Streams are created within tabs, similar to how you create individual files within a broader file folder.
What is streams and tabs?Tabs in Hootsuite account is a feature to categorized the business or personal social media or apps for networking to the given unique spaces. So it is to make user easier to view all social media, apps, or social network that user owned.
Streams in Hootsuite account is a feature to display the connected social media or apps for networking. So it is to make user can easier monitoring user social media or apps for networking.
The basically the dashboard in Hootsuite will divided to several tabs and tabs will divided to several streams. So, we can assuming the streams is a files and the tabs is a folders.
Learn more about file here:
brainly.com/question/28288938
#SPJ4
Write an application that displays every perfect number from 1 through 1,000. A perfect number is one that equals the sum of all the numbers that divide evenly into it. For example, 6 is perfect because 1, 2, and 3 divide evenly into it, and their sum is 6; however, 12 is not a perfect number because 1, 2, 3, 4, and 6 divide evenly into it, and their sum is greater than 12.
Answer:
Written in Python
for num in range(1,1001):
sum=0
for j in range(1,num+1):
if num%j==0:
sum = sum + j
if num == sum:
print(str(num)+" is a perfect number")
Explanation:
This line gets the range from 1 to 1000
for num in range(1,1001):
This line initializes sum to 0 for each number 1 to 1000
sum=0
This line gets the divisor for each number 1 to 1000
for j in range(1,num+1):
This following if condition line checks for divisor of each number
if num%j==0:
sum = sum + j
The following if condition checks for perfect number
if num == sum:
print(str(num)+" is a perfect number")
How will you switch between the two views of a table
To switch between table views, in Microsoft Access, use the down arrow next to the View button on the toolbar (it's the leftmost button). Then, from the drop-down list that appears, choose the view you want.
What is a table in Access?A table is a data definition and storage object. Access prompts you to define fields, also known as column headers, when you create a new table. Each field must have a distinct name as well as a data type.
A relational database, such as Access, often has numerous connected tables. Each table in a well-designed database holds data about a certain subject, such as personnel or items.
Learn more about Access at:
https://brainly.com/question/31237339
#SPJ1
Full Question:
How can you switch between the different views of the table in Access?
If you had to make a choice between studies and games during a holiday, you would use the _______ control structure. If you had to fill in your name and address on ten assignment books, you would use the ______ control structure.
The answers for the blanks are Selection and looping. Saw that this hasn't been answered before and so just wanted to share.
The missing words are "if-else" and "looping".
What is the completed sentence?If you had to make a choice between studies and games during a holiday, you would use the if-else control structure. If you had to fill in your name and address on ten assignment books, you would use the looping control structure.
A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.
Learn more about looping:
https://brainly.com/question/30706582
#SPJ1
The intentional defacement or destruction of a website is called: Group of answer choices spoofing. cybervandalism. cyberwarfare. phishing. pharming.
Answer:
cybervandalism
Explanation:
The intentional defacement or destruction of a website is called cybervandalism. This ultimately implies that, cybervandalism is carried out or done by someone through the use of computer technology such as an internet to destroy data (informations).
Additionally, the defacement or destruction of a website simply means changing the appearance and data relating a website. Some of the tools use for cybervandalism is a file transfer protocol (FTP), structured query language (SQL) injection etc.
In may 2005, President Donald Trump's Wikipedia web page was vandalized by an attacker.
It should be noted that intentional defacement or destruction of a website is called cybervandalism.
Cybervandalism can be regarded as the damage or destruction which is been carried out in digital form.
It may involves the cyber vandals which involves the defacing of a website.Therefore, cybervandalism serves as intentional defacement or destruction of a website.
Learn more about cybervandalism at;
https://brainly.com/question/11408596
A customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practicing presentation skills. As a salesperson what size hard disc would you recommend and why?
Answer:
at this day and age, any. My questions would focus around other applications at this point. 250 gb or larger.
Explanation:
Office 365 only uses 4 GB "Microsoft's store page", the smallest hard drives commonly available are 250 GB and larger.
Which of these ports listed is the fastest? IEEE 1394 USB2.0 FIREWIRE ESATA
The port which is the fastest is ESATA.
What is ESATA?eSATA can be described as the SATA connector which can be access from outside the computer and it help to give the necessary signal connection that is needed for external storage devices.
The eSATA serves as a version of the eSATA port which is been regarded as the External SATA port, therefore, The port which is the fastest is ESATA.
Read more on the port here:
https://brainly.com/question/16397886
#SPJ1
to remove all the even numbers from input row array inrowarray, which contains integer numbers. the function removeevens should use the mod internal function and operate on a row array of any length. hint: logical indexing and the double square brackets [] should be used. the mod function should be used to identify even numbers, along with combination with logical indexing, and the empty array operator [] to remove the even numbers. restrictions: loops should not be used. ex: inputrowarray
Inverse numbers only 1D Arrays To remove all the even numbers from the input row array inRowArray, which contains integer values, create a method named removeEvens.
The internal function mod should be used by the removeEvens function, which can operate on a row array of any length. In the R programming language, the single and double square brackets are utilized as indexing operators. Both of these operators are used to refer to the parts of R storage objects as an element or as a subset of the same data type.
# declaring a numeric vector
vec <- c(1:10)
print ("Original Vector")
print (vec)
# using single bracket
print ("Singular brackets")
print(vec[5])
# using dual bracket
print ("Double brackets")
print (vec[[5]])
Learn more about function here-
https://brainly.com/question/28939774
#SPJ4
How to use this program
Answer:
there is no problem
Explanation:
but i hope i can help one day
State methods of minimizing dust in a computer laboratory.
Answer:
well you could use a blower to remove dust in a computer laboratory
64 bit numbers require how many
adders?
Explanation:
Figure 5(b) shows the block diagram of 64-bit Common Boolean Logic based adder. There are 4 blocks, having 16 blocks each, which means 64 blocks of Common Boolean Logic.
Answer:
16 blocks each
Explanation:
2.5 lesson practice edhesive
Answer:
Huh,.......? what.....?
Answer:
1. They are contained in the math module.
2. 0, 1, ... 7
3. 0.0 <= r < 5
Explanation:
When it comes to cyberbullying, “power imbalance” is the term used for
Answer:
no
Explanation:
because
Answer:
intimidating someone online with threats
Explanation:
Just did the quiz on edg
Can someone help me with the following logical circuit, perform two actions. FIRST, convert the circuit into a logical
statement. SECOND, create a truth table based on the circuit/statement. (20 pts. each for statement and
truth table.
Creation of Truth Table Based on the logical statement, we can create a truth table as shown below:
A B (not A) (not A) and B (not A) and B or A A or (not A) and B 0 0 1 0 1 0 0 1 0 0 1 0 1 1 0 1 1 0 1 1 1 0 1 1 0 1 1 0 1 1 1
The first two columns show the input values, the next column shows the output of the NOT gate, then the output of the AND gate, then the output of the OR gate and finally the output of the logical statement.
We can observe that the output of the logical statement is the same as the output of the OR gate.
Given the logical circuit, we are required to perform two actions on it. Firstly, convert the circuit into a logical statement. Secondly, create a truth table based on the circuit/statement. Let's understand how to do these actions one by one:Conversion of Circuit into Logical Statement.
The given circuit contains three components: NOT gate, AND gate and OR gate. Let's analyze the working of this circuit. The two input variables A and B are first passed through the NOT gate, which gives the opposite of the input signal.
Then the NOT gate output is passed through the AND gate along with the input variable B. The output of the AND gate is then passed through the OR gate along with the input variable A.We can create a logical statement based on this working as: (not A) and B or A. This can also be represented as A or (not A) and B. Either of these statements is correct and can be used to construct the truth table.
Creation of Truth Table Based on the logical statement, we can create a truth table as shown below:
A B (not A) (not A) and B (not A) and B or A A or (not A) and B 0 0 1 0 1 0 0 1 0 0 1 0 1 1 0 1 1 0 1 1 1 0 1 1 0 1 1 0 1 1 1
In the truth table, we have all possible combinations of input variables A and B and their corresponding outputs for each component of the circuit.
The first two columns show the input values, the next column shows the output of the NOT gate, then the output of the AND gate, then the output of the OR gate and finally the output of the logical statement.
We can observe that the output of the logical statement is the same as the output of the OR gate.
For more such questions on Truth Table, click on:
https://brainly.com/question/13425324
#SPJ8
While setting up a computer on the network, you use 'ipconfig' and see that the IP address is currently 10.24.16.160, with subnet mask 255.255.255.192. Where did the IP address likely come from?
Answer:
Explanation:
The IP address either came from your router or your Internet Service Provider (ISP). Sometimes ISP's automatically assign every device under their network an IP address, while other times they allow each individual's home network router to determine the IP of every connected device. This router can either assign an automatic IP address to each device from a range of addresses or the IP address can be assigned manually to each device as static.
Provide an example of an IT project from your readings, experience, and/or other sources and discuss some of the challenges faced in its implementation. Suggest ways to overcome such challenges to achieve successful outcomes.
Answer:
kindly check the explanation.
Explanation:
Getting any project to be a successful one is not an easy task at all as many projects failed even before it nears completion stage. The Project Management Institute[PMI] states that only 69% [mean percentage] are able to complete and meet the original goals for and business intent of the project.
The reasons behind this failed IT projects are numerous, few of them are given below:
=> When estimates for the IT project is inaccurate. Th inaccuracy do cause IT projects to not meet the target.
=> When the available resources are not enough and there is poor project management it causes the IT projects to fail.
=> When team members are not diligent. The procrastination of team members do lead to failed projects.
The ways that such problems can be overcome in order to to achieve successful outcomes is given below;
=> Someone should be held accountable. That is there should be a seasoned and qualify project manager to supervise the project and can be hold accountable for how things turns how to be.
=> The scope of the project should be flexible so that when things changes the plan can also change.
=> Making sure that all the estimates are accurate.
When would it be necessary to edit the information shown on an electronic business card?
Answer:
It's D dear
Explanation:
Answer:
D. to show only relevant information to people inside your organization
Explanation:
hope this helps :)
diffention of window vista
A significant update to Microsoft's Windows NT operating system is Windows Vista. The longest gap between versions of a Microsoft Windows desktop operating system at the time, Windows XP, which was launched five years prior, was directly replaced by it.
**IN PYTHON**
Write a program that uses a loop and a half to prompt a user for a password. You should prompt the user for the password. If they get it correct, break out of the loop. If they don’t get it correct, you should give them an error message and ask again.
Sample Run:
Enter password: 123123
Sorry, that did not match. Please try again.
Enter password: password
Sorry, that did not match. Please try again.
Enter password: CODEHS
Sorry, that did not match. Please try again.
Enter password: abc123
You got it!
Note: You need to set SECRET to abc123 to run the tests
Answer:
SECRET = "abc123"
while True:
p = input("Enter password: ")
if p != SECRET:
print("Sorry, that did not match, Please try again.")
else:
print("You got it!")
break
Explanation:
SECRET = "abc123" will be used in the language of python that was created.
What is Python?Python is a PC programming language frequently used to fabricate sites and programming, robotize errands, and direct information examination. Python is a universally useful language. This language tends to be utilized to make a wide range of projects and isn't particular for a particular issue.
To maintain a user attempting to enter the password, we have used a while loop that never ends. We employ an if-else structure in the loop to determine the password. If it is "abc123," the passcode is discovered, and the loop is broken.
SECRET = "abc123"
There is a function and if that is true, then
p = input("Enter password: ")
The if function will be implemented.
if p != SECRET:
print("Sorry, that did not match, Please try again.")
The else function will be implemented:
else:
print("You got it!")
break
Learn more about Python, here:
https://brainly.com/question/30427047
#SPJ3
You are given an array of integers, each with an unknown number of digits. You are also told the total number of digits of all the integers in the array is n. Provide an algorithm that will sort the array in O(n) time no matter how the digits are distributed among the elements in the array. (e.g. there might be one element with n digits, or n/2 elements with 2 digits, or the elements might be of all different lengths, etc. Be sure to justify in detail the run time of your algorithm.
Answer:
Explanation:
Since all of the items in the array would be integers sorting them would not be a problem regardless of the difference in integers. O(n) time would be impossible unless the array is already sorted, otherwise, the best runtime we can hope for would be such a method like the one below with a runtime of O(n^2)
static void sortingMethod(int arr[], int n)
{
int x, y, temp;
boolean swapped;
for (x = 0; x < n - 1; x++)
{
swapped = false;
for (y = 0; y < n - x - 1; y++)
{
if (arr[y] > arr[y + 1])
{
temp = arr[y];
arr[y] = arr[y + 1];
arr[y + 1] = temp;
swapped = true;
}
}
if (swapped == false)
break;
}
}
construct a row array countvalues from startvalue to endvalue, elements decremented by -2 end ex: if startvalue is 10 and endvalue is 0, countvalues should be [10, 8, 6, 4, 2, 0].
To construct a row array countvalues from startvalue to endvalue, elements decremented by -2 end ex: if startvalue is 10 and endvalue is 0, countvalues should be [10, 8, 6, 4, 2, 0] check the code given below.
What is an array?A collection of elements (values or variables) is referred to as an array in computer science. Each element is identified by at least one array index or key. An array is stored so that a mathematical formula can be used to determine each element's position from its index tuple. A linear array, also known as a one-dimensional array, is the simplest type of data structure.
Almost every program uses arrays, which are among the most well-known and significant data structures. Many other data structures, including lists and strings, are implemented using them as well. They successfully abuse the way computers handle addresses. A one-dimensional array of words with addresses as their indices makes up the memory in the majority of contemporary computers and many external storage devices.
↓↓//CODE//↓↓
function countValues = CreateArray(startValue, endValue)
%startValue: Start value of array.
%endValue: Ending alue of array.
%Construct a row aray countValues from startValue
%to endValue, elements decremented by -2
countValues = 0;
j = 1;
for i = startValue : -2 : endValue
countValues(j) = i;
j = j + 1;
end
end
Learn more about array
https://brainly.com/question/28061186
#SPJ4
You are a sports writer and are writing about the world legend mushball tournament. And you are doing an article on the 2 wildcard teams the 2 teams with the best record who are not. Division? Leaders according to. The table shown which two teams are the wild card teams?
The two teams are not division leaders, but their records are impressive enough to get them to participate in the tournament. The teams' records are as follows: Team C with 8-3 record and Team D with a 7-4 record. These teams are the second-best teams in their respective divisions, and that is what gets them a spot in the tournament.
The table presented depicts a ranking of teams for a particular tournament. Wildcard teams are teams that do not lead their divisions but have the best records; they get to participate in the tournament. In this case, we will determine the two wildcard teams and their records based on the table.
The wild card teams in the world legend mushball tournament are Team C and Team D.Team C and Team D are the two wildcard teams in the tournament. They are selected based on their record, as shown in the table. Wildcard teams are often determined by the records of the teams.
The two teams are not division leaders, but their records are impressive enough to get them to participate in the tournament. The teams' records are as follows: Team C with 8-3 record and Team D with a 7-4 record. These teams are the second-best teams in their respective divisions, and that is what gets them a spot in the tournament.
The wildcard teams offer a chance to other teams that may not have made the playoffs a chance to show their skills. The top team in each division automatically qualifies for the playoffs, and the other spots go to the wild card teams. Wild card teams are often the teams that show resilience and a fighting spirit; they do not give up easily and always give their best.
For more such questions on tournament, click on:
https://brainly.com/question/28550772
#SPJ8
I have no idea what I’m doing and this is due in 45 minutes
Answer:
Not enough info...
Explanation:
Nathan wants to use the Push transition from left to right in his presentation. After he selects the Push transition, what should he do next? Select the From Left option from the Effect Options drop-down menu. Select the From Left option from the Transition group drop-down menu. Select the From Right option from the Effect Options drop-down menu. Select the From Top option from the Transition group drop-down menu
After he selects the Push transition, He should select from Left option from the Effect Options drop-down menu.
What is push transition in PowerPoint?The Push Transition Effect is known to be a function in a PowerPoint that helps to pushes one slide to show the other.
Note that when this is applied to any presentation, it moves the current slide upwards to reveal the next slide and so on. A person can add use this kind of effect to present a scrolling effect to one's PowerPoint work.
Learn more about presentation from
https://brainly.com/question/24653274
Answer:
A
Explanation:
the answer is A
With software prefetching, it is important to be careful to have the prefetches occur in time for use but also to minimize the number of outstanding prefetches to live within the capabilities of the microarchitecture and minimize cache pollution. This is complicated by the fact that different processors have different capabilities and limitations. a. [15] <2.3> Create a blocked version of the matrix transpose with software prefetching. b. [20] <2.3> Estimate and compare the performance of the blocked and unblocked transpose codes both with and without software prefetch
According to the video, what types of education are useful for Database Administrators? Check all that apply.
high school degrees
college degrees
certification
communication workshops
Done
Intro
Answer:
b.college degrees
c.certification
Explanation:
The type of education useful for Database Administrators are college degrees and certifications. The correct options are b and c.
What are Database Administrators?A database management system typically supports the platforms' administration, development, and use. A Relation Database Management System (RDBMS) is a category of Database Management System (DBMS) that includes a structure (row-based table) that connects data pieces as well as operations that are intended to ensure the data's accuracy, security, consistency, and integrity.
They are capable of doing this since they are familiar with database administration tools and technologies. Currently, one of the most sought-after jobs in America is database administration.
Hospitals, banks, and insurance corporations are a few examples. To put it another way, database administrators are in charge of creating, maintaining, and protecting your databases.
Therefore, the correct option is b. college degrees, and c. certification.
To learn more about Database Administrators, refer to the link:
https://brainly.com/question/13261952
#SPJ6
IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?
Answer:
Sweden or Wales maybe?
Explanation:
Hope this helps!
Answer:
America if you play in secret
Explanation:
Describe one health problem related to fertilizers?
Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.
The three genuine statements almost how technology has changed work are:
Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.Technology explained.
Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.
Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.
Learn more about technology below.
https://brainly.com/question/13044551
#SPJ1
you have a 10vdg source available design a voltage divider ciruit that has 2 vdc , 5vdc , and 8 vdc available the total circuit current is to be 2mA
If you try to divide 10V in three voltages, the sum of the three voltages must be equal to the total voltage source, in this case 10V. Having said this, 2 + 5 + 8 = 15V, and your source is only 10V. So you can see is not feasible. You can, for example, have 2V, 5V and 3V, and the sum is equal to 10V. Before designing the circuit, i.e, choosing the resistors, you need to understand this. Otherwise, I suggest you to review the voltage divider theory.
For instance, see IMG2 in my previous post. If we were to design a single voltage divider for the 5VDC, i.e, 50% of the 10V source, you generally choose R1 = R2., and that would be the design equation.
Jeremy has created a snippet of JavaScript. Which event handlers will he use to invoke JavaScript from his HTML form?
onClick
SelectedIndex
onCheck
onSubmit
inputText
Answer:
One of them is OnClick, but there are more.
Explanation:
I took my post test and only clicked OnClick and I missed this one and it says "not all correct answers chosen"
Answer:
The TWO correct answers are:
onClick
onSubmit