guys can u help me write a program need help asp will give 25 points and brainlist if correct

Guys Can U Help Me Write A Program Need Help Asp Will Give 25 Points And Brainlist If Correct

Answers

Answer 1

import java.util.Scanner;

public class Lab04b_Numbers {

   

   public static void main(String[] args) {

       Scanner keyboard = new Scanner(System.in);

       System.out.print("Enter your GPA: ");

       double gpa = keyboard.nextDouble();

       System.out.print("Enter cost of a new car: ");

       double cost = keyboard.nextDouble();

       System.out.print("Enter average amount of rain this month: ");

       double rain = keyboard.nextDouble();

       System.out.print("What is your average for history class: ");

       double avg = keyboard.nextDouble();

       System.out.println("In 2020 a car cost $"+cost+".");

       System.out.println("Wow "+gpa+" GPA is good, but "+rain+" inches is bad.");

       System.out.println("Now only "+avg+" percent of people like tacos.");

       System.out.println("Sorry for the "+gpa+" percent who don't.");

       System.out.println(rain+", "+gpa+" or "+avg+" which do you want for a grade?");

   }

   

}

I think this is what you're looking for. Best of luck.


Related Questions

write code to read a list of song durations and song names from input. for each line of input, set the duration and name of newsong. then add newsong to songslist.

Answers

Here's the Python code to read a list of song durations and song names from input and then add them to a songslist:```python songslist = [] while True:  try: duration, name = input().split()  newsong = {"duration": duration, "name": name} songslist.append(newsong except: break


```In this code, we first create an empty `songslist` list to store the songs. Then, we use a `while` loop to repeatedly read lines of input until there is no more input left (`while True` is an infinite loop, but we break out of it when there is an error reading input).For each line of input, we split it into the duration and name using `input().split()`.

Then, we create a dictionary `newsong` with two keys `"duration"` and `"name"`, and set their values to the duration and name respectively.Finally, we add `newsong` to the `songslist` using the `append()` method.I hope this helps! Let me know if you have any further questions.

To know more about durations visit:

https://brainly.com/question/13567541

#SPJ11

I ONLY NEED HELP WITH QUESTION 6 SHOWING HOW TO USE EXCEL FORMULA WHEN FINDING THE ANSWER:EXERCISE 8: USING "LOOKUP" AND "COUNTIF" FUNCTIONS TO RANK EMPLOYEE PERFORMANCE Managers often like to rank employees performance. One scheme called "20-70-10," or more disparagingly as "Rank and Yank," categorizes the top 20 percent of employees as "Best," the middle 70 percent of employees "Near Best," and the bottom 10 percent as "Below Best." Go to the "Excel Student Spreadsheets BUS 2000" and click on the tab/worksheet labeled "Lookup". There you will find the performance ratings—on a ten-point scale—for 20 employees. Each employee has 3 performance ratings. • In the 5th Column, or Column E, calculate the average performance rating for each employee to one decimal place. • Then, in the 6th Column, or Column F, use the LOOKUP function below to classify the employees. o =LOOKUP(E2,{0,4,9,10},{"Below Best", "Near Best", "Best"}) The Lookup formula is structured as follows: • E2 is the Cell containing the data for which the calculation should be made. • 0 to 4 is the classification of "Below Best". • 4 to 9 is the classification of "Near Best". • 9 to 10 is the classification of "Best". • The words "Below Best", "Near Best", and "Best" are placed for each of the three classifications according to an employee’s average rating. Using the results, do the following: 1. List the names of the "Best" employees 2. List the names of the "Near Best" employees 3. List the names of the "Below Best" employees Next, redefine the Lookup function to classify employees as "Above Average" and "Below Average" based on whether they scored above or below an average of 5 in their three performance scores. Place the results in the 7th Column, or Column G. Next, we’re going to count how many employees were categorized as either "Above Average" or "Below Average". Place the following results in cells B23 and B24. 4. How many people scored "Above Average?" 5. How many people scored "Below Average?"To answer these questions, use the COUNTIF function. Its form is =COUNTIF(G2:G21, "Above Average"), where G2:G21 is the range of cells. In this example, the function counts the number of employees that were "Above Average" according to the former classification.Lastly, you will notice that more people scored "Above Average" than "Below Average" using 5 as the cut point. Redefine the LOOKUP formula so that a roughly equal number of employees are classified as "Above Average" and as "Below Average." 6. What is the new cutoff point?

Answers

The new cutoff point to classify employees as "Above Average" or "Below Average" is 4. This ensures a roughly equal distribution of employees in both categories, taking into account an average score of 5 as the dividing point.

To determine the new cutoff point in order to classify an equal number of employees as "Above Average" and "Below Average," we need to adjust the ranges in the LOOKUP function. Let's walk through the steps to find the new cutoff point

Step 1: Calculate the average performance rating for each employee in Column E.

Step 2: Use the LOOKUP function in Column F to classify employees as "Below Best," "Near Best," or "Best" based on their average rating. The formula is as follows:

=LOOKUP(E2, {0, 4, 9, 10}, {"Below Best", "Near Best", "Best"}

Step 3: List the names of the employees classified as "Best" in one column, the names of the employees classified as "Near Best" in another column, and the names of the employees classified as "Below Best" in a third column.

Step 4: Redefine the LOOKUP function in Column G to classify employees as "Above Average" or "Below Average" based on whether they scored above or below an average of 5 in their three performance scores. The formula is as follows:

=LOOKUP(E2, {0, 5, 10}, {"Below Average", "Above Average"}

Step 5: Use the COUNTIF function to count the number of employees categorized as "Above Average" and "Below Average." Place the results in cells B23 and B24. The formulas are as follows

B23: =COUNTIF(G2:G21, "Above Average")

B24: =COUNTIF(G2:G21, "Below Average")

Step 6: Compare he counts of employees classified as "Above Average" and "Below Average." If there are more employees classified as "Above Average," we need to adjust the cutoff point to achieve a roughly equal distribution.

To find the new cutoff point, we can adjust the ranges in the LOOKUP function in Column G. We want to divide the range of scores evenly between "Below Average" and "Above Average." Let's say we have N employees in total, and we want to divide them equally.

The new rnges in the LOOKUP function can be calculated as follows:

"Below Average" range: 0 to (5 - 1)

"Above Average" range: (5 - 1) to 1

Here, (5 - 1) represents the new cutoff point. We subtract 1 because we want to exclude the exact average score of 5 from either classification.

Therefore, the new cutoff point is 4.

To know more about EXCEL visit :

https://brainly.com/question/32047461

#SPJ11

which subunit of a heterodimeric cdk is the regulatory subunit?

Answers

The answer is cyclin subunit

which table option enables you to combine the contents of several xells into one cell?

Answers

The answer is the merge cells

Write a Java program that prints out a 4x4 square (like the one below)




Write a Java program that prints out a 4x4 square (like the one below)

Answers

public class 4by4Square

{

    public static void main(){

       System.out.println("xxxx \nx  x\nx  x\nxxxx");

    }

}

~CaptnCoderYankee

Barriers to communication _____. Select 3 options.

1. are just an issue on cross-cultural teams
2. are inevitable, and there is nothing you can really do to remove them
3. apply to all communications, not just cross-cultural
4. can be anything that prevents someone from receiving and understanding a message that is communicated
5. may include language and communication style

Answers

Answer:

3. apply to all communications, not just cross-cultural.

4. can be anything that prevents someone from receiving and understanding a message that is communicated.

5. may include language and communication style.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

An effective communication can be defined as an act that typically involves conveying or disseminating information efficiently and effectively from an individual (sender) to another (recipient) without any redundancy. Thus, effective communication ensures that messages or information are transmitted properly, guarantees a feedback, lacks the use of harsh tones, ensures both parties are well understood, gives room for clarity etc.

Barriers to communication refers to anything that prevents the successful transmission, receipt and understanding of a message and they;

I. Apply to all communications, not just cross-cultural.

II. Can be anything that prevents someone from receiving and understanding a message that is communicated.

III. May include language and communication style.

if the operating system of a computer uses gui, then the programmer can incorporate gui elements into a program.
T/F

Answers

True. If an operating system uses a graphical user interface (GUI), programmers can incorporate GUI elements into their programs.

When an operating system employs a GUI, such as Windows, macOS, or Linux with a desktop environment like GNOME or KDE, it provides a visual interface for users to interact with their computers. GUI elements include windows, buttons, menus, text boxes, and other graphical components that facilitate user interaction. Programmers can utilize the functionality provided by the operating system to incorporate these GUI elements into their software applications.

By utilizing the application programming interfaces (APIs) and libraries provided by the operating system, programmers can create windows, dialogs, and other GUI elements, define their appearance and behavior, and handle user input. These elements allow users to interact with the program visually, making it more intuitive and user-friendly. The programmer can customize the GUI elements to match the look and feel of the operating system or create a unique visual design. The GUI elements provide a means for users to input data, trigger actions, and receive feedback, enhancing the overall user experience of the software application.

Therefore, when an operating system supports GUI, programmers can incorporate these elements to create visually appealing and interactive programs.

to learn more about operating system click here:

brainly.com/question/13383612

#SPJ11

Select the correct answer.Priyanka wants to send some important files to her head office. Which protocol should she use to transfer these files securely?A.HTTPB.FTPSC.FTPD.DNS

Answers

Answer: FTP

Explanation: FTP stands for file transfer protocol.

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)
a. ifconfig
b. ipconfig
c. ping
d. netstat –i

Answers

The utilities that can be used to check TCP/IP configuration and test network connectivity are "ifconfig, ipconfig, ping, and netstat -i". Options a, b, c, and d all are answers

Option a: ifconfig is a utility commonly used in Unix-based systems to configure and display network interfaces and their configurations.

Option b: ipconfig is a utility used in Windows systems to display the IP configuration information of network interfaces.

Option c: ping is a utility that sends an Internet Control Message Protocol (ICMP) echo request to a target IP address or hostname to check if it is reachable and measure the response time.

Option d: netstat -i is a command used to display the network interfaces and their statistics, including the number of packets sent and received.

Therefore, options a, b, c, and d are all correct utilities for checking TCP/IP configuration and testing network connectivity.

You can learn more about TCP/IP at

https://brainly.com/question/31920696

#SPJ11

I could've been somebody, you know? Esperanza, you go to school. Study hard. . . . Got to take care all your own, she says shaking her head. —"A Smart Cookie," Sandra Cisneros Which inference can you make about Esperanza’s mother based on her words? She believes that good things happen by chance. She believes that people must take responsibility for their futures. She believes that to be somebody, you need to have talent.

Answers

Answer:

B or She believes that people must take responsibility for their futures.

Explanation:

mark me brainliest plz?:)

Answer:

B

Explanation:

i hope you know you are worth it

you are investigating the possible benefits of a waypredicting l1 cache. assume that a 64 kb four-way set associative single-banked l1 data cache is the cycle time limiter in a system. for an alternative cache organization, you are considering a way-predicted cache modeled as a 64 kb directmapped cache with 80% prediction accuracy. unless stated otherwise, assume that a mispredicted way access that hits in the cache takes one more cycle. assume the miss rates and the miss penalties in question 2.8 part (c). a. [12] <2.3> what is the average memory access time of the current cache (in cycles) versus the way-predicted cache?

Answers

The average memory access time for the current cache is the same as the miss penalty, while the average access time for the way-predicted cache is (1-miss rate) * hit time + miss rate * (hit time + penalty) / prediction accuracy.

The system's cycle time limiter is the current cache, a four-way set associative single-banked L1 data cache with a missed penalty. The way-predicted cache, which is represented as a 64 kb direct-mapped cache with 80% prediction accuracy, can, on the other hand, greatly decrease the average memory access time. Assuming the miss rates and miss penalties from the question 2.8 section, the average memory access time for the way-predicted cache is determined using the hit time, penalty, and prediction accuracy. The way-predicted cache offers a significant increase over the present cache's average memory access time of 40 cycles, with an average memory access time of 29.6 cycles. As a result, implementing a way-predicted cache can result in notable speed improvements in memory access time.

learn more about cache here:

https://brainly.com/question/28232012

#SPJ4

In order for two queries to be UNION-compatible, they must: Select one: A. both have the same number of lines in their SQL statements. B. both output compatible data types for each column and return the same number of rows. C. both return at least one row. D. both return exactly one row.

Answers

Answer: B. both output compatible data types for each column and return the same number of rows.

Explanation:

In order for two queries to be UNION-compatible, they must be both output compatible data types for each column and return the same number of rows.

It should be noted that two relations are union compatible when both relations have the same attributes and also the domain regarding the identical attributes are thesame.

Which features are important when you plan a program? Select 4 options. Responses Knowing what you want the program to do. Knowing what you want the program to do. Knowing what the user needs the program to accomplish. Knowing what the user needs the program to accomplish. Knowing what information is needed to find the result. Knowing what information is needed to find the result. Knowing how many lines of code you are allowed to use. Knowing how many lines of code you are allowed to use. Knowing how to find the result needed.

Answers

The important features when planning a program are the following four.

Knowing what you want the program to do.Knowing what the user needs the program to accomplish.Knowing what information is needed to find the result.Knowing how to find the result needed.

Which features are important when you plan a program?

The important features when planning a program are the following four:

Knowing what you want the program to do, knowing what the user needs the program to accomplish, knowing what information is needed to find the result, and how to find the result needed.

These four features are important because they help ensure that the program is designed to meet the user's needs and that the necessary information is available to produce the desired result. The number of lines of code allowed may also be a consideration, but it is not as critical as these other factors.

Learn moer about programs at:

https://brainly.com/question/23275071

#SPJ1

3.) (30 points) the concept of security through obscurity suggests that we can provide some level of security hiding information. 3.a.) (15 points) think of a situation in which hiding information will not add security to the system. 3.b.) (15 points)then give an example of a situation in which hiding information will provide additional security

Answers

The concept of security through obscurity suggests that we can provide some level of security by hiding information but some scenarios exist when hiding information does not guarantee system security.

A situation when hiding information will not add security to the system is when a hacker with malicious intent discovers the place where your infrastructure is hidden and this makes it vulnerable again.

An example when which hiding information will provide additional security would be the obscurity of a source code to avoid others from copying and using it,

What is System Security?

This refers to the steps and processes that are undertaken in order to secure a system from unauthorized access.

Hence, we can see that The concept of security through obscurity suggests that we can provide some level of security by hiding information but some scenarios exist when hiding information does not guarantee system security.

A situation when hiding information will not add security to the system is when a hacker with malicious intent discovers the place where your infrastructure is hidden and this makes it vulnerable again.

An example when which hiding information will provide additional security would be the obscurity of a source code to avoid others from copying and using it,

Read more about system security here:

https://brainly.com/question/25720881

#SPJ1

A photograph is created by what
A) Silver
B) Shutters
C) Light
4) Mirror

Answers

A photograph is created by Light.

What are photographs made of?

Any photograph created is one that is made up of Support and binders.

The steps that are needed in the creation of a photograph are:

First one need to expose or bring the film to light.Then develop or work on the imageLastly print the photograph.

Hence, for a person to create a photograph, light is needed and as such, A photograph is created by Light.

Learn more about photograph from

https://brainly.com/question/25821700

#SPJ1

add a ups to your computer: plug the ups into the wall outlet and turn it on. plug the computer and monitor power cables into the appropriate ups outlets. plug the printer in to the appropriate ups outlets. connect the network cables through the ups to the computer. the cable from the wall connects to the in port. connect the usb cable to the ups and the computer. power on the monitor and then the computer. unplug the ups from the wall outlet. do the computer and monitor still have power?

Answers

There is no set process to follow. Simply connect the power cables for your computer and monitor to the UPS, turn it on, plug it in, and you're good to go.

In the event of typical power issues such a blackout, voltage sag, or voltage surge, a standby UPS switches to battery backup power. The UPS converts utility power to DC battery power and then inverts it to AC power to run connected equipment when incoming utility power goes below or surges above safe voltage levels. In contrast to the Inverter, the UPS switches instantly from the mains supply to the battery. The inverter's switching time is greater than what computers can handle.

Learn more about computers here-

https://brainly.com/question/13112019

#SPJ4

You learned that "The CPU interacts with memory in a process that is known as
the fetch-decode-execute cycle. An instruction gets fetched (brought up) from
memory, decoded (analyzed) in the control unit, and then executed (put into
action) by the ALU." Can you think of a comparison to something that happens in
real life that would make this process easier to understand and remember?

Answers

Answer:

okay this is going to be weird but hopefully it helps you go to a restaurant you use the menu to place an order the waiter analyzes the order and then it brings it to you

Explanation:

so in other words the menu is bringing up what you want

the waiter is the person who analyzes the order

and then to put it to action is when you receive the order and eat it.

I know this is a weird analogy but I hope it helps

Within the user domain, some of the ways in which risk can be mitigated include: awareness, enforcement, and ___________.

Answers

Answer:  

Explanation:   1 Local plans and regulations.

2 Structural projects.

3 Natural systems protection.

4 Education programs.

5 Preparedness and response actions.

Which command is not one of the available Change Case options?
1. lowercase
2. small caps
3. sentence case
4. capitalize each word
What are the different options in a page layout feature? Select three options.
a. create multiple columns
b. add images and shapes
c. add section breaks
d. create table of contents
e. add line numbers

Answers

Small caps are not among the choices for changing the casing that are offered.A page layout feature has various options, including the ability to create sections breaks, parts of the text, and numerous rows.

Page layout is frequently employed to create a more distinguishing publication, such a newsletter or a billboard. In the same way in which you'd add components to a canvas, one can add writing, images, and some elements to something like a page layout.

You can then edit and reorganize the html elements as necessary. Based on their inclinations, graphic artists tend to implement several layouts to explain page layouts. There are many different sorts of layouts, including those used for magazines, advertisements, static webpages, and dynamic, adaptable, and reactive designs.

To learn more about page layout visit here :
https://brainly.com/question/28702177
# SPJ4

Jill is interested in a career as a paramedic. She is trained to use medical equipment, she remains calm under pressure, and she has good bedside manner. Which career pathway would best fit Jill’s interests and skills?

Answers

This question is incomplete because it lacks the appropriate options

Complete Question:

Jill is interested in a career as a paramedic. She is trained to use medical equipment, she remains calm under pressure, and she has good bedside manner. Which career pathway would best fit Jill’s interests and skills?

A. Security and Protective Services

B. Law Enforcement Services

C. Emergency and Fire Management Services

D. Correction Services

Answer:

c) Emergency and Fire Management Services

Explanation:

Emergency and Fire Management Services is a career path or occupation where personnels work to ensure that there is a prompt emergency response to incidents or accidents whereby the safety of human lives and properties are threatened.

Emergency and Fire Management services deal with the following incidents listed below:

a) Fire incidents

b) Car accidents

c) Medical emergencies

Staffs or Personnels that work in Emergency and Fire Management services:

a) Fire Fighters

b) Paramedics

Personnels who work with Emergency and Fire Management services should have the following traits or characteristics.

a) They must be calm regardless of any situations they are in

b) They must have the ability and training to use essential medical equipments.

c) They must have excellent people skills as well as good bedside manners.

d) They must possess the ability to work under intense pressure

e) They must possess the ability to calm victims of fire or car accidents

In the question above, the career pathway that is best for Jill based on the skills and interests that she possesses is a career pathway in Emergency and Fire Management Services.

Answer:

the person above me is right

Explanation:

a write the result P*=++j where j is 24

Answers

Answer:

ang hrap nmn nyan

Explanation:

poede po

The ____ command is used to restore the table's contents to their previous values.
a. COMMIT; RESTORE;
b. COMMIT; BACKUP;
c. COMMIT; ROLLBACK;
d. ROLLBACK;

Answers

To return the table's contents to their previous values, use the ROLLBACK command.

How can I get data out of a table in SQL?

To get data out of our tables, utilize the SELECT command in SQL. The output of this command is always a table, which we can use to develop dynamic web pages or desktop apps or to browse with our database client software.

How would the table row "WHERE" be deleted? Which command would be used?

The DELETE command can be used to remove rows from a table. To delete individual rows or all rows from a table, use the DELETE command. Provide the table and an optional search condition (WHERE) that specifies which rows to delete in order to delete rows.

To know more about ROLLBACK command visit:-

https://brainly.com/question/29853510

#SPJ4

You are now going to prepare some reports for the company. Measurements are in metres and volume
n cubic metres. Prices are per cubic metre. Mako sure al currency values are displayed with 2 decimal
places
20 -
Using a suitable database package, import the file M2017BOARDS.CSV
Use these field names and data types:
Field Name Data Type Description/Specification
Board ID
Text
This is a unique identification for each board
Tree_ID
Text
This code identifies the type of tree
Thickness
Numeric
Width
Numeric
Numeric
Length
Drying
Text
Ready
Sold
Boolean/Logical Display as Yes/No or checkbox
Boolean/Logical Display as Yes/No or checkbox
Numeric/Currency Currency of your choice
Price
.
Set the Board_ID field as the primary key.
[3]
Import the file M2017TREES.CSV into your database as a new table with appropriate data
types. Set the Tree_ID field as the primary key.
121
21.
12.
Examine the file M2017LOCATIONS.CSV and decide on appropriate data types for each field
Import the file M2017LOCATIONS.CSV into your database as a new table with appropriate
data types. Set the Location_code field as the primary key.
121
EVIDENCE 4
Place in your Evidence document screenshot(s) showing the field names and data
types used in each of the three tables.
23
Create one-to-many relationships as links between the three tables.
Use the Tree_ID field in the Trees table to link to the Tree_ID field in the Boards table, and
the Location_code field in the Locations table to link to the Location_code field in the Trees
table.
EVIDENCE 5
Place in your Evidence document screenshot(s) showing the relationships between
the three tables.

Answers

if you follow me and like and mark in brainliest answer only I will tell the answer

Please help I suck in computer science ​

Please help I suck in computer science

Answers

Answer:

print(5**3)

Explanation:

** is the exponentiation operator

What allows your computer to communicate over a network and access the Internet?

Answers

Answer:

To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed.

Explanation:

A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers. ISPs (Internet service providers)

A 32-second sound clip will be recorded. The sound will be sampled 16000 times a second. Each sample will be stored using 8 bits. Calculate the file size in kilobytes. You must show all of your working. ​

Answers

The  Audio Size of the 32-second sound clip is given as: = 500 kb

See calculation and explanations below.

What is Audio Size?

The term audio size is used to refer to the size of an audio file measured in bytes, or kilobytes, or megabytes depending on it's size.



What is the calculation of the size of the audio file?

Step 1

The formula for calculating the Audio Size is:

= Sampling rate x sample size x time x channel

= 16,000hz x 8bits x 32 x 1 (We assume it is only one channel since the number of channels is not specified)

= 4,096,000 bits

Step 2 - We convert to bytes.

To convert to bytes, we divide our answer in bits by 8; hence

= 4,096,000/8

= 512,000

Step 3 - convert to kilobytes by dividing by 1024

Therefore, answer in kilobytes

= 512,000/1024

= 500 kb

See more about kilobytes at:
https://brainly.com/question/15166519
#SPJ1

Zoey wants to change the margins in her Word document but is not sure how to do it. What tab should she select to find directions?
OHelp
O Home
O Layout
O View

Answers

Answer:

I believe that it is layout

Q2-2) Answer the following two questions for the code given below: public class Square { public static void Main() { int num; string inputString: Console.WriteLine("Enter an integer"); inputString = C

Answers

The code given below is a basic C# program. This program takes an input integer from the user and computes its square. The program then outputs the result. There are two questions we need to answer about this program.

Question 1: What is the purpose of the program?The purpose of the program is to take an input integer from the user, compute its square, and output the result.

Question 2: What is the output of the program for the input 5?To find the output of the program for the input 5, we need to run the program and enter the input value. When we do this, the program computes the square of the input value and outputs the result. Here is what the output looks like:Enter an integer5The square of 5 is 25Therefore, the output of the program for the input 5 is "The square of 5 is 25".The code is given below:public class Square {public static void Main() {int num;string inputString;Console.WriteLine("Enter an integer");inputString = Console.ReadLine();num = Int32.Parse(inputString);Console.WriteLine("The square of " + num + " is " + (num * num));}}

To know more about output  visit:

https://brainly.com/question/14227929

#SPJ11

I just tested how resistant my skin is with a multimeter and I stuck the probe tips pretty hard into my left and right hand. The multimeter measured about .7 Megaohms for me with dry skin and 1.3 Megaohms for my brother. Is this high? Please explain, if you think I'm joking leave your contact info and I'll prove it.

Answers

Since the multimeter measured about 7 Megaohms for you with dry skin and 1.3 Megaohms for your brother. it can be said that it is high.

What does a multimeter measure?

A digital multimeter is known to be a kind of a test tool that is often used to measure a lot of  or two electrical values that are seen or known to be principally voltage (volts), current (amps) and that of resistance (ohms).

Note that t he conductivity of the skin is said to be one that variable from person to person, hence, Since the multimeter measured about 7 Megaohms for you with dry skin and 1.3 Megaohms for your brother. it can be said that it is high.

Learn more about Megaohms from

https://brainly.com/question/10426373

#SPJ1

Ryan is the operations manager for a national financial company. His company is in the process of creating a customer handbook. Employees all over the country will collaborate on the different documents that will be included in the handbook and frequent additions and revisions will be made. He is looking for a telecommunications technology that can help him efficiently manage this task.

In 2-5 paragraphs, describe the points that Ryan needs to consider when choosing a telecommunications technology to meet his needs.

Answers

Answer:

Ryan first needs to determine his goals, in his case he is looking for a telecommunications technology that will often need to be updated and revised by others. Once he determines what he is looking for he can start gathering data, and once he's done that he can analyze his choices from the data he's gathered, in his case I would assume he'd be looking at either a wiki or a blog. Now it's time for Ryan to make his decision, I would go with a wiki since a wiki can be updated by many people in diverse locations. He said so himself that employees all over the country would be contributing to it so that is why I think a wiki would best suit him. Now that he's made his decision and can take a step back and evaluate what he has done and make sure he made the right choice.

Explanation:

:)

Other Questions
Which approach to knowledge management capitalizes on tacit knowledge and requires heavy IT investment? Group of answer choices the process approach the IT approach the systems approach the practice approach some flowers have distinctive patterns that only reflect ultraviolet light and therefore are invisible to humans. which statement about such markings is not correct? A number y satisfies y - 256 = 0. What equation does the number x = y satisfy? Find three consecutive even integers such that the sum of the least integer and the middle integer and the middle integer is 22 more than the greatest integer A corporation has 3000 shares, 10% preferred stock of $55.00 par preferred stock, and 6000 shares of common stock outstanding. The net income for the year is $300,000. Calculate earnings per share. (Round your answer to the nearest cent.) Verbinde die Stze: Meine Oma hat Geburtstag. Ich schreibe ihr eine Karte.I DONT NEED TRANSLATION To find the mass of substance the equation is[Container and Substance] + [Container] = [Substance]TrueFalse the contract states that buyer and seller agreed to split the title closing fee. it will appear on the worksheet as: The bill at a restaurant is $100, and Mrs. Johnson wants to leave a 15% tip. Approximately how much money should she leave? A. about $5.00 B. about $10.00 C. about $15.00 D. about $20.00 you buy a package of 122 smarties and 19 of them are red. what is a 95% confidence interval for the true proportion of red smarties? 7. What did Samuel Morton study and what did heconclude from his studies?? How many raisins are left in a jar of 37 raisins after you have eaten some? The equation _______ best models this situation. A. R= 37+N B. R=37/N. C. R= N/37. D. R=37-N Suppose that the school canteen allows you to choose a lunch meal from a set menu. you have two choices for the main course (a hamburger or a pizza. two choices of a drink (orange juice apple juice) and three choices of dessert(pie,ice cream,brownies). how many different meal combos can you select? if six of the homes are new and four have previously been occupied and if the six homes to visit are randomly chosen, what is the probability that all six are new? (the same answer results regardless of whether order is considered.) Please help ASAP!!!!!! find the measure of each angle in the problem The number of significant figures in 3.010 is True or False that The Epic of Gligamesh is important to the sumerians Raven receives a 3-year note receivable from a customer for goods sold. how should raven report this note receivable in its financial statements? Elizabeth is going to buy concert tickets. The concert tickets costs $200 plus a 10% sales tax. What is the total price that Elizabeth will pay for her concert tickets?