1. If you want to save the application state, to load it back when onCreate is called, then you need use the callback method 2. Write the method you need to call on the handler object with the needed two parameters in order to execute the code in "override fun run()" every 3 seconds 3. Android applications and activities list the intents they can handle in manifest using 4. Which property you change for the action bar item to indicate how it will be placed in the action bar (as text or as an icon). 5. Which method will be called automatically by Android to indicate the selection of an action bar item 6. The action bar XML file will be placed in which resources folder. 7. What is the type of the object that you need to pass when you insert a record into SQLite database 8. Which method from SQLite API you can call to execute a "Select" Query

Answers

Answer 1

This method is used to execute a SQL query that returns a cursor over the result set. The first parameter of the method is the SQL query string, and the second parameter is an array of values that are used to replace the placeholders in the query string if any.

1. If you want to save the application state, to load it back when onCreate is called, then you need to use the callback method `onSaveInstanceState()`. This method allows you to save the instance state of an activity or a fragment when the activity or fragment is stopped or destroyed by the system, so that when the activity or fragment is recreated, the instance state can be restored.2. The method you need to call on the handler object with the needed two parameters in order to execute the code in "override fun run()" every 3 seconds is `postDelayed()`.

This method is used to post a runnable to the message queue of the handler, which will be executed after the specified delay time in milliseconds. The first parameter of the method is the runnable that needs to be executed, and the second parameter is the delay time in milliseconds.3You can use the `put()` method of ContentValues to add the column values to the object.8.

The method from SQLite API that you can call to execute a "Select" Query is `rawQuery()`. This method is used to execute a SQL query that returns a cursor over the result set. The first parameter of the method is the SQL query string, and the second parameter is an array of values that are used to replace the placeholders in the query string if any.

To know more about application visit :

https://brainly.com/question/28206061

#SPJ11


Related Questions

The CPU is often called the
of the computer.

Answers

Answer:

Explanation:

Tower?

Answer:

Its often called the brains of a computer.

Explanation:

What should you do in order to have access to the header and footer tools? Open the View tab. Open the Page Setup dialog box. Open the header or footer. Click and drag the header down to the footer.

Answers

Answer:

Step 1  - Open the View tab.

Step 2 - Open the Page Setup dialog box

Step 3 - Open the header and footer tool.

Step 4 - Click OK.

Explanation:

In order to access to the header and footer tools

Step 1  - Open the View tab.

Step 2 - Open the Page Setup dialog box

Step 3 - Open the header and footer tool.

Step 4 - Click OK.

which of the following statements is most true about metadata and interoperability? group of answer choices standardized schemas are more interoperable than customized ones. interoperability is the aspect of a metadata schema that specifies how to properly formatted metadata elements the international mega-thesaurus will ease the vocabulary problem by cross-walking each concept from each major language to all the others now that everything is web-based, interoperability is automatic

Answers

Standardized schemas are more interoperable than customized ones.

Metadata is information that describes data, and it plays a crucial role in interoperability. Interoperability refers to the ability of different systems to work together and share information effectively. In terms of metadata, standardized schemas that have been widely adopted tend to be more interoperable than customized ones. The reason is that standardized schemas are designed to work well with other systems that use the same schema. Additionally, a metadata schema needs to specify how metadata elements should be formatted to ensure interoperability. Finally, while efforts like the International Mega-Thesaurus can help with vocabulary standardization, it's important to remember that effective interoperability requires not just shared vocabulary, but also shared standards for formatting and sharing information.

Learn more about metadata here: bainly.com/question/14699161

#SPJ4

Complete question:

Which of the following statements is most true about metadata and interoperability.

Now that everything is Web-based, interoperability is automatic

Interoperability is the aspect of a metadata schema that specifies how to properly formatted metadata elements

The International Mega-Thesaurus will ease the vocabulary problem by cross-walking each concept from each major language to all the others

Standardized schemas are more interoperable than customized ones.

After making a change to a program and attempting to re-run it, you get an error message stating that changes are not allowed. What can you do to clear the error

Answers

In order to clear the error to a program when changes are not allowed, you must close the previous execution of the program and then attempt to re-run it.

What is code refactoring?

Code refactoring can be defined as a process that typically involves changing (modifying) a program's internal structure without causing any changes to the way and manner in which the program works.

In some instances, some changes done to a program causes an exception and it makes the program inexecutable. Thus, the end user would get an error message stating that changes are not allowed.  

In order to clear the error to a program when changes are not allowed, the end user must close the previous execution of the program and then attempt to re-run it.

Read more on programs here: https://brainly.com/question/26324021

How do you make someone Brainliest?

I have asked questions before and promised brainliest, but I don't actually know how. First person to tell me will get brainliest using my new skill! Please Help!

Answers

Two people have to answer the question and there should be a brainliest button above each answer. Hope that helps you :)
There should be a blue highlighted thing that says give brainliest and you just click that

What is the purpose of the PC troubleshooting process? Select two answers

restore damaged data

solve problems

fix broken components

identify problems

Answers

The purpose of the PC troubleshooting process is to identify and solve problems. Thus, the correct options for this question are B and D.

What do you mean by the Troubleshooting process?

The Troubleshooting process may be defined as a type of strategy which is used to detect a theory of probable cause within the computer system, It is a systematic approach to solving a problem.

The purpose of this process is to determine why something does not work as expected and explain how to resolve the problem. The first step of this methodology describes the entire problem that a user may be facing.

Therefore, identifying and solving problems are the major purposes of the PC troubleshooting process. Thus, the correct options for this question are B and D.

To learn more about the Troubleshooting process, refer to the link:

https://brainly.com/question/14394407

#SPJ2

Answer : IDENTIFY AND SOLVE PROBLEMS

Explanation:

did the quiz first i got it wrong then i choosed the answer im giving u and it worked

What is the largest risk of a business selling its products or services on account?

Answers

Answer:

financial risk

Explanation:

they don't know if the product will work

which features must you remove from a full gui installation of windows server 2012

Answers

When it comes to features that need to be removed from a full GUI installation of Windows Server 2012, you need to consider what specific roles and features are necessary for your intended use.

However, to provide a general answer, here are some features that can be safely removed from a full GUI installation of Windows Server 2012 without impacting its core functionality:Windows PowerShell Integrated Scripting Environment (ISE)Graphical Management Tools and InfrastructureInternet ExplorerServer Graphical ShellWindows Defender FeaturesThese features can be safely removed by using the Remove Roles and Features wizard or by using the PowerShell command Remove-WindowsFeature.

It's important to note that removing these features can help reduce the size of the installation and decrease its attack surface, which can be useful in some scenarios. However, it's recommended to carefully evaluate the roles and features that are necessary for your intended use and only remove the ones that are not needed to avoid potential compatibility issues.

To know more about Windows visit:

brainly.com/question/29509027

#SPJ11

How do I connect my TV to my computer?

Answers

If an HDMI cable is attached, select it using the source button on the TV remote, or select PC if a VGA cable available. When you connect a TV to a PC, your desktop image automatically shows up on the TV.

How many parts does a computer have?

The five basic parts of every computer are a motherboard, a central processing unit, a graphics processing unit, random-access memory, and a disk drive or solid-state drive. Whether it's a high-end gaming machine or a basic desktop computer for kids, every computer contains five parts.

What is the entire form of a computer?

The Latin word "computerae," which meaning "to compute," is the origin of the English term "computer." Common Operating Machine Purposely Used for Technological and Educational Research is the full name of the computer.

To know more about computer visit:

https://brainly.com/question/29792640

#SPJ4

What is the greatest common
factor of the following three
numbers?
12, 18, 32​

Answers

Answer: 2

Explanation:

Create an infographics using the Word Processing Software, informing the audiences about internet safety practices.

Answers

Here is a suggested infographic on internet safety practices using Microsoft Word:

[A Word document shows the following infographic:]

Staying Safe Online

Protect your personal information. Never share your name, address, phone number, passwords, or Social Security Number on social media or public websites.

Be wary of phishing emails and malicious links. Never click links or download attachments from unknown or untrusted sources. Legitimate companies will not ask for sensitive data via email.

Use strong and unique passwords. A strong password contains a minimum of 8 characters, a mix of letters, numbers and symbols, and is not based on personal information. Use different passwords for different online accounts.

Be cautious of what you post. Anything you post online can potentially last forever. Do not post anything that you would not want seen by anyone.

Turn on two-factor authentication whenever possible. This adds an extra layer of security for your accounts like email, social media, and cloud storage services.

Ensure all devices and software are up to date. Install the latest updates to keep security patches current to protect against threats.

Be wary of public Wi-Fi networks. Public networks are not secure and all your online activity and information can be visible to others. Avoid conducting sensitive activities on public Wi-Fi.

Signal for help if anything suspicious happens. If you notice any suspicious activity on your accounts or devices, changing passwords or unauthorized logins, report it immediately to the concerned companies and consider filing a police report.

Online privacy and security is a shared responsibility. Be proactive and spread awareness about internet best practices to help keep everyone safe online. Together, we can make the internet a safer place!

Does this infographic look okay? I tried to highlight some key best practices around protecting personal information, using strong passwords, being cautious of what is posted online, enabling two-factor authentication, keeping software up to date, avoiding public Wi-Fi and knowing how to get help if needed. Please let me know if you would like me to modify anything in the infographic. I can also suggest some other topics or formatting styles if required.

A brief overview of some important internet safety practices that you can include in your infographic  using the Word Processing Software is given.

How to explain the information

Use strong passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols in your passwords, and avoid using personal information.

Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring a second form of authentication in addition to your password.

Be careful with personal information: Don't share personal information like your full name, address, phone number, or social security number online.

Learn more about Word Processing on

https://brainly.com/question/985406

#SPJ1

linux uses a logical directory tree to organize files into different folders (true or false)

Answers

The statement"Linux uses a logical directory tree to organize files into different folders" is true.

This directory structure is known as the Filesystem Hierarchy Standard (FHS), and it provides a consistent and hierarchical organization of directories in Linux-based operating systems. The root directory ("/") serves as the starting point, and from there, directories are organized in a tree-like structure with parent and child directories. This logical directory tree allows for efficient organization, navigation, and management of files and directories in Linux.

To learn more about FHS visit: https://brainly.com/question/31455340

#SPJ11

oes a program run faster when the programmer leaves optional parameters out of a subroutine call? why or why not?

Answers

No, a program does not run faster when the programmer leaves optional parameters out of a subroutine call. This is because optional parameters have default values, so leaving them out does not save any time or resources. Additionally, the program still needs to allocate space for those parameters, even if they are not used.

Optional parameters are parameters in a subroutine or function that are not required to be passed during a function call. They have default values, which are used if the user does not pass a value for the parameter. This allows for greater flexibility in programming and allows functions to be reused with different parameters.A subroutine call is when a program transfers control to a subroutine or function. This allows the program to execute the subroutine's instructions and return to the calling program. Subroutine calls are used to perform a specific task, such as calculating a value or displaying data.

Learn more about  program  here:

https://brainly.com/question/11023419

#SPJ11

how to delete the element only in the second level of a list?

Answers

When deleting an element from a list only in the second level, the easiest way is to use the del function.

How to delete the element only in the second level of a list?

You can delete the element only in the second level of a list by following these steps:

1: Create a nested list

The first step is to create a nested list that has elements in the second level. Here is an example of a nested list that has elements in the second level:

mylist = [[1, 2, 3], [4, 5, 6], [7, 8, 9]]

2: Delete the element from the second level

To delete the element from the second level, you need to use the del function and provide two indexes. The first index is for the first level, and the second index is for the second level.

Here is an example of how to delete the second element from the second level:del mylist[1][1]

After running this code, the nested list will be updated to

:[[1, 2, 3], [4, 6], [7, 8, 9]]The second element from the second level (which is 5) has been deleted.

Learn more about delete function at

https://brainly.com/question/30764332

#SPJ11

What is the primary function of NCEES? A. administering engineering examinations B. creating and amending ethical standards for engineers C. accrediting educational programs in the United States D. certifying engineering technologists and engineering technicians
RIGHT ANSWER ONLY

Answers

Answer:

NCEES is a national nonprofit organization dedicated to advancing professional licensure for engineers and surveyors. Learn more.

Explanation:

Answer:

A.  

administering engineering examinations

Explanation:

Question #2
Multiple Select
Which statements will ask the user for a number? Select 2 options.
o answer = input('How many sodas do you want?)
O answer = in(How many sodas do you want?)
answer=input(How many sodas do you want?)
answer = input("How many sodas do you want? ")
answer in("How many sodas do you want?)

Answers

Answer:

Its D and E

Explanation:

Answer:

Options D and E are correct. The input function takes input from the user, which in this case is a number.

Explanation:

What are the two main components of sound?

Answers

The two main components of sound are frequency and amplitude.

Frequency refers to the number of sound waves that pass through a given point in a certain amount of time and is measured in Hertz (Hz). This determines the pitch of a sound, with higher frequencies producing higher pitches and lower frequencies producing lower pitches. Amplitude, on the other hand, refers to the intensity or loudness of a sound and is measured in decibels (dB). The greater the amplitude, the louder the sound. These two components work together to create the unique qualities of every sound we hear, from the soft whisper of a breeze to the booming roar of thunder. Understanding frequency and amplitude is crucial in fields such as music, audio engineering, and even medicine, where they are used to diagnose hearing problems and other auditory issues

Learn more about sound here:

https://brainly.com/question/30045405

#SPJ11

a. How do you add (-117) to (31 ) using 2’s complement using 4-bit register
b.
Find the following differences using twos complement arithmetic
1. - 101110
11001100
2. 111100001111
-110011110011

Answers

a. To add (-117) to (31) using 2’s complement using 4-bit register, follow the below steps:

Step 1: Convert the given numbers into binary representation.(-117) = -(1110101)₂(31) = (0011111)₂

Step 2: Add two numbers using the binary addition method but discard the carry generated from the MSB (Most Significant Bit) position and obtain the final answer.(-117) = 1110101_(2’s complement)  + 1= 1110110(31) = 0011111_  + 0= 0011111_-------1 0000101(Discard the carry)= (0000101)₂ (Answer)

Therefore, (-117) + (31) using 2’s complement using 4-bit register is (0000101)₂.

b. To find the following differences using twos complement arithmetic, follow the below

Step 1: Convert the given numbers into binary representation.-101110 = -(101110)₂ = 010010_(2’s complement) + 1= 01001111001100 = (11001100)₂

Step 2: Add two numbers using the binary addition method.- 010011 (1’s complement of 101110)11001100_--------1 011110(1’s complement of the answer)- 1 (Carry from MSB)-------1 011101 (2’s complement of the answer)= -(10111)₂ (Answer)

Therefore, the difference between -101110 and 11001100 using twos complement arithmetic is -(10111)₂.2.

To find the difference between 111100001111 and -110011110011 using twos complement arithmetic, follow the below steps:

Step 1: Convert the given numbers into binary representation.111100001111 = (111100001111)₂ = (111100001111)₂ - 0= (111100001111)₂ - (111111110001)₂= 00000111110 (2’s complement of -110011110011)= 00000111110_ + 1= 00000111111-110011110011 = -(110011110011)₂ = 001100001101_(2’s complement) + 1= 001100001110

Step 2: Add two numbers using the binary addition method.00000111111_001100001110_-------------1 010100(1’s complement of the answer)- 1 (Carry from MSB)------------1 010011 (2’s complement of the answer)= -(1010011)₂ (Answer)

Therefore, the difference between 111100001111 and -110011110011 using twos complement arithmetic is -(1010011)₂.

Learn more about Two Compliment Arithmetic here:

https://brainly.com/question/22084365

#SPJ11

what is the full form of www?​

Answers

Answer:

world wide web

Explanation:

While working on a Windows workstation, you've enabled Remote Desktop.
Which of the following ports MUST be opened in the server's firewall to allow remote clients to access the desktop?
3389. The RDP protocol runs on port 3389 by default.

Answers

The  ports that must be opened in the server's firewall to allow remote clients to access the desktop port 3389.

What is Remote desktop?

A remote desktop is a software or feature of an operating system that allows a user to connect to a computer in another place, view its desktop, and interact with it as if it were local.

It also allows a desktop environment on a personal computer to be run remotely from one system while being presented on a second client device.

The RDP listener should be monitoring on port 3389 on both the local (client) and remote (target) computers. Therefore, it can be concluded that The ports in the server's firewall that must be opened to give remote clients access to desktop port 3389.

Learn more about Remote desktop here:

https://brainly.com/question/16201038

#SPJ1

What is logistics?
The commercial activity of transporting

Answers

Answer:

ctycricyyitc57ou5ir57ir56ir75ie65ie56ie65ie65ur65r65ie65urytie

How many parameters can we use in each function?



1


2


4


As many as we need

Answers

Answer:

As many as we need

Explanation:

https://quizizz.com/admin/quiz/5e68ffb7ada381001bd58b3a/codehs-unit-2-lessons-13-to-19

which of the following is correct about short hex code format of css colors?

Answers

The short hex code format of CSS colors consists of three-character codes for each color channel. This format can be used when the two digits for each color channel are the same.

For example, #FFF is equivalent to #FFFFFF and represents white. However, it is important to note that not all colors can be represented using the short hex code format. Additionally, using the short format can lead to decreased readability and maintainability of the code. Therefore, it is recommended to use the full six-character hex code format for all colors unless the specific color can be accurately represented using the short format.
Hi! The correct statement about short hex code format of CSS colors is that it uses a 3-digit hexadecimal notation, where each digit represents the intensity of the red, green, and blue components. The short format simplifies the 6-digit format by repeating each digit twice. For example, the short hex code #FAB is equivalent to the full hex code #FFAABB. This format allows for a more concise representation of colors while still offering a wide range of options. Remember that CSS colors can also be represented in other formats, such as RGB or HSL, depending on the needs of your project.

To know more about CSS visit:

https://brainly.com/question/27873531

#SPJ11

what is computer give definition ​

Answers

Answer:

computer is

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Alice and Bob take turns playing a game, with Alice starting first. There are n stones arranged in a row. On each player's turn, they can remove either the leftmost stone or the rightmost stone from the row and receive points equal to the sum of the remaining stones' values in the row. The winner is the one with the higher score when there are no stones left to remove. Bob found that he will always lose this game (poor Bob, he always loses), so he decided to minimize the score's difference. Alice's goal is to maximize the difference in the score. Given an array of integers stones where stones[i] represents the value of the i th stone from the left, return the difference in Alice and Bob's score if they both play optimally. Constraints: n == stones.length 2 <= n <= 1000 1 <= stones[i] <= 1000 Sample test case 1: Input: n = 5 & stones = [5,3,1,4,2] Output: 6 Explanation: - Alice removes 2 and gets 5+3+1+4= 13 points. Alice = 13, Bob = 0, stones = [5,3,1,4]. -Bob removes 5 and gets 3 + 1 + 4 = 8 points. Alice = 13, Bob = 8, stones = [3,1,4]. Alice removes 3 and gets 1+4= 5 points. Alice = 18, Bob = 8, stones = [1,4]. - Bob removes 1 and gets 4 points. Alice = 18, Bob = 12, stones = = [4]. - Alice removes 4 and gets 0 points. Alice = 18, Bob = 12, stones = [] The score difference is 18 - 12 = 6. Sample test case 2: Input: n=8 & stones = [7,90,5,1,100,10,10,2] Output: 122. code the question in python

Answers

Given an array of integers stones, representing the values of stones placed in a line, and the number of stones n, Alice and Bob take turns to play a game.

Alice always starts the game. At each turn, a player can remove either the leftmost stone or the rightmost stone from the row and receive points equal to the sum of the remaining stones’ values in the row. Hence, he decided to minimize the score's difference. Alice's goal is to maximize the difference in the score. Our task is to determine the difference in the score if both Alice and Bob play optimally.

To calculate the sum Arr, we use the below formula We initialize the dp array of size n * n with zero. Then, we calculate the dp array by using the below formula The above formula is used to calculate the maximum score that the current player can get if he chooses the leftmost or the rightmost stone and subtracts the minimum score that the other player can get in the remaining sub-array. Below is the implementation of the above approach in Python we have used the List data type of Python, which is a collection of items that can be of different data types like string, integers, etc.

To know more about array visit:

https://brainly.com/question/13261246

#SPJ11

elements to use when configuring important text that is meant to be displayed in a bold font style is.?

Answers

When configuring important text that is meant to be displayed in a bold font style, some key elements to consider include:Placement: Consider where the bold text will appear on the page or screen, and make sure it is positioned prominently enough to grab the reader's attention.

Contrast: Use a font color that contrasts with the background color of the page or screen to make the text stand out even more. Choose a font size that is larger than the surrounding text to emphasize its importance and make it easier to read. Length: Keep the bold text short and concise to avoid overwhelming the reader and diluting the impact of the message. Hierarchy Use bold text sparingly and strategically, and make sure it is consistent with the overall hierarchy of the text on the page or screen. For example, use it for headings or subheadings, but not for every sentence or paragraph. By considering these elements when configuring important text in a bold font style, you can help ensure that your message is conveyed effectively and clearly to your audience.

Learn more about  elements here;

https://brainly.com/question/30353826

#SPJ11

The _____ is a hierarchical database, in Windows, containing information about all the hardware, software, device drivers, network protocols, profiles for each user of the computer, and user configuration needed by the OS and applications.

Answers

The registry is a hierarchical database, in Windows, containing information about all the hardware, software, device drivers, network protocols, profiles for each user of the computer, and user configuration needed by the OS.

A hierarchical database is a type of database management system in which data is organized in a tree-like structure or hierarchy. In this structure, each parent node can have multiple child nodes, but each child node can only have one parent node. This type of database is often used in mainframe environments and is designed for the efficient handling of large amounts of data with a limited number of relationships. Hierarchical databases are well-suited for applications that require rapid access to a large number of records with a fixed number of access paths. They can be less flexible than relational databases in terms of data querying and manipulation but are often faster and more efficient for specific use cases. The IBM Information Management System (IMS) is an example of a hierarchical database system.

Learn more about hierarchical database here:

https://brainly.com/question/31537633

#SPJ11

Suppose you are assigned the task of the improvement of software development processes of an organization to meet certain organization goals. Your task is to discuss the steps or course of action that you would take in order to improve the organizational software development processes (one or two processes) for achieving certain defined organizational goals.
You also need to clearly state as to why and what goals you want to achieve by improving the organizational software processes. Moreover, you are encouraged to use visual / graphical representations / models (complete process map) to help visualize the entire improvement cycle or process. Furthermore, you should try to be as detailed as possible regarding the potential improvement steps.

Answers

The improvement steps should be tailored to the specific organizational goals and challenges. Regular monitoring and evaluation of the improved processes should be carried out to ensure that the desired goals are being achieved and to identify further areas for refinement. Continuous improvement is essential to maintain the effectiveness and efficiency of the software development processes in line with organizational goals.

To improve the organizational software development processes, the first step is to clearly define the goals that the organization wants to achieve. These goals could include improving the speed of software delivery, enhancing the quality of software products, increasing customer satisfaction, or optimizing resource utilization. Once the goals are identified, a thorough analysis of the current processes should be conducted to identify areas of improvement.

One potential improvement step is to adopt an agile development methodology. This involves breaking down the software development process into smaller, manageable iterations called sprints. Agile methodologies, such as Scrum or Kanban, promote collaboration, flexibility, and faster delivery of software. By implementing agile practices, the organization can achieve goals like increased speed of software development, improved collaboration between development teams and stakeholders, and enhanced responsiveness to changing customer requirements.

Another potential improvement step is to implement continuous integration and continuous delivery (CI/CD) practices. CI/CD focuses on automating the build, testing, and deployment processes, enabling frequent and reliable software releases. By automating these processes, the organization can achieve goals like reducing time-consuming manual tasks, improving the quality of software through automated testing, and enabling faster and more efficient deployment of software updates.

Throughout the improvement process, visual or graphical representations, such as process maps, can help in documenting and visualizing the software development processes. These representations provide a clear overview of the steps involved, the dependencies between different activities, and potential areas for optimization.

Overall, the improvement steps should be tailored to the specific organizational goals and challenges. Regular monitoring and evaluation of the improved processes should be carried out to ensure that the desired goals are being achieved and to identify further areas for refinement. Continuous improvement is essential to maintain the effectiveness and efficiency of the software development processes in line with organizational goals.


To learn more about software click here: brainly.com/question/32393976

#SPJ11

What are the two contextual tabs that appear when working with PivotTables?
A) Format and Design
B) Analyze and Format
C) Data and Format
D) Analyze and Design

Answers

Answer:

D.Analyze and Design

Answer: D. Analyze and Design.

Explanation: It is the correct answer on Edg.

Have a nice day. :)

What are the two contextual tabs that appear when working with PivotTables?A) Format and DesignB) Analyze

PLEASE HELP I DONT HAVE TME

PLEASE HELP I DONT HAVE TME

Answers

9514 1404 393

Answer:

  (d)

Explanation:

The cell reference to pi in D3 must be absolute ($D$3), and the value of the radius in A2 must be cubed (A2^3). The product of these must be multipied by 4/3. The only choice with these correct is the last choice.

Other Questions
Kellwood Co. bonds have 7% coupon rate, 6% yield to maturity, and will mature on January 31st, 2025. The semi-annual coupon payments are scheduled on January 31st and July 31st of each year. Today is September 30th, 2022.1) What is the flat price of the bond? (t: number of coupon payments to collect before expiration date?2) What is the amount of accrued interests? What would be the invoice price if you buy the bond today? differences in an organisms traits such as lactose intolerance are determined by differences in? Mexican art and culture have been strongly influenced by the original and civilization of the region HELP! Need to finish this or my dad will go nuts. what happens when ?? Fresh red flower is introduced into a vessel contain Sulphur dioxide alongwith moisture. Jennifer and her friend are going to a craft fair. Jennifer has $15.20. About how many pairs of earrings can she buy at the fair if each pair costs $4.70? Consider the following cuckoo hashing with 2 tables. Both tables have a size of 11. The hashing function of the first table is: hi(k) = k mod 11 The hashing function of the second table is: h2(k) = lii) mod 11 = (Note: mod is the modulo operation. It returns the remainder of a division. For example, "3 mod 11 = 3" and "20 mod 11 = 9") The following sequence of insert operations are performed: Insert 50 Insert 53 Insert 75 Which of the following is TRUE after the above operations? The first table is empty O 75 is in the first table O 50 is in the second table O 53 is in the first table The second table is empty Women in the United States have a higher rate of depression than do men. Which kind of psychologist would be most likely to explain this higher incidence in terms of the pressures and prejudices that women suffer PLEASE HELP!!!! The focus of a parabola is (6,3) . The directrix of the parabola is y=4.What is the equation of the parabola?y=1/28(x+6)^2+1/2y=1/28(x1/2)^26y=1/14(x+1/2)^2+6y=1/14(x+6)^2+1/2The directrix of a parabola is y=4. The focus of the parabola is (2,2) .What is the equation of the parabola?y=1/4(x2)^23y=1/4(x+2)^23y=1/8(x+2)^2+3y=1/8(x2)^23The directrix of a parabola is y=9. The focus of the parabola is (2,5).What is the equation of the parabola?y=1/8(x2)^2+7y=1/8(x2)^27y=1/8(x2)^27y=1/8(x2)^2+7 How many moles are contained in 539.2 grams of Al(NO3)3 National heritage reflect our identity and glory justify Which of the following scenarios represents a safe situation for the child?A.A child gets yelled at by parents and blamed for things they did not do, but they never lay a finger on them.B.A parent constantly protects a child during the other parent's mood swings and aggression.C.Parents occasionally argue after the child is in bed, but it's not frequent nor does it happen in front of the child.D.all of the above Who was the Romantic period artist known as the Romantic painter printmaker? Miller's Quarter Horse Company has sales of $4,500,000. It also has invested assets of $2,500,000 and operating expenses of $3,800,000. The company has established a minimum rate of return of 7%. Required: (a) What is Miller's profit margin? Round your answer to one decimal place. % (b) What is the investment turnover? Round your answer to one decimal place. (c) What is the rate of return on investment? % (d) What is Miller's residual income? $ The discriminant of a quadratic equation is 40. What is the nature of the solutions? Select the range of the following relation { (20, 2), (30, 4), (40, 1), (50, 2)} A {1, 2, 3) B {1,2,4} C {1, 2, 3, 4) D {2, 3, 4) The Saga Food Company produces one type of frozen dinner sold directly to consumers and to restaurants. The inverse demand and marginal revenue functions for Saga's frozen dinner by consumers (market 1) and restaurants (market 2) are, respectively, P 1 =5505Q 1 and P 2 =3001.25Q 2 Saga's total cost function is TC=10,000+50Q. (a) What are the necessary conditions for operating price discrimination by Saga Food Company? (3 marks) (b) What profit-maximising rule will Saga Food Company employ to set prices as a price discriminator? Algebraically determinethe best level of outputandhow the firm should distribute its sales in each market in order to maximise total profits with price discrimination, and compute the price charged in each market and the total profit made. (15 marks) (c) Calculate the point price elasticity of demand for consumers and restaurants at each best level of output. Are the differences in these price elasticities consistent with yourrecommended price differences in part (b)? Bondholders are willing to pay a premium to acquire a bond because the:A) company has a low credit rating.B) bond's stated interest rate is higher than the market interest rate.C) bond's stated interest rate is lower than the market interest rate.D) bond's stated interest rate is equal to the market interest rate. Find the slope of the line graphed below Find f(a),f(a+h), and the difference quotient hf(a+h)f(a) , where h=0 f(x)=3x 2 +2f(a)=f(a+h)=hf(a+h)f(a) =