Answer:
where is the pic of question actually its not possible to edit question so put another question with pic okay have a nice day
What is Naptha used for?
Answer:
Naphtha is used to dilute heavy crude oil to reduce its viscosity and enable/facilitate transport; undiluted heavy crude cannot normally be transported by pipeline, and may also be difficult to pump onto oil tankers. Other common dilutants include natural-gas condensate, and light crude.
Answer:
Naphtha is used for laundry soaps and clearing fluids
High Hopes^^
Barry-
What characteristic of RAM makes it unsuitable for permanent
storage?
Volatile
too slow
all of the above
not reliable
Answer:
Volatile
Explanation:
Volatile means permenant
Question 7 of 10
What is a good way to turn an interview into a human interest story?
A. By presenting two people as one
B. By making up some information
C. By presenting the whole interview
D. By identifying a key quotation
SUBMIT
The ultimate way to convert an interview into a riveting human interest story is by pinpointing the central citation or story that encapsulates the quintessence of the interviewee's predicament or outlook.
How can this be done?This can act as the keystone for your tale, and interned throughout to provide the narrative plot.
It is crucial to feature the full encounter, though solely including the most pertinent and stirring sections. It is never permissible to fabricate details or coalesce two figures together. In consequence, the emphasis should be on narrating a companionable and fascinating story that reveals the personae element of the interviewee's tale.
Read more about interviews here:
https://brainly.com/question/8846894
#SPJ1
What complications are imposed if one tries to implement a dynamic list using a traditional one-dimensional array
Answer: The expansion of the list will be required to move to a new location;
So the complications that will be imposed if one tries to implement a dynamic list using a traditional one-dimensional array is that the expansion of the list will need to move to a new location.
Explanation: When we talk about arrays,we are referring to data structures that are useful when the number of entries that are to be stored inside a list is fixed.
But for one to implement a dynamic list which always grows or shrinks at run-time arrays cannot be useful.This is because any alteration will make the entire array to be altered.
Engineers job at its most basic level is.... a. Problem solving b. Communication c. Making things c. Design
It it C. Design .
I hope it's right
Microsoft's HoloLens provides a(n) __________ experience, where the real world is supplemented with computer-generated information.
Microsoft's HoloLens provides an AUGMENTED REALITY experience, where the real world is supplemented with computer-generated information. They were developed as Project Baraboo.
Augmented realityAugmented reality refers to the interactive experience in which the real objects are enhanced by computer-generated information.
The Microsoft HoloLens contains multiple sensors and holographic processing to create a virtual world of augmented reality.
Microsoft HoloLens was developed by Project Baraboo.
Learn more about augmented reality here:
https://brainly.com/question/9054673
what do you type in the terminal then? for c++ 4-4 on cengage
In this exercise we have to use the knowledge of computational language in C++ to write a code that write my own console terminal in C++, which must work .
Writting the code:int main(void) {
string x;
while (true) {
getline(cin, x);
detect_command(x);
}
return 0;
}
void my_plus(int a, int b) {
cout << a + b;
}
void my_minus(int a, int b) {
cout << a - b;
}
void my_combine(string a, string b) {
?????????????;
}
void my_run(?????????) {
???????????;
}
void detect_command(string a) {
const int arr_length = 10;
string commands[arr_length] = { "plus", "minus", "help", "exit" };
for (int i = 0; i < arr_length; i++) {
if (a.compare(0, commands[i].length(), commands[i]) == 0) {
?????????????????????;
}
}
}
See more about C++ at brainly.com/question/19705654
#SPJ1
Question providede in the document please use my provided codes!!
Answer:
become successful in your Photo to the best of all time favorite
A formula in cell d1 of this spreadsheet gives a result of 8 which formula was most likely entered in cell d1
A formula in cell d1 of this spreadsheet gives a result of 8 which formula was most likely entered in cell d1 A1 A1 / B1 ;
(D1 - A1) / B1 ;
(A1 - E1*A1) / B1
What is the equation?A1 = original price of car
B1 = annual Depreciation amount
Number of years it will take for the car to depreciate totally :
Using the straight line Depreciation relation :
y = mx + c
c = intercept = initial or original value of car
m = annual Depreciation amount
x = number of years
y = value after x years
For total Depreciation, final value, y = 0
0 = mx + c
mx = - c
x = - c / m
Hence, x = A1 / B1
D1 = car value
Length it will take for car to depreciate to value in D1 :
y = mx + c
y = D1; m = B1 ; c = A1
D1 = B1x + A1
B1x = D1 - A1
x = (D1 - A1) / B1
Therefore, A formula in cell d1 of this spreadsheet gives a result of 8 which formula was most likely entered in cell d1 A1 A1 / B1 ;
(D1 - A1) / B1 ;
(A1 - E1*A1) / B1
Learn more about spreadsheet on:
https://brainly.com/question/8284022
#SPJ1
After reading through the code, what will happen when you click run?
Answer:
B.) Laurel will try to collect treasure when there is not any and it causes an error
Explanation:
Laurel is at the top right corner of the map. When you click run, laurel moves 1 step ahead. This spot is right above the coordinate of the very first diamond. There is no treasure at this spot.
Therefore, when the next command calls for collecting, there will be an error, as there is no treasure at the spot right above the first diamond.
6. After you've searched for flowers with fewer than 100 in stock, you realize you also want to know
which of these flowers are used in the pre-made arrangements. Use multiple parameters to search for
these results. Generate a report showing all the flowers with fewer than 100 in stock that are also
used in the pre-made arrangements.
To generate the report, you have to do the following:
Retrieve the data for flowers with fewer than 100 in stockRetrieve the data for flowers used in pre-made arrangementsCompare the two sets of dataGenerate the reportHow to generate the reportRetrieve the data for flowers with fewer than 100 in stock:
Iterate through your flower data and filter out the flowers with a stock quantity less than 100.
Retrieve the data for flowers used in pre-made arrangements:
Iterate through your pre-made arrangement data and extract the flowers used in each arrangement.
Compare the two sets of data:
Iterate through the filtered flower data from step 1 and check if each flower is present in the pre-made arrangement data from step 2.
Generate the report:
For each flower that meets the criteria (fewer than 100 in stock and used in pre-made arrangements), output the relevant information in a report format.
Read more on generated reports here:https://brainly.com/question/20595262
#SPJ1
What feature did the 32X add to the Sega Genesis?
Answer:
ngl why would i know this
Explanation:
It allowed the console to run 32-bit cartridges.
This program extends the earlier "Online shopping cart" program. (Consider first saving your earlier program).
(1) Extend the ItemToPurchase struct to contain a new data member. (2 pt)
char itemDescription[ ] - set to "none" in MakeItemBlank()
Implement the following related functions for the ItemToPurchase struct.
PrintItemDescription()
Has an ItemToPurchase parameter.
(2) Create three new files:
ShoppingCart.h - struct definition and related function declarations
ShoppingCart.c - related function definitions
main.c - main() function (Note: main()'s functionality differs from the warm up)
Build the ShoppingCart struct with the following data members and related functions. Note: Some can be function stubs (empty functions) initially, to be completed in later steps.
Data members (3 pts)
char customerName [ ]
char currentDate [ ]
ItemToPurchase cartItems [ ] - has a maximum of 10 slots (can hold up to 10 items of any quantity)
int cartSize - the number of filled slots in array cartItems [ ] (number of items in cart of any quantity)
Related functions
AddItem()
Adds an item to cartItems array. Has parameters of type ItemToPurchase and ShoppingCart. Returns ShoppingCart object.
RemoveItem()
Removes item from cartItems array (does not just set quantity to 0; removed item will not take up a slot in array). Has a char[ ](an item's name) and a ShoppingCart parameter. Returns ShoppingCart object.
If item name cannot be found, output this message: Item not found in cart. Nothing removed.
ModifyItem()
Modifies an item's description, price, and/or quantity. Has parameters of type ItemToPurchase and ShoppingCart. Returns ShoppingCart object.
GetNumItemsInCart() (2 pts)
Returns quantity of all items in cart. Has a ShoppingCart parameter.
GetCostOfCart() (2 pts)
Determines and returns the total cost of items in cart. Has a ShoppingCart parameter.
PrintTotal()
Outputs total of objects in cart. Has a ShoppingCart parameter.
If cart is empty, output this message: SHOPPING CART IS EMPTY
PrintDescriptions()
Outputs each item's description. Has a ShoppingCart parameter.
(3) In main(), prompt the user for a customer's name and today's date. Output the name and date. Create an object of type ShoppingCart. (1 pt)
(4) Implement the PrintMenu() function in main.c to print the following menu of options to manipulate the shopping cart. (1 pt)
(5) Implement the ExecuteMenu() function in main.c that takes 2 parameters: a character representing the user's choice and a shopping cart. ExecuteMenu() performs the menu options (described below) according to the user's choice, and returns the shopping cart. (1 pt)
(6) In main(), call PrintMenu() and prompt for the user's choice of menu options. Each option is represented by a single character.
If an invalid character is entered, continue to prompt for a valid choice. When a valid option is entered, execute the option by calling ExecuteMenu() and overwrite the shopping cart with the returned shopping cart. Then, print the menu and prompt for a new option. Continue until the user enters 'q'. Hint: Implement Quit before implementing other options. (1 pt)
(7) Implement the "Output shopping cart" menu option in ExecuteMenu(). (3 pts)
8) Implement the "Output item's description" menu option in ExecuteMenu(). (2 pts)
(9) Implement "Add item to cart" menu option in ExecuteMenu(). (3 pts)
(10) Implement the "Remove item from cart" menu option in ExecuteMenu(). (4 pts)
(11) Implement "Change item quantity" menu option in ExecuteMenu(). Hint: Make new ItemToPurchase object before using ModifyItem() function. (5 pts)
Answer:
To create an online shopping cart. You need to do the following:
Update the ItemToPurchase struct to include a new data member called itemDescription.
Create three new files: ShoppingCart.h, ShoppingCart.c, and main.c.
Build the ShoppingCart struct with the following data members: customerName, currentDate, cartItems (which can hold up to 10 items of any quantity), and cartSize.
Implement the AddItem, RemoveItem, ModifyItem, GetNumItemsInCart, GetCostOfCart, PrintTotal, and PrintDescriptions functions for the ShoppingCart struct.
In the main function, prompt the user for a customer's name and today's date, and create an object of type ShoppingCart.
Implement a menu of options to manipulate the shopping cart in the PrintMenu function in main.c.
Implement the ExecuteMenu function in main.c to perform the menu options according to the user's choice.
Implement the "Output shopping cart" menu option in ExecuteMenu.
Implement the "Output item's description" menu option in ExecuteMenu.
Implement the "Add item to cart" menu option in ExecuteMenu.
Implement the "Remove item from cart" menu option in ExecuteMenu.
Implement the "Change item quantity" menu option in ExecuteMenu.
Note: Each step has a point value assigned to it, and some steps have hints provided.
describe the criteria for classfying computer
Based on historical evolution (computer generation), usage, technology, size, and storage capacity, computers are classified into many sorts.
What is the classification of the computer?They are categorized based on functionality, purpose, and data management. Computers can be classified as general- or specialized-purpose devices. The functions of general-purpose computers are many. They can hold a large number of programs, but they are slow and ineffective.Computers with a specific purpose are built to solve a particular issue or complete a certain activity. The machine has a set of instructions built in.Computers can be analog, digital, or hybrid depending on how their data is handled. Analog computers operate on the measurement principle, which converts measurements into data. Electrical parameters, such as voltages, resistances, or currents, are frequently used by modern analog computers to represent the quantities being manipulated.Learn more about computers refer to :
https://brainly.com/question/24540334
#SPJ9
Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)
if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):
The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):
In the given statement, the condition is that a person should be 18 years or older in order to vote.
The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.
This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.
Let's analyze the other if statements:
1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.
However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.
2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.
Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.
3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.
While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.
For more questions on Boolean condition
https://brainly.com/question/26041371
#SPJ8
If you need to define a connection request policy to apply to an 802.1x authenticating switch or a wireless access point, which NAS type must be selected? Group of answer choices
Answer:
The correct answer to the following question will be "Unspecified".
Explanation:
NAS provides a comprehensive assessment management infrastructure that guarantees the borrowing market with quick, accurate as well as cost-effective taking values.There is a particular form of Link Requirement Policy. And therefore to use the NAS for something like an 802.1x authentication switch or circuit (Cisco Switches and many more) or perhaps a wireless access point.So that the NAS must be Unspecified.
Assume the data link protocol used by NDAS has the following associated characteristics:
An 8-bit ASCII code is used. Each frame has a size (length) of 11936 bits. A half-duplex circuit with a speed of 1 million bits per second is used for transmission. There is a 30-millisecond turnaround time on the half-duplex circuit. Each frame contains 20 overhead (non-user-data) bytes. Assume that the probability of a frame requiring retransmission due to error in transmission is 1 percent. A millisecond is one-thousandth of a second. Also, 8 bits = 1 character = 1byte
Fill in the blanks
K= _________ bits per bytes
M=_________ bytes
C= _________ overhead bytes
Answer:
The transmission speed = 0.278 MB/s
Explanation:
K = 8 bits
M = 11936/8 bits = 1492 bits
transmission rate R = 1000000/ 8 = 125000 bps
overhead bytes C = 20
probability = 0.01
time T = 30 ms = 30 x10^-3 s
The data transmission speed formula = K(M-C)(1-p) / (M/R) + T
= 8( 1492 - 20)(0.99)/ (1492/125000) + 30 x10^-3
= 0.278 MB/s
The Yuba College Library would like a program to calculate patron fines for overdue books. Fines are determined as follows: Paperbacks Regular $.20 / day with a maximum fine of $8.00 Best-Sellers $.50 / day with a maximum fine of $15.00 Magazines $.25 / day with a maximum fine of $5.00 Hardcover Books $.30 / day with a maximum fine of $23.00 The program must prompt the user to enter the following information at the keyboard. Data entry MUST be validated as required. Fines must also be calculated using a function(s). A class object should contain the methods (functions) to determine library fine. Provide a UML and description of disign.Patron’s library card number (a 4-digit number) - ValidatePatron’s namePatron’s addressType of book - ValidateNumber of days over due - ValidateA sample interactive session is shown below:Enter the patron’s card number: 2089Enter the patron’s name: Erica RobinsonEnter the patron’s address: 2234 RoadWay Trl.Enter the book’s title: The Trail Less Traveled.1. Paperback - Regular2. Paperback - Bestseller3. Magazine4. Hardcover bookEnter number corresponding to type of book (1 – 4): 4Enter the number of days overdue: 11Do you wish to perform another transaction?
Answer:
Explanation:
The following Python code creates all of the necessary functions in order to request and validate all of the inputs from the user. Once everything is entered and validated it calculates the total fee and outputs it to the user. Also calls the entire class at the end using a test variable...
class Customer:
library_card = 0
patrons_name = ""
patrons_address = ""
type_of_book = ""
book_title = ""
days_overdue = 0
fee = 0.0
book_list = ['paperback regular', 'paperback best seller', 'magazine', 'hardcover']
def __init__(self):
self.library_card = self.get_library_card()
self.patrons_address = input("Patron's Address: ")
self.book_title = input("Book Title: ")
self.type_of_book = self.get_type_of_book()
self.days_overdue = float(self.get_days_overdue())
self.calculate_total()
print("Your total Fee is: " + str(self.fee))
def get_library_card(self):
library_card = int(input("Enter 4-digit library card number: "))
if (type(library_card) == type(0)) and (len(str(library_card)) == 4):
return library_card
else:
print("Invalid Card number:")
self.get_library_card()
def get_type_of_book(self):
type_of_book = input("Type of Book 1-4: ")
if (int(type_of_book) > 0) and (int(type_of_book) <= 4):
return int(type_of_book)
else:
print("Invalid Type")
self.get_type_of_book()
def get_days_overdue(self):
days_overdue = input("Number of Days Overdue: ")
if int(days_overdue) >= 0:
return days_overdue
else:
print("Invalid number of days")
self.get_days_overdue()
def calculate_total(self):
if self.type_of_book == 1:
self.fee = 0.20 * self.days_overdue
if self.fee > 8:
self.fee = 8
elif self.type_of_book == 2:
self.fee = 0.50 * self.days_overdue
if self.fee > 15:
self.fee = 15
elif self.type_of_book == 3:
self.fee = 0.25 * self.days_overdue
if self.fee > 5:
self.fee = 5
else:
self.fee = 0.30 * self.days_overdue
if self.fee > 23:
self.fee = 23
test = Customer()
What is the difference between copy- paste and cut-paste
Answer:
Copy/ Paste - In the case of Copy/paste, the text you have copied will appear on both the locations i.e the source from where you copied the text and the target where you have pasted the text.
Cut/paste- In the case of Copy/paste, the text you have copied will appear on only one location i.e the target where you have pasted the text. The text will get deleted from the original position
You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!
Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.
Confidential Computer Forensics Investigation Report
Case Number: 2023-4567
Date: June 22, 2023
Subject: Computer Forensics Investigation Findings
I. Introduction:
The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.
II. Computer Information:
The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.
III. Access and Usage:
During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.
IV. Forensic Tools and Findings:
Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.
Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.
File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.
Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.
V. Conclusion:
Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.
The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.
Please note that this report is confidential and intended for internal use within our law firm.
Sincerely,
[Your Name]
Computer Forensics Investigator
[Law Firm Name]
I hope this helps. Cheers! ^^
C programming
Write a program which will have you guess the secret number (stored in a variable in the code). The person should guess the secret number, which is
from 0 to 1000, in 10 guesses or less. The program will tell you whether the answer is higher, lower, or correct compared to the guess.
We will be using only condition statements (no loops, functions or anything not covered to this point!).
Example: Lets say the number is 59 (stored in a variable and the user should not know what it is.. best if generated randomly our example program
shows an example of randomly generated numbers).
Please enter a number: 300
The number you are looking for is lower
Please enter a number: 100
The number you are looking for is lower
Please enter a number: 50
The number you are looking for is higher
Please enter a number: 59
You guessed the number!!
OR if they took longer than 10 guesses
You took longer than 10 guesses, you lose!
MUST NOT BE A LOOP
That was interseting, I used recursion instead of loops here. Here is my code:
#include <stdio.h>
#include <stdlib.h>
#include <time.h>
// Recursive function to guess the secret number
void guess_number(int secret_number, int max_guesses, int num_guesses) {
// Prompt the user to enter a guess
printf("Guess #%d: ", num_guesses + 1);
int guess;
scanf("%d", &guess);
// Check if the guess is correct, higher or lower than the secret number
if (guess == secret_number) {
printf("You guessed the number!!");
} else {
if (guess < secret_number) {
printf("The number you are looking for is higher\n");
} else {
printf("The number you are looking for is lower\n");
}
// Check if the maximum number of guesses has been reached
if (num_guesses == max_guesses - 1) {
printf("You took longer than %d guesses, you lose!\n", max_guesses);
} else {
// Make a recursive call to guess_number with an incremented number of guesses
guess_number(secret_number, max_guesses, num_guesses + 1);
}
}
}
int main() {
// Generate a random number between 0 and 1000
srand(time(0));
int secret_number = rand() % 1001;
// Set the maximum number of guesses to 10
int max_guesses = 10;
// Start the game
printf("Guess the secret number between 0 and 1000 in %d guesses or less.\n", max_guesses);
// Start the recursive function with the initial values
guess_number(secret_number, max_guesses, 0);
return 0;
}
Database systems are exposed to many attacks, including dictionary attack, show with implantation how dictionary attack is launched?(Java or Python) ?
A type of brute-force attack in which an intruder uses a "dictionary list" of common words and phrases used by businesses and individuals to attempt to crack password-protected databases.
What is a dictionary attack?
A Dictionary Attack is an attack vector used by an attacker to break into a password-protected system by using every word in a dictionary as a password for that system. This type of attack vector is a Brute Force Attack.
The dictionary can contain words from an English dictionary as well as a leaked list of commonly used passwords, which, when combined with common character replacement with numbers, can be very effective and fast at times.
To know more about the dictionary attack, visit: https://brainly.com/question/14313052
#SPJ1
Recall your technology experience in the workplace or at home. When adopting a new technology, what specific problems were you or your employer trying to resolve?
Describe your biggest challenge in adopting new technologies based on your experience.
Share how you or your employer overcame these issues.
Answer:
Use of technology helps solve issues like file management, receipt tracking, report generation and growth tracking that often hamper employee productivity. Modern workplaces extensively rely on computer-aided tools for efficiency. These tools help cut down both the time and money needed for getting the job done.
How do you implement new technology in the workplace?
To help you streamline the process, here are steps for integrating new technology into your organization:
Identify Your Organization's Needs.
Investigate Technologies That Will Solve Problems for Your Organization.
Develop a Plan for Implementing Your New Technology.
Train Other Employees in Using the New Technology
Keith is presenting a documentary he created. He most likely shot the documentary using a 1. digital camera 2.scanner 3. projector and edited the documentary on a 1. sound editing tool 2. media player 3. movie editing tool
Keith most likely shot the documentary using a digital camera and edited it on a movie editing tool. The correct option is A.
What is digital camera?A digital camera is a device that takes pictures and stores them digitally. Digital cameras have mostly replaced film-based cameras as the majority of those made today.
High-quality video and photographs may be captured with a digital camera, which is necessary for making a documentary.
While physical documents and photographs can be digitally preserved with scanners, videos are not routinely recorded using them.
A media player is a piece of software that can play audio and video files, although it's not frequently used to edit videos.
Although it is uncommon for a documentary to be produced with a projector, it is frequently utilized to show it to an audience.
Thus, the correct option is A.
For more details regarding digital camera, visit:
https://brainly.com/question/24155120
#SPJ9
When the function below is called with 1 dependent and $400 as grossPay, what value is returned?
double computeWithholding (int dependents, double grossPay)
{
double withheldAmount;
if (dependents > 2)
withheldAmount = 0.15;
else if (dependents == 2)
withheldAmount = 0.18;
else if (dependnets == 1)
withheldAmount = 0.2;
else // no dependents
withheldAmount = 0.28;
withheldAmount = grossPay * withheldAmount;
return (withheldAmount);
}
a. 60.0
b. 80.0
c. 720.0
d. None of these
Answer:
b. 80.0
Explanation:
Given
\(dependent = 1\)
\(grossPay = \$400\)
Required
Determine the returned value
The following condition is true for: dependent = 1
else if (dependnets == 1)
withheldAmount = 0.2;
The returned value is calculated as:
\(withheldAmount = grossPay * withheldAmount;\)
This gives:
\(withheldAmount = 400 * 0.2\)
\(withheldAmount = 80.0\)
Hence, the returned value is 80.0
Design an algorithm to generate the sequence of positive integers (In increasing order) whose only prime divisors are 2 and 3.
Answer:
es muy buena pero es muy difícil que ni yo pude entender
To classify wireless networks by coverage, which of the following are wireless networks?
A- WPAN
B-WLAN
C- WMAN
D- WWAN
Answer:
B -WLAN
Explanation:
Use the edit icon to pin, add or delete clips.
At the end of your research, you are to write an essay of at least 250 words explaining why you chose the school you did. Be sure to answer the following three questions:
What are the strengths of your school that caused you to select it?
What are some of your school's weaknesses?
What qualities caused you to eliminate the other schools?
There are a lot of ways to compose an essay. The essay explaining why you chose the school you did is given below.
Going to Harvard for My college educationThe Joy of choosing to school at Harvard is something that i will never forget in a hurray. Most times we need to get our dream school to better appreciate education.
In Harvard, one thing that i find their strength is in Liberal arts and sciences, which teach students to think critically, reason analytically, and write coherently, are the cornerstone of Harvard's academic life. Most students are engaged in General Education classes, which tends to aid them to link the things they learn in class to real life problems.
The oldest institution of higher education in the nation, Harvard is regarded as the top university in the world, it is situated in a prime location, and it has the largest endowment of any university. Harvard University's is one that do flaws such as Financial limitations and a lack of diversity at Harvard University and also Lack of long-term finances and a lack of technological and architectural improvements make it challenging to draw graduate students.
The Weaknesses that is hindering me from other school are:
There aren't enough extracurricular and sporting events.inadequate financing for particular sports or programs.increased information about cyberbullying.Not enough faculty or personnel.Learn more about Essay writing from
https://brainly.com/question/25607827
#SPJ1
Create a query that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan. Show in the query results only the sum of the balance due, grouped by PaymentPian. Name the summation column Balances. Run the query, resize all columns in the datasheet to their best fit, save the query as TotaiBalancesByPian, and then close it.
A query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.
In order to list the total outstanding balances for students on a payment plan and for those students that are not on a payment plan, a query must be created in the database management system. Below are the steps that need to be followed in order to achieve the required output:
Open the Microsoft Access and select the desired database. Go to the create tab and select the Query Design option.A new window named Show Table will appear.
From the window select the tables that need to be used in the query, here Student and PaymentPlan tables are selected.Select the desired fields from each table, here we need StudentID, PaymentPlan, and BalanceDue from the Student table and StudentID, PaymentPlan from PaymentPlan table.Drag and drop the desired fields to the Query Design grid.
Now comes the main part of the query that is grouping. Here we need to group the total outstanding balances of students who are on a payment plan and who are not on a payment plan. We will group the data by PaymentPlan field.
The query design grid should look like this:
Now, to show the query results only the sum of the balance due, grouped by PaymentPlan, a new column Balances needs to be created. In the field row, enter Balances:
Sum([BalanceDue]). It will calculate the sum of all balance dues and rename it as Balances. Save the query by the name TotalBalancesByPlan.Close the query design window. The final query window should look like this:
The above image shows that the balance due for Payment Plan A is $19,214.10, while for Payment Plan B it is $9,150.50.
Now, in order to resize all columns in the datasheet to their best fit, select the Home tab and go to the Formatting group. From here select the AutoFit Column Width option.
The final output should look like this:
Thus, a query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.
For more such questions on query, click on:
https://brainly.com/question/30622425
#SPJ8
Describe a problem you’ve solved or a problem you’d like to solve. It can be an intellectual challenge, a research query, an ethical dilemma — anything of personal importance, no matter the scale. Explain its significance to you and what steps you took or could be taken to identify a solution.
Answer:
Explanation:
I run an online e-commerce store and lately its been very difficult keeping track of customer detail, incoming orders, keyword generation etc. One solution that I thought about would be an application that controls all of that for me. In order to accomplish this I would first need to design and create a GUI that contains all of the necessary buttons and displays for the information. Then I would need to code a webscraper using Python to grab all of the data from e-commerce store as soon as it becomes available, organize it, and display it within the GUI.