write an if statement that assigns deliverycomplete with 1 if bricksdelivered is equal to bricksexpected.\

Answers

Answer 1

Using the knowledge in computational language in python it is possible to write a code that write an if statement that assigns deliverycomplete with 1 if bricksdelivered is equal to bricksexpected.

Writting the code:

%Define the function CheckDelivery()

function deliveryComplete = CheckDelivery( brickDelivered, bricksExpected)

%Start the if-else statements to check if delievery is completed.

%Delievery completed

if ( brickDelivered == bricksExpected)

deliveryComplete = 1;

%Delievery not completed.

else

deliveryComplete = 0;

%End of if-else

end

%Print the result.

fprintf("deliveryComplete: %d\n",deliveryComplete);

%End of the function.

end

%demo.m

%Call the function for the output 0.

CheckDelivery(10,11);

%Call the function for the output 1.

CheckDelivery(10,10);

function deliveryComplete = CheckDelivery(bricksDelivered, bricksExpected)

   deliveryComplete = 0;

   if bricksDelivered == bricksExpected

       deliveryComplete = 1;

   end

end

See more about python at brainly.com/question/18502436

#SPJ1

Write An If Statement That Assigns Deliverycomplete With 1 If Bricksdelivered Is Equal To Bricksexpected.\

Related Questions

kaitlyn's summer interns are tasked with the repetitive and dull task of entering data all summer. which of the path-goal leadership styles should kaitlyn emphasize?

Answers

kaitlyn's summer interns are tasked with the repetitive and dull task of entering data all summer. Katlyn should emphasize on directive path-goal leadership style.

What is data entry?

Transcribing information into another media, typically through input into a computer program, is known as data entry. Handwritten documents, data from spreadsheets, series of numbers, computer code, and even names, and addresses are examples of data types that people might transcribe.

When entering data into a computer or comparable system, some businesses use audio input, which the user listens to. So that there are fewer pauses, the typist must be able to follow along as the tape progresses.

To learn more about data entry, use the link given
https://brainly.com/question/2089568
#SPJ4

a. what is a device register? b. what is a device data register? c. what is a device status register?

Answers

Device registration can be described as a device that permits a user to flag the computer, PDA, mobile phone, or other devices.A device data register is commonly a storage space for aparts of memory that are used to deliver data for immediate use by the CPU (Central Processing Unit) for data processing.A device status register refers to a hardware register that include information about the state of the processor.

Register is a kind of computer memory that is used for rapidly accepting, storing, and transfering data and instructions that are being used immediately by the CPU. There are three kinds of register, namely:

MDR (Memory data registers). IR (index registers).MBR (Memory buffer registers).

Learn more about register, here https://brainly.com/question/25760471

#SPJ4

which of the following is a benefit to integrating crm software into an existing erp? more than one answer may be correct.

Answers

improved customer service, enhanced data analysis, streamlined proccess are several benefits of CRM softwares

what are the benefits?

There are several potential benefits to integrating customer relationship management (CRM) software into an existing enterprise resource planning (ERP) system:

Improved customer service: By integrating CRM and ERP systems, companies can provide more personalized and efficient customer service. For example, customer service representatives can access customer information and order history from the ERP system, which can help them resolve issues more quickly and accurately.                                   Enhanced data analysis: Integrating CRM and ERP systems allows companies to access a wider range of data, which can be used for more sophisticated analysis and decision-making. For example, combining sales data from the CRM system with production and inventory data from the ERP system can help companies better understand customer demand and optimize their operations.Streamlined processes: Integrating CRM and ERP systems can help companies streamline their business processes by eliminating data silos and reducing manual data entry. For example, sales data entered into the CRM system can be automatically transferred to the ERP system, which can help prevent errors and reduce the need for manual data entry.Increased visibility: By integrating CRM and ERP systems, companies can gain greater visibility into their operations and customer interactions. For example, the CRM system can provide insight into customer preferences and trends, while the ERP system can provide information on production and inventory levels. This increased visibility can help companies make more informed business decisions.

To Know More About CRM, Check Out

https://brainly.com/question/29577176

#SPJ1

Which unique feature of​ e-commerce is related to the ability to interact with web technology​ everywhere?.

Answers

Ubiquity is the unique feature of​ e-commerce is related to the ability to interact with web technology​ everywhere.

What is Ubiquity in E-commerce?

Why has e-commerce grown so quickly? The answer lies in the internet's and web technology's distinct features. Simply put, the internet and e-commerce technologies outperform previous technological revolutions such as television and radio. When compared to physical retail stores, services, and entertainment, e-commerce is also the fastest growing form of commerce.

The internet and web as a commercial medium have eight distinct characteristics that contribute to the rapid growth of e-commerce: ubiquity, global reach, universal standards, richness, interactivity, information density, personalization/customization, and social technology.

To know more about internet, visit: https://brainly.com/question/2780939

#SPJ4

When filtering records in a query, the expression must return what kind of value?


a. a maximum or minimum value

b. a single text value

c. a positive number value

d. a true or false value

Answers

When filtering records in a query, the expression must return this kind of value: a. a maximum or minimum value.

What is SQL?

SQL is an abbreviation for structured query language and it can be defined as a domain-specific programming language that is designed and developed for the management and communication of various data that are saved in a relational or structured database.

What is query?

In Computer technology, a query can be defined as a computational request for data that are stored in a database table, from existing queries, or even from a combination of both a database table and existing queries.

In database management system (DBMS), either a maximum or minimum value would be returned when the functions MIN() or MAX() are used in conjunction with a structured query language to filter records in a query, which corresponds to the values at the top or bottom values in a data field.

Read more on query here: brainly.com/question/27851066

#SPJ1

The adoption of ________ has been an important factor in the development of the internet of things.

Answers

Answer:

ipv6

Explanation:

ipv6

which type of internet connection can provide an unshared connection over regular telephone lines operating with at least 1 mbps of bandwidth?

Answers

DSL internet connection can provide an unshared connection over regular telephone lines operating with at least 1 mbps of bandwidth.

What is a DSL?

DSL internet is high-speed internet that you connect to via Wi-Fi or an ethernet cable via a modem. DSL is an abbreviation for Digital Subscriber Line/Loop, which is a data transmission medium that uses a copper telephone landline to receive data. (If you arrived here while looking for information on domain specific languages, also known as DSL, you should leave now.)

DSL is the most common type of broadband internet access, and it uses existing phone wiring to transmit data via a DSL modem, making the internet available to everyone.

To know more about DSL, visit: https://brainly.com/question/27961481?referrer=searchResults

#SPJ4

use prim's algorithm to find a minimal spanning tree for the times whose vertices are the hotels given in the distance chart. what is the total time for this spanning tree?

Answers

The greedy approach is the foundation of the Prim's algorithm. We choose the edge with the least weight at each step, assuming that the final node hasn't been reached yet.

The spanning tree would appear like this. All the names are written in shorthand. Kindly corelate.

What is spanning tree?

A spanning tree is a sub-graph of an undirected connected graph that contains all of the graph's vertices and the fewest number of edges possible between them. It is not a spanning tree if a vertex is missed. Weights may or may not be applied to the edges.

What is minimum spanning tree?

A minimum spanning tree is one in which the weight of the edges added together is as small as it can be.

To know more about spanning tree, check out:

https://brainly.com/question/13148966

#SPJ1

Which term describes a piece of code that is distributed to allow additional functionality to be added to an existing program?

Answers

The term describing a piece of code that is distributed to allow additional functionality to be added to an existing program, is Plug-in.

This additional functionality is usually provided by an external developer and is intended to extend the capabilities of the existing program.

What is the Plug-in?

Is a type of software that adds extra features to a program or application. It is used to extend the functionality of a program or application by providing additional features.

Plug-ins can range from simple tweaks to complex add-ons that drastically change the way a program or application works. Examples of plug-ins include:

Browser extensionsAudio effectsVideo filtersMore

Learn more about Plug-in:

https://brainly.com/question/7143308

#SPJ4

Social media professionals need to have a ______ approach that allows them to have a seamless integration of content, experiences, and messages for the user.A) dual channelB) omni channelC) hyper channelD) strategic channel

Answers

Social media professionals need to have a (Option B) Omni channel approach that allows them to have a seamless integration of content, experiences, and messages for the user.

Creating a Seamless User Experience with an Omni-Channel Approach

An omni-channel approach is a type of marketing strategy that provides customers with an integrated shopping experience. It uses multiple channels to connect with customers, such as:

Physical storesWebsitesSocial mediaMobile apps, and more

This allows customers to have a seamless experience regardless of the channel they use, which makes it easier for social media professionals to create content, experiences, and messages that are consistent across all channels.

Learn more about Marketing strategy: https://brainly.com/question/25369230

#SPJ4

You recently installed several applications on Windows system. After doing so, you notice the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them.Startup

Answers

Startup

Click on the Startup tab in Task Manager that you would use to to stop applications that are automatically loaded when the system boots.

What is Task Manager?

The Task Manager is a component of the Microsoft Windows operating system that has been present since Windows NT 4.0 and Windows 2000. It allows you to view each task (process) as well as the overall performance of the computer. You can view how much memory a program is using, stop a frozen program, and view available system resources using the Task Manager.

Ctrl+Shift+Esc on the keyboard brings up the Task Manager. By right-clicking the taskbar and selecting Task Manager, you can also access the Task Manager.

To know more about Task Manager, visit: https://brainly.com/question/29110813

#SPJ4

Assume the name of your dataframe is flavors_df. What code chunk lets you get a glimpse of the contents of the data frame?.

Answers

Assume the name of your dataframe is flavors_df. The code chunk that lets you get a glimpse of the contents of the data frame is option D: colnames(flavors_df)

What is a DataFrame?

It ia a term that is similar to a spreadsheet, a data structure called a dataframe arranges data into a 2-dimensional table of rows and columns. Because they provide a flexible and user-friendly method of storing and interacting with data, DataFrames are one of the most popular data structures used in contemporary data analytics.

Note that in regards to the question, the code block colnames(flavors df) is written by you. In this section of code:

Hence, you can examine the column names in the data frame with the function colnames().

So, the data frame that the colnames() function accepts as an argument is called flavors df.

Learn more about dataframe  from

https://brainly.com/question/28209816
#SPJ1

See full question below

Assume the name of your data frame is flavors_df. What code chunk lets you review the column names in the data frame?

Single Choice Question. Please Choose The Correct Option ✔

A

rename(flavors_df)

B

col(flavors_df)

C

arrange(flavors_df)

D

colnames(flavors_df)

Lane received a phone call from a client. The client claimed that a file they were working on the day before had disappeared from their computer along with several other files. Lane went to the client's desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When lane called the next morning to see if everything was working, the client said that two of their files were gone again. They also noticed new files in a folder. When lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. What is the issue with the client's computer?.

Answers

Since lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. The issue with the client's computer is d. Computer virus

What causes computer viruses?

The clicking links in emails, messaging applications, or social network posts that lead to fraudulent websites. By hiding in the HTML of hijacked websites, sometimes known as drive-by downloads, viruses can be downloaded as soon as the page loads in your browser. using network drives or external hard drives that are infected with your device.

A computer virus is a form of malware that accompanies another program (such as a document) and has the ability to multiply and propagate once it has been run on a machine. For instance, you can accidentally open a harmful email attachment after receiving it, allowing the computer virus to infect your system.

Therefore, one can say that certain kind of computer program called a virus multiplies itself after being run by altering other programs and adding its own code.

Learn more about Computer virus from

https://brainly.com/question/27282045

#SPJ1

See full option below

What is the issue with the client’s computer?

a. Spam

b. Corrupt hard drive

c. Bad hard drive driver

d. Computer virus

Which of the following Windows registry keys is most useful for malware that aims at maintaining persistent presence on the infected system?
A.HKLM\Software\Microsoft\Windows\CurrentVersion\Run
B. HKLM\SECURITY
C. %UserProfile%\ntuser.dat
D.HKCU\System\CurrentControlSet\Control\MediaProperties

Answers

HKLM\Software\Microsoft\Windows\CurrentVersion\Run is the windows registry keys is most useful for malware that aims at maintaining persistent presence on the infected system.

What's a registry key?The Windows operating system and any apps that choose to use the registry store low-level settings in a hierarchical database called the Windows Registry. The registry can be used by the kernel, device drivers, services, Security Accounts Manager, and user interfaces.It Offers Security The Registry offers two sizes of access control. To start, you can configure each workstation or server to forbid connections to the distant Registry. This is safe, but it also prevents you from editing policies on that machine using the System Policy Editor.Press Windows key + R, type cmd, and hit Enter to open the command prompt's Windows registry. Regedit should be typed into the Command Prompt and entered.

To learn more about windows registry refer :

https://brainly.com/question/29490158

#SPJ4

the event logs most commonly used for troubleshooting are located in the applications and services logs node. true or false?

Answers

The event logs most commonly used for troubleshooting are located in the applications and services logs node is false.

What is troubleshooting?

Troubleshooting is defined as the procedure for locating, organizing, and fixing a flaw, error, or problem in software or a computer system. It makes it possible to fix and restore a computer or piece of software when it breaks down, stops working, or behaves strangely.

For in-depth and targeted troubleshooting in Windows, use the Diagnostics-Networking, WLAN-Autoconfig, and System logs. Look for the Event Viewer to find these logs. Alternately, select Event Viewer under Administrative Tools in the Control Panel.

Thus, the event logs most commonly used for troubleshooting are located in the applications and services logs node is false.

To learn more about troubleshooting, refer to the link below:

https://brainly.com/question/29022893

#SPJ1

Which options allow users to modify the existing data in a report?

a. Report or Create
b. Create or Design View
c. Design view or Layout view
d. Print Preview or Report

Answers

The options that allow users to modify the existing data in a report are:

Report or Create (Option A)Create or Design View (Option B).

What is a report in computer science?

A report is a published result of a table or query. It is used to analyze The data supplied in specified techniques.

A report is a succinct summary extracted from a broader set of facts, intended for a specific audience.

In certain circumstances, a report is a database item that comes in useful when you wish to display the data in your database for any of the following uses:

Display or share a summary of data. Preserve snapshots of the data. Provide details about specific records. Create labels.

Learn more about reports:
https://brainly.com/question/15068287
#SPJ1

host e wants to send an ip datagram to host f. host e sends out an arp request to find out host f's mac address. what are the source ip address and the destination ip address of host f's arp reply.

Answers

Assume Host A wants to send an IP datagram to Host B, but neither A's nor B's ARP caches contain B's MAC address. Assume that the forwarding table of switch S1 only contains entries for Host B and router R1.

Explanation in Detail:

Because the destination address of the received ARPframe is a broadcast address, Switch S1 will broadcast the Ethernet frame over both of its interfaces. And it discovers that A lives on Subnet 1, which is linked to S1 via the interface connecting to Subnet 1. S1 will also add an entry for Host A to its forwarding table.

Yes, router R1 receives this ARP request message, but R1 does not forward it to Subnet 3. B will not send an ARP query message requesting A's MAC address because A's query message contains this information. When switch S1 receives B's response message, it will create an entry in its forwarding table for host B and then drop the received frame because destination host A is on the same interface as host B. ((In other words, A and B is in the same LAN segment).

To know more about IP Datagram, visit: https://brainly.com/question/29506804

#SPJ4

select the right order of the tcp/ip five-layer network model. 1 point physical layer > data link layer > transport layer > network layer > application layer physical layer > application layer > data link layer > network layer > transport layer physical layer > data link layer > network layer > transport layer > application layer. physical layer > network layer > data link layer > transport layer > application layer

Answers

The five-layer networking architecture serves as the foundation for the TCP/IP concept. These are the physical, data link, network, transport, and application layers, arranged from bottom (the link) to top.

The network access layer, internet layer, transport layer, and application layer are the four layers that make up the TCP/IP model (going from bottom to top). In the OSI Model's fifth layer: The OSI (Open Systems Interconnection) model's Session Layer regulates the conversations (connections) between computers. The connections between the local and distant applications are established, managed, and terminated by it. the OSI model's seven layers. Layer 1 is physical, followed by Layer 2 for data links, Layer 3 for networks, Layer 4 for transport, Layer 5 for sessions, Layer 6 for presentations, and Layer 7 for applications.

Learn more about connection here-

https://brainly.com/question/14327370

#SPJ4

which of the approaches is used to determine the password of a system account or a user account? (choose two.)

Answers

Using a Trojan horse, an approach is used to discover the password for a user or system account.

Explain about the Trojan horse?

A application that has been downloaded and installed on a computer but is actually dangerous in nature is known as a Trojan horse. Strong signs that a Trojan is present on a computer include unexpected changes to its settings and odd activity, even when it should be idle.

Trojan malware is so named because it imitates the method used to infect computers in the ancient tale of the Trojan horse. A Trojan will conceal itself among apps that appear to be safe to use, or it will try to fool you into installing it. Trojans don't spread themselves through infecting other files or systems like viruses do. A Trojan is a computer program that targets your data or network in order to injure, interfere with, steal from, or otherwise cause harm.

To learn more about Trojan horse refer to:

https://brainly.com/question/29590559

#SPJ4

The open source movement makes _____ available to everyone in an effort to continue to build and improve the functionality of open source software.

Answers

Answer:

programs

Explanation:

which of the following specifications replaces wep with a stronger security standard that features changing encryption keys? group of answer choices O vpn O utm O aup O wpa2 O tlsAnswer: WPA2

Answers

The specifications that replaces wep with a stronger security standard that features changing encryption keys is option C: WPA2.

What is WPA2 (Wi-Fi Protected Access 2)?

The encrypted security technology known as WPA2 (Wi-Fi Protected Access 2) guards internet traffic on wireless networks. The Wi-Fi Protected Access security protocol's second iteration, WPA2, fixes earlier issues and provides stronger encryption.

Note that the purpose of security standards is to increase the security of information technology.  Hence, one can say that a security standard is "a published specification that establishes a common language, contains a technical specification or other precise criteria and is designed to be used consistently, as a rule, a guideline, or a definition."

Learn more about security standard fromhttps://brainly.com/question/14559510
#SPJ1

job scheduling consider the problem of scheduling n jobs of known durationst1, t2,...,tn for execution by a single processor. the jobs can be executed in any order, one job at a time. you want to find a schedule that minimizes

Answers

The collection of n tasks with known processing times and due dates can be referred to as the EDD rule; the least value of Lmax is obtained by sequencing the jobs in non-decreasing order of their due dates.

The goal of the interval scheduling maximization problem (ISMP) is to identify the largest compatible set, or a collection of intervals with the least possible overlap. The idea is to optimize throughput by completing as many tasks as you can. Greedy algorithms typically operate by beginning with an empty or "base" solution and adding items one at a time until all of them have been added and have the best "score" by the algorithm's defined standards.

Learn more about algorithm here-

https://brainly.com/question/22984934

#SPJ4

Navigate to the following Snhu resources and summarize specifically how each will or may assist you in achieving your personal mission statement and short-term goals. a. Snhu academic support- written feedback section b. Shapiro library c. Snhu career
d. One additional Snhu resource of your choosing

Answers

The summary of  how each will or may assist you in achieving your personal mission statement and short-term goals, the right option is given below.

What is the summary of Snhu resources?

a. SNHU Academic Support - Written Feedback Section: This resource may assist you in achieving your personal mission statement and short-term goals by providing you with feedback on your written work. This feedback can help you identify areas for improvement in your writing, which can help you develop your skills and achieve your goals.

b. Shapiro Library: The Shapiro Library can assist you in achieving your personal mission statement and short-term goals by providing access to a wide range of resources, including books, articles, and online databases. These resources can help you learn new information, develop new skills, and expand your knowledge, which can all contribute to achieving your goals.

c. SNHU Career: SNHU Career is a resource that can help you achieve your personal mission statement and short-term goals by providing career guidance and support. This may include help with resume writing, job searching, and networking, as well as access to job listings and career fairs.

d. One Additional SNHU Resource of Your Choosing: One additional SNHU resource that may be helpful in achieving your personal mission statement and short-term goals is the SNHU Student Success Center. The Student Success Center provides a range of resources and support services to help students succeed in their academic and personal lives. This may include tutoring, academic coaching, and access to study materials and resources.

Learn more about feedback from

https://brainly.com/question/28070508
#SPJ1

A computer randomly generates numbers 1 through 100 for a lottery game. Every lottery ticket has 7 numbers on it. Identify the correct experiment, trial, and outcome below: Select all that apply: The experiment is the computer randomly generating a number The experiment is the computer randomly generating a number less than 10. A trial is one number generated. The trial is identifying the number generated. An outcome is the number 2 being generated. The outcome is the number being randomly generated.

Answers

Answer:

it were be a diffent number :

Hispaniola is an island in the West Indies Caribbean Sea that contains two separate countries name these two c

Answers

The two countries on Hispaniola island are Haiti and the Dominican Republic make up Hispaniola. This is the second-largest in land area in the Caribbean Sea.

What is Hispaniola island?

There are numerous islands in the Caribbean, sometimes referred to as the West Indies. the Caribbean islands mentioned There are three primary island groupings scattered across a sea that covers an area of 91,000 square miles between Venezuela and Florida:

The Bahamas, the Lesser and Greater Antilles. Following the island of Cuba in terms of area, Hispaniola is the most populated island in the West Indies.

Therefore, the two countries are Haiti and the Dominican Republic.

To learn more about Hispaniola island, refer to the link:

https://brainly.com/question/8159442

#SPJ1

YOu are configuring the local security policy of a windows system. You wnat to prevent users from reusing old passwords. YOu also want to force them to use a new password for at least 5 days before changing it again. Which policies should you configure? (select two)enforce password historyPassword complexityMaximum password ageMinimum password age

Answers

Since You are configuring the local security policy of a windows system. You wnat to prevent users from reusing old passwords. The policies that you should configure are options A and D:

Enforce password history.Minimum password age.Why is a minimum age required for passwords?

The Minimum Password Age policy is known to be one that establishes how long users must keep a password before changing it. The minimum password age will stop users from using a new password, changing it to their old one, and then bypassing the password system.

Therefore, one can say that Users can repeatedly use a small number of passwords by setting the Enforce password history option to a low number. If you don't also set a Minimum password age, users can change their password as often as necessary in order to reuse their original password.

Learn more about password history from

https://brainly.com/question/17193416
#SPJ1

Which task would be best completed by using the Find Unmatched Queries Wizard for two tables named “Products Offered” and “Customers”?

a. finding customers who have bought a minimum number of products
b. finding customers who have bought more than one of the same product
c. finding a company’s products that have never been sold
d. finding a company’s products that have sold for more than a certain amount

Answers

The task that will be best completed by using the Find Unmatched Queries Wizard for two tables named “Products Offered” and “Customers” is option b. finding customers who have bought more than one of the same product

What is unmatched query wizard?

With the help of this query wizard, you can build a query that lists any orphaned or widowed records present in two Microsoft Access tables. When a record in a relationship between two tables has many sides (child or related) but only one side (parent or primary), it is said to have orphaned records.

Note that The Find Unmatched Query, as its name suggests, shows records in one table or query that don't match any records in another table or query.

Therefore, On the Create tab, select Query Wizard from the Queries group. Click the Find Unmatched Query Wizard button twice in the New Query dialog box. Click Next after selecting the table with the mismatched records on the wizard's first page.

Learn more about Unmatched Queries Wizard from

https://brainly.com/question/6844569
#SPJ1

which two phases of the instruction cycle are always executed during the execution of an instruction? group of answer choices

Answers

The CPU does a cycle for each of these instructions before carrying them out.

Each instruction cycle in a simple computer includes the following stages: the memory to get the instruction. Decipher the directive. The fetch stage, the decode stage, and the execute stage are the three primary stages that make up this process. An instruction cycle is the sequence of steps the CPU must take in order to retrieve and carry out an instruction. It is made up of fetch and cycle execution. The stages between instruction fetch and instruction decode will be broken down by the 2-stage pipelined CPU as indicated by the red dotted line in the diagram.

Learn more about instruction here-

https://brainly.com/question/19570737

#SPJ4

Switch to the view where you can modify how the printed version of your presentation will look.

Answers

You must move to the View tab in MS PowerPoint where you can edit how your presentation will appear on paper.

You choose the Handout Master button from the Master Views Ribbon Group's View Ribbon Tab. Unwhite the screen because you are in slide show view. The Slide Show Options option was clicked.

The layout, headers, and footers, as well as the background, can all be changed on presentation handouts using the Handout Master tab. On every page of the printed handout, changes made to the master handout are visible.

Click the View tab, then select Handout Master from the Master Views group to view the available handout options.

You can adjust the orientation of handouts, set the slide size, and specify the number and layout of slides to print on each page under the Page Setup group. To completely personalise your layout, use the settings on the three menus (Handout Orientation, Slide Size, and Slides Per Page).

To learn more about MS PowerPoint click here:

https://brainly.com/question/16155315

#SPJ4

what is an advantage of using electronic databases for research? they provide only the most up-to-date information. they provide smaller, more manageable amounts of information. they provide bibliographic information, abstracts, and full-text documents.

Answers

The ability to rapidly and easily search the information is one of the main benefits of using electronic databases.

What is the advantage of using databases for research?They enable you to perform searches across a range of sources. They frequently offer access to books and journal papers in their entirety. The knowledge you discover there is of a very high academic calibre.Databases provide advantages.Little redundancy of data.Enhanced data securityHigher consistency.Minimised upgrading errorsLess expensive data entry, storage, and retrieval.Enhanced data accessibility through host and query languages.Higher application programme integrity for data.These databases provide scholarly, peer-reviewed articles authored by reputable authors, including journalists, scholars, and subject-matter authorities. Users can discover the information they need more quickly because databases offer robust search options for limiting results.

To Learn more About electronic databases refer to:

https://brainly.com/question/4499788

#SPJ4

Other Questions
You begin the week with 30 units of orange juice. You purchase 50 units. Your ending inventory for the week is 30 units. How many units did you sell?. What test can i use to determine whats inside of a bubble Which equal employment opportunity act prohibits discrimination due to childbirth. the challenge of crime in a free society called for the improvement of police personnel through higher education. t/f 0.5 power of 2 + 0.3 power of 2? According to the ______________________, debt collectors are not allowed to use their positions to collect a debt using any manner of work performance that is found to be abusive, deceptive, or unethical hermosa vista company issued $290,000 5-year, 5.75% bonds and received $296,235 in cash. the market rate of interest when the bonds were issued was 5.25%. what is the amount of interest expense to be recorded for the first annual interest period if the company uses simplified effective-interest amortization? which group of words best helps the reader understand the meaning of the word authoritative in this sentence? i believe that this book is authoritative, but that other short pamphlet has some bad information in it. the nurse is preparing a client for a test that will measure negative feedback suppression of acth. which medication will the nurse administer in conjunction for this test? Jackie hires Charles to lay new carpet in her bedroom. Charles does such a bad job, that the only way to fix the carpet is to start over and relay the carpet. Which of the following best describes this situation? a client who is being evaluated for a recent head injury requests hydrocodone with acetaminophen for a headache. what response by the nurse is most appropriate? a student finds the mass of a pure sample of a metal chloride hydrate. the student heats the sample several times, reaching a constant mass that contains 0.100 mole of anhydrous metal chloride. which of the following questions about the hydrated metal chloride substance is most likely to be answered by the results of the experiment? which message travels faster - the one that travels along the surface of the axon or the one that jumps from node to node? group of answer choices mass of blood. the human body typically contains 5.1 l of blood of density 1060 kg/m3 . how many kilograms of blood are in the body? what was the primary vehicle for the diffusion of american popular culture in the years immediately following world war ii? The diagram shows the graphs of y=x-3x - 2 andy = x + 3.Use the diagram to solve the equation x 3x 2 = x + 3=graphically.Y11+1098-7-65436-5-4-2-1-8-7-6-5-4-3-2-1, 1-2-3/4-5_6_7_823456-2--3--4--5--6--7--8--9---10--11+x Which battle ended with santa anna's troops abandoning mexico city? question 2 options: battle of palo alto battle of resaca de la palma battle of monterrey battle of chapultepec castle Sam is racing her soapbox racer on a straight downhill track. Suppose that the track is 1000 feet long and her distance down the track in feet is given by the function S (t) = t 2 + 30t, where t is in seconds. Assume that S (t) = 2t + 30. Sam is trying to break the soapbox racer speed record of 65 feet per second. Does she do it as she races down the 1000 foot track? exercise 21.8 (static) sunk costs: scrap or rework decision (lo21-1, lo21-2, lo21-3, lo21-4) road master shocks has 15,000 units of a defective product on hand that cost $80,000 to manufacture. the company can either sell this product as scrap for $6 per unit or it can sell the product for $9 per unit by reworking the units and correcting the defects at a cost of $40,000. prepare a schedule to show the effect of selling the defective units as scrap or rework. On a coordinate plane, 2 trapezoids are shown. Trapezoid 1 has points A (negative 4, 3), B (1, 3), C (0, 0), and D (negative 3, 0). Trapezoid 2 has points A prime (negative 1, 1), B prime (4, 1), C prime (3, negative 2), and D prime (0, negative 2).Which rule describes the translation?T3, 2(x, y)T3, 2(x, y)T3, 2(x, y)T3, 2(x, y)