume? Read the excerpt from Lizzie Bright and the BuckminsterBoy:Which best states how Turner's internal conflict isconnected to the setting?O Turner feels stifled in the town but free in the open airof the beach.O Turner feels used to the town but unsure of himself onthe beach.He spread his arms wide against the ocean sounds: therush of the waves, the manic giggles of the gulls, thesighing of the sea breeze against the granite. He put hisback to all of Phippsburg-Lord, to the entire continent-till with a shrug he sloughed off its heavy stillness andlooked for a way to climb down to the water. ... [F]inallyhe was down on the beach, breathing hard and deep, likesomething that was only just coming alive and drinking inthe liquid air for the first delicious time.0 Turner feels there is a lot to do in the town but notmuch to do at the beach.Turner feels criticized by people in the town butcriticized by God at the beach. In 2001,the united states oil consumption was 7,297.4 millions of barrels,while japan's was 1,979.4 millions of barrels. How many more barrels did the united states consume than japan. Why should you use sensory details in a story? Most people remember gandhi and dr Martin Luther king jr. Main idea pls help me pls pls What are the two reasons why metals are good conductors of electricity?