Answer:
because of language we can communicate
In a business environment, who is responsible for testing a website? the webmaster the website supervisor the customers who visit the site the search engine director
Answer:
the webmaster
Explanation:
Property Tax
Madison County collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a house is valued at $158,000, its assessed value is $94,800. This is the amount the homeowner pays tax on. At last year's tax rate of $2.64 for each $100 of assessedvalue, the annual property tax for this house would be $2502.72.
Write a program that asks the user to input the actual value of a piece of property and the current tax rate for each $100 of assessed value. The program should then calculate and report how much annual property tax the homeowner will be charged for this property.
Answer:
sorry i really dont know
Explanation:
Answer:
Here is the C++ program
====================================================
#include <iostream>
#include <iomanip>
using namespace std;
int main(){
const double ASSESS_VALUE_WEIGHT = 0.60;
double houseValue, assessedValue, taxRate, tax;
cout<<"Enter the actual value of property: ";
cin >> houseValue;
cout<<"Enter the current tax rate for every $100: ";
cin >> taxRate;
assessedValue = houseValue * ASSESS_VALUE_WEIGHT;
tax = assessedValue * taxRate / 100;
cout<<setprecision(2)<<fixed<<showpoint;
cout<<"Annual property tax: $ " << tax;
return 0;
}
Explanation:
What is E-Commerce? Answer The Following. Pls Help Me
Answer: Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions.
Explanation: Brainelist Me :)
you want to ensure that a query recordset is read-only and cannot modify the underlying data tables it references. How can you do that?
To guarantee that a query's recordset cannot make any changes to the original data tables, the "read-only" attribute can be assigned to the query.
What is the effective method?An effective method to accomplish this is to utilize the "SELECT" statement along with the "FOR READ ONLY" condition. The instruction signifies to the database engine that the query's sole purpose is to retrieve data and not alter it.
The SQL Code
SELECT column1, column2, ...
FROM table1
WHERE condition
FOR READ ONLY;
Read more about SQL here:
https://brainly.com/question/25694408
#SPJ1
Thomas is preparing to implement a new software package that his project team has selected and purchased. Thomas should _____. Group of answer choices help his coworkers identify and make any needed changes to their current processes using a DFD rely on the vendor to execute the implementation of the package without his company's participation keep the new software separate from their existing software and historical data create an RFI to collect information from the software vendor about their product's implementation
There are different kinds of software. Thomas should Unlike create an RFI to collect information from the software vendor about their product's implementation.
A software package often belongs to several organization and the team or one going to install it in your machine.A request for information (RFI) is known to be a standard business procedure. It is often used to collate basic information about the experience and skills of software development companies you'd like to work with.
Learn more from
https://brainly.com/question/15016176
How might the website owner use theses details other than to verify login details?
Answer:
They might choose ads based on your activity from your search history or to track location, and to send notifications to you.
Answer:
the website owner can hack your account or sometimes let say u save ur login and password. and u use a community computer that person can go through ur account and do whatever but the owner of the website will not take blame for it and can use ur info
help on my homework, on c++, I'm new to this what do I do.
The program based on the information is given below
#take amount in quarters, dimes, nickels and pennies as input and store it in variables
quarters = int(input())
dimes = int(input())
nickels = int(input())
pennies = int(input())
#calculate amount in cents
cents = (quarters*25 + dimes*10 + nickels*5 + pennies)
#convert cents to dollars
# 1 dollar = 100 cents
# n cents = n/100 dollars
dollars = cents / 100.00
#Print the amount in dollars upto two decimal places
print("Amount: $"+"{:.2f}".format(dollars))
What is the program about?It should be noted that the following weekend as illustrated:
1 quarter = 25 cents
1 dime = 10 cents
1 nickel = 5 cents
1 penny = 1 cent
1 dollar = 100 cents
Using the above data, the code to convert the given amount to dollars is shown above.
Learn more about program on:
https://brainly.com/question/26642771
#SPJ1
Do you think that social media platforms are actually designed to addict their users? And if you think so, what evidence can you give for this
Answer:
Yes, smartphones and social media are both designed to be addictive.
Explanation:
They are intentionally designed to hook the user into frequent use through autoplay, push notifications, chime sounds, etc. Social media developers also use feedback loops. Every time you do or post online your brain experiences a temporary moment of pleasure.
Melissa is writing a class called Cell. Which method has she set up to return a double?
public class Cell
{
private int chromosomes, rna;
public double time, h2o;
private static int cellCount = 0;
private static double mCount = 4.0;
public Cell()
{
chromosomes = 23;
rna = 1;
h20 = 2.0;
cellCount++;
System.out.println(“There are now ” + cellCount + “ cells”);
}
A. public Cell(int a_chromosomes, int a_rna, double a_h20)
{
chromosomes = a_chromosomes;
rna = a_rna;
h20 = a_h20;
}
B. public int getChromosomes()
{
if (chromosomes < 1) {
throw new IllegalArgumentException(“chromosomes is less than 1”);
}
return chromosomes;
}
C. public double get_mCount()
{
return mCount;
}
Answer:
C. public double get_mCount()
Describe a situation in which there could be a conflict of interest between an IT worker’s self-interest and the interests of a client. How should this potential conflict be addressed?
A situation in which there could be a conflict of interest between an IT worker’s self-interest and the interests of a client this potential conflict be addressed state of affairs wherein there may be a battle of hobby among an IT worker.
Which of the subsequent conditions might doubtlessly provide upward thrust to a battle of hobby?A battle of hobbies takes place whilst an individual's non-public hobbies – family, friendships, economic, or social factors – ought to compromise his or her judgment, decisions, or moves withinside the workplace. Government businesses take conflicts of hobby so critically that they're regulated.
A state of affairs wherein there may be a battle of hobby among an IT worker self-hobby and the hobbies of a purchaser is the transport of the product can be uncertain. The purchaser might also additionally need the product early at the same time as employees can not enforce the product withinside the time frame.
Read more about the potential :
https://brainly.com/question/14427111
#SPJ1
Explain why you do not need expensive equipment to take pictures or record video?
Explanation:
Expensive equipment is not necessary because from a technical perspective as long as the device has a lens and a mic it should be able to take photos and videos.
Answer: No, you don't not need an expensive camera . It may have better quality or worst quality . A phone car record and take pictures. Using a Light Stand Can give you a better lighting and better angle so you don't have to hold it or put it on your table, lap, or desk.
Explanation: A lot of people think you need to own a good camera to take a good photograph. A more expensive camera can help, but certainly is not essential. To answer the question though, it is 'no' – the equipment really doesn't make any difference to the end result, but does affect the process of getting there.
Byeeeeeee Remember to stan BTS , Wear Your Mask, And Drink Water
One of the most common ways that journalists use social media is to verify the accuracy of information.
true or false
ANSWER: False
EXPLANATION: Social media is not a credible source.
It is true that one of the most common ways that journalists use social media is to verify the accuracy of information.
Social media is frequently used by journalists as a method to confirm the veracity of material. Platforms for social media can offer in-the-moment updates and eyewitness accounts of happenings, breaking news, and other developments. Journalists can double-check facts, obtain more information, and assess the reliability of sources before publishing a piece by keeping an eye on social media posts. However, it's crucial to remember that social media may also serve as a source of false information, so journalists should exercise caution and double-check their sources.
Hence, it is true that one of the most common ways that journalists use social media is to verify the accuracy of information.
To learn more about information, here:
https://brainly.com/question/33427978
#SPJ3
12.2 question 3 please help
Instructions
Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in the dictionary dcn stored with a key of key1 and swap it with the value stored with a key of key2. For example, the following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
swap_values(positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria'}
Answer:
def swap_values(dcn, key1, key2):
temp = dcn[key1] # store the value of key1 temporarily
dcn[key1] = dcn[key2] # set the value of key1 to the value of key2
dcn[key2] = temp # set the value of key2 to the temporary value
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
print("Initial dictionary: ")
print(positions)
swap_values(positions, "C", "PF")
print("Modified dictionary: ")
print(positions)
Explanation:
What is the stdio.h header file ?
b) Given a = 2, b = 3 and c = 5, evaluate the following logica i. (a b) && (c != 5) c) Declare and Initialize the following using the appropriate.
i. Soccer scores
ii. Area of a triangle
iii. 365 (N.B. no. of days in a year)
c. Assume x = 4, y = 7, and z= 2. What value will be store each of the following statements?
i. result = x/y;
ii. result = y* 2;
iii. result = y + z;
d. What is the output for the expression below?
x = 6
y = ++x
PRINT x
PRINT y
b)
i. (a b) && (c != 5) evaluates to false because (2 < 3) is true, but (5 != 5) is false.
c)
i. Soccer scores can be declared and initialized as an array of integers, like this: int[] scores = {2, 1, 4, 3, 0};
ii. The area of a triangle can be calculated using the formula: area = (base * height) / 2. To declare and initialize the area of a triangle, we need to know the base and height. For example, if the base is 5 and the height is 3, we can write: double area = (5 * 3) / 2;
iii. The number of days in a year is a constant value that can be declared and initialized using the keyword "final": final int DAYS_IN_YEAR = 365;
c)
i. result = x/y; evaluates to 0 because x = 4 and y = 7, so 4/7 is less than 1.
ii. result = y* 2; evaluates to 14 because y = 7, so 7 * 2 = 14.
iii. result = y + z; evaluates to 9 because y = 7 and z = 2, so 7 + 2 = 9.
d)
The output for the expression below is:
x = 6
y = ++x
PRINT x // output is 7
PRINT y // output is 7
The expression "++x" increments the value of x by 1 before assigning it to y, so y is equal to 7. When we print x, the output is also 7 because x was incremented by 1.
question below in attachment
You can use basic HTML elements like input, select and textarea to generate an HTML web-form and gather the data for the code table.
What is the program?The form in this code case is configured to use the "post" method and directs to "insert_item.php", a PHP script that manages the form submissions. The structure comprises of input sections for the "name", "description", and "quantity" cells in the "item" table, as well as a button for submitting the information.
One method of collecting user input from a web-form and adding it to a database table is by utilizing PHP and SQL commands, which enables connectivity to the database and the ability to run the INSERT query.
Learn more about program from
https://brainly.com/question/26134656
#SPJ1
consider a channel that can lose packets but has a maximum delay that is known. modify protocol rdt2.1 to include sender timeout and retransmit. informally argue why your protocol can communicate correctly over this channel.
Here, we include a timer whose value exceeds the known propagation delay round trip. The "Waiting for ACK and NAK0" & "Wait on ACK or NAK1" statuses now include a timeout event.
What function does ACK serve in TCP?A shorthand for "acknowledgement" is ACK. Any Http packet that confirms accepting a message or a collection of packets is known as an ACK packet. A Udp packet the with "ACK" flag activated in the header is the scientific definition of the an Ack message.
ACK is delayed; why?A TCP packet's reception acknowledgement (ACK) can be delayed by delayed ACK by up to 200ms. By decreasing network traffic, this delay enhances the likelihood that the ACK may be transmitted concurrently with the reply to the received packet.
To know more about Waiting for ACK visit:
https://brainly.com/question/27207893
#SPJ4
To move an object to the bottom of the stack, click the Send Backwards arrow and then click Send to Back in the Arrange group on the DRAWING TOOLS _____ tab.
Answer:
thank you good sir!!!!!!!!
Your professor is advising a new crowd-funding app for women's self-help groups (SHGs) in Latin America on their database architecture. This is the business requirement she has worked on: All campaigns belong to a SHG. An SHG must exist before a campaign is created, and when an SHG is deleted from the database, all its campaigns are deleted. SHGs always belong to a country, and a country must be added to the app before SHGs are added to it. Which of the following is true of the entities defined in the database? Select all that apply.
Question 6 options:
An SHG entity depends on a Campaign entity
A Campaign entity is a depend on the SHG entity
A Country is not dependent on the Campaign entity
An SHG entity is dependent on a Country entity
A Campaign is an Independent entity
Based on the given information, the following statements are true:
An SHG entity depends on a Country entity.A Campaign entity is dependent on the SHG entity.What is a country entity?In the context of database design, a country entity refers to a logical representation of a country within a database system.
It typically stores information related to countries, such as their names, codes, demographics, or any other relevant data.
The country entity serves as a reference point for other entities in the database, such as self-help groups (SHGs) or campaigns, allowing for proper organization and association of data within the system.
Learn more about Entity at:
https://brainly.com/question/29491576
#SPJ1
In business writing, which statement best describes "tone?"
Tone would help you determine whether your boss is pleased or angry in a workplace email. Thus, option D is correct.
The tone of an email or every written text can help us determine what was the emotional state of the writer, as the way the phrases are formed and all the textual elements will form a pattern that is recognizable for the readers.
So, from the tone of an email, it is possible to determine whenever the writer was pleased or angry.
Thus, Tone would help you determine whether your boss is pleased or angry in a workplace email. Thus, option D is correct.
Learn more about tone on:
https://brainly.com/question/1416982
#SPJ1
The complete question will be
Which of the following would help you determine whether your boss is pleased or angry in a workplace email?
A. Formality
B. Consistency
C. Wordiness
D. Tone
Integers limeWeight1, limeWeight2, and numKids are read from input. Declare a floating-point variable avgWeight. Compute the average weight of limes each kid receives using floating-point division and assign the result to avgWeight.
Ex: If the input is 300 270 10, then the output is:
57.00
how do I code this in c++?
Answer:
Explanation:
Here's the C++ code to solve the problem:
#include <iostream>
using namespace std;
int main() {
int limeWeight1, limeWeight2, numKids;
float avgWeight;
cin >> limeWeight1 >> limeWeight2 >> numKids;
avgWeight = (float)(limeWeight1 + limeWeight2) / numKids;
cout.precision(2); // Set precision to 2 decimal places
cout << fixed << avgWeight << endl; // Output average weight with 2 decimal places
return 0;
}
In this program, we first declare three integer variables limeWeight1, limeWeight2, and numKids to hold the input values. We also declare a floating-point variable avgWeight to hold the computed average weight.
We then read in the input values using cin. Next, we compute the average weight by adding limeWeight1 and limeWeight2 and dividing the sum by numKids. Note that we cast the sum to float before dividing to ensure that we get a floating-point result.
Finally, we use cout to output the avgWeight variable with 2 decimal places. We use the precision() and fixed functions to achieve this.
The student can code the calculation of the average weight of limes that each kid receives in C++ by declaring integer and double variables, getting input for these variables, and then using floating-point division to compute the average. The result is then assigned to the double variable which is displayed with a precision of two decimal places.
Explanation:To calculate the average weight of limes each kid receives in C++, declare three integers: limeWeight1, limeWeight2, and numKids. Receive these values from input. Then declare a floating-point variable avgWeight. Use floating-point division (/) to compute the average weight as the sum of limeWeight1 and limeWeight2 divided by the number of kids (numKids). Assign this result to your floating-point variable (avgWeight). Below is an illustrative example:
#include
cin >> limeWeight1 >> limeWeight2 >> numKids;
}
Learn more about C++ Programming here:
https://brainly.com/question/33453996
#SPJ2
i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to fix and it dosent work i even resatrt my computer and scan for malware what shoul i do? and every day i fix it but then the next day it happens again pls help.
Since your computer add new tabs when you are working and the thing to do are:
You may manually scan for malware as well.Launch Chrome.Click More. Settings in the top right corner.After clicking Advanced Reset, tidy up. tidy up the PC.Choose Find.Click Delete if you are prompted to remove undesirable software. Your computer might need to be restarted.Why do my computer's tabs keep growing?The chance exists that some form of malware has been installed on your computer, and this is what is causing the tabs to open randomly. Corrupt Installation: It's also possible that this problem is being brought on by a corrupt Chrome browser installation.
To access the Chrome Settings menu, enter chrome:/settings and press Enter. In the Extensions tab, locate New Tab.
One can still solve the problem by: To access the Chrome Settings menu, enter chrome:/settings into the address bar of Chrome and hit Enter. Click on the trash can icon on the "Extensions" tab of the Chrome Settings menu.
Please look for any further dubious extensions that you do not use or are unsure of their origin and remove them as well.
Learn more about Malware attack from
https://brainly.com/question/17311729
#SPJ1
In HTML5, the
(line break) tag does not require a closing tag.
true or false
A company has recently learned of a person trying to obtain personal information of employees illegally. According to which act will be the person punished?
I-SPY
CFAA
Digital Millennium Act
SOPA
Answer:
Digital Millennium Act
Explanation:
The Digital Millennium Copyright Act is a United States copyright law that implements two treaties of the World Intellectual Property Organization . The aim of this ACT is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization Copyright. The law has two basic functions. First, it protects copyright owners by providing them with a mechanism to enforce their rights without having to directly sue the infringer
Hope that helped.
k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter. True or False? Why?
Answer:
false
Explanation:
its false
The most effective technique of malware propagation among the following list
Question Completion with Options:
A. Embedding & packing malcode in application programs
B. Replacing the Import-Address-Table (IAT)
C. Appending & prepending malcode into application programs
D. Embedding malcode in documents, such as MS O Office & PDF
Ε. Replicating malcode's source code
Answer:
The most effective technique of malware propagation among the following list is:
A. Embedding & packing malcode in application program
Explanation:
Malware propagation becomes effective and replicates effortlessly when malicious codes (otherwise called malcodes, which are self-replicating malicious programs) are embedded and packed in application programs. These usually take many years before they start to manifest, making them very difficult to detect. They are often triggered by some set events. Given the nature of malcodes and the culprits behind them, they are very dangerous to applications and pose substantial business risks.
100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.
I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :
- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9
I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?
Help is very much appreciated. Thank you for your time!
Answer: 266299 669922 292629 969622 Also just saying did you backup your files to the cloud? If not you can buy a usb-c flash drive or a lighting cable flashdrive. Best Luck.
Explanation:
Part 2 Graduate Students Only Architectural simulation is widely used in computer architecture studies because it allows us to estimate the performance impact of new designs. In this part of the project, you are asked to implement a pseudo-LRU (least recently used) cache replacement policy and report its performance impact. For highly associative caches, the implementation cost of true LRU replacement policy might be too high because it needs to keep tracking the access order of all blocks within a set. A pseudoLRU replacement policy that has much lower implementation cost and performs well in practice works as follows: when a replacement is needed, it will replace a random block other than the MRU (most recently used) one. You are asked to implement this pseudo-LRU policy and compare its performance with that of the true LRU policy. For the experiments, please use the default configuration as Question 3 of Project Part 1, fastforward the first 1000 million instructions and then collect detailed statistics on the next 500 million instructions. Please also vary the associativity of L2 cache from 4 to 8 and 16 (the L2 size should be kept as 256KB). Compare the performance of the pseudo-LRU and true-LRU in terms of L2 cache miss rates and IPC values. Based on your experimental results, what is your recommendation on cache associativity and replacement policy? Please include your experimental results and source code (the part that has been modified) in your report. Hint: The major changes of your code would be in cache.c.
The outline that a person can use to implement as well as compare the pseudo-LRU and that of the true-LRU cache replacement policies is given below
What is the code about?First, one need to make changes the cache replacement policy that can be see in the cache.c file of a person's code.
Thereafter one need to Run simulations with the use of the already modified or changed code via the use of the default configuration as said in Question 3 of Project Part 1.
Therefore, one can take detailed statistics, such as L2 cache miss rates and IPC (Instructions Per Cycle) values, for all of the next 500 million instructions. etc.
Learn more about code from
https://brainly.com/question/26134656
#SPJ1
HELP ME OUT PLEASE!!!!!
Location, such as indoor versus outdoor, is an important consideration when taking photographs.
True False
Answer:
I'd say true
Explanation:
Because you can't do all the different techniques and styles if you're indoor instead of outdoor or vice versa. There is also lighting to consider
Answer:
true
Explanation:
Have good day
Given string userText on one line and character fourthChar on a second line, change the fourth character of userText to fourthChar.
Ex: If the input is:
cheetah
v
then the output is:
chevtah
Note: Assume the length of string userText is greater than or equal to 4.
Answer:
# Get the input from the user
userText = input()
fourthChar = input()
# Replace the fourth character of the string with the new character
userText = userText[:3] + fourthChar + userText[4:]
# Print the modified string
print(userText)
Explanation:
This code first gets the input from the user and stores it in the userText and fourthChar variables. It then uses string slicing to replace the fourth character of the string with the new character. Finally, it prints the modified string.
The input string is cheetah, and the fourth character is e. The code replaces this character with the new character v, resulting in the modified string chevtah.