If your company or organization is working for a company that complies with ISO, there are several things you may need to do. You may need to undergo certain training or certification programs to ensure that you are able to meet the organization's standards.
ISO, or the International Organization for Standardization, is an independent, non-governmental organization that develops and publishes standards for a wide range of industries and activities.
Many companies choose to comply with ISO standards as a way of demonstrating their commitment to quality, environmental sustainability, and other important values.
For example, if your company complies with ISO 9001, which is the standard for quality management, you may need to undergo training to learn about the key principles and requirements of the standard.
Also need to demonstrate that you have the skills and knowledge necessary to implement and maintain the company's quality management system.
In addition to training and certification, you may also need to follow specific processes and procedures when working with a company that complies with ISO.
For example, you may need to ensure that any materials or products you provide meet the organization's standards for quality or environmental sustainability and also need to document your processes and procedures in a way that is consistent with the company's quality management system.
Overall, working with a company that complies with ISO can be a rewarding experience, as it allows you to contribute to the organization's commitment to quality, sustainability, and other important values.
However, it is important to be aware of the specific requirements and expectations that come with this type of work, and to be prepared to undergo any necessary training or certification programs to meet these standards.
For more question on "International Organization for Standardization" :
https://brainly.com/question/7181318
#SPJ11
2.9.8 stop light codehs
I cant figure out how to do this stop light function on codehs help
(this is the assignment)
Write a program that prompts the user for a color: red, yellow, or green (the colors of a stoplight). Then using if statements and else statements, print the user a message describing what they should do. For example if the color was red, you could say something like, “Red light: you should stop.”
As a bonus, see if you can use “else if” in this problem. Check out “else if” in the “Docs” tab.
You may assume the user will only input “red”, “yellow”, or “green”. You do not have to worry about other colors, or mixed capitalization such as “blue” or “ReD”, but you can make your program handle these cases if you wish!
The program illustrates the use of conditional statements
Conditional statements are statements used to make comparison and decisions
How to write the program?The program written in Python, where comments are used to explain each action is as follows:
#This gets input for the color
color = input("Color: ").lower()
#This checks if the input is red
if color == "red":
print(“Red light: you should stop.”)
#This checks if the input is yellow
elif color == "yellow":
print(“Yellow light: you should get ready.”)
#This checks if the input is green
elif color == "green":
print(“Green light: you should go.”)
#This checks for invalid input
else:
print(“Invalid")
Read more about Python programs at:
https://brainly.com/question/24833629
Consider the following code segment, which is intended to print the digits of the two-digit int number num in reverse order. For example, if num has the value 75, the code segment should print 57. Assume that num has been properly declared and initialized.
/ missing code /
System.out.print(onesDigit);
System.out.print(tensDigit);
Which of the following can be used to replace / missing code / so that the code segment works as intended?
A int onesDigit = num % 10;
int tensDigit = num / 10;
B int onesDigit = num / 10;
int tensDigit = num % 10;
C int onesDigit = 10 / num;
int tensDigit = 10 % num;
D int onesDigit = num % 100;
int tensDigit = num / 100;
E int onesDigit = num / 100;
int tensDigit = num % 100;
Answer:
A
Explanation:
The ones digit is equal to the remainder after division by 10. Only answer A has onesDigit = num % 10, so that already disqualifies all the other answers.
The int onesDigit = num % 10; and int tensDigit = num / 10; can be used to replace / missing code / so that the code segment works as intended. Thus, option A is correct.
What is the code segment?A code segment is often known as a text segment or just text, is a section of an object file or the equivalent piece of the program's virtual address space that includes executable instructions for computing.
Genes in eukaryotic DNA are typically broken into multiple parts known as coding sequences (exons) and non-coding sequences (introns). Segmentation is another method of allocating memory that can be utilized instead of or in addition to paging.
A program is divided into segments, each of which is a self-contained entity, incorporating a function or data structure.
Therefore, option A is correct about the code segment.
Learn more about the code segment, refer to:
https://brainly.com/question/20063766
#SPJ5
Which of these terms describes what happens if someone follows the directions on the washing machine three times in a row?
sequential
iteration
selection
block-based
Answer:
i believe iteration
Explanation:
The term that describes what happens if someone follows the directions on the washing machine three times in a row is iteration. The correct option is b.
What is iteration?Iteration is the process of repeatedly doing a task in order to produce a (potentially unlimited) succession of results. A single iteration of the process is every time it is repeated, and the result of each iteration serves as the foundation for the following one.
Iterating is the process of carrying out an action, assessing how it went, making improvements, and repeating the activity until you are ready to go on to another one. Programs can iterate or “loop” in one of two ways: loops controlled by a count. Loops are regulated by conditions.
The terms "to repeat or do over again" are equivalent with "iterate" and "reiterate." Since both words have Latin roots, English has not overcorrected in this instance.
Therefore, the correct option is b, iteration.
To learn more about iteration, refer to the link:
https://brainly.com/question/14969794
#SPJ2
What predefined match policy allows viewers to watch a claimed video but does not allow ads to display on the video
Answer:
The correct response is "Track".
Explanation:
Tracks encourage the individual that listens to that same music video to miss or ignore that same starting of almost any soundtrack at a certain moment. It might also impact an individual who accompanies a facility that implements or obeys guests.For obvious reasons, a digital ad service can track client's internet search engine behavior patterns to continue providing accurate recommendations.
Amal wants to store a list of the average temperatures for the past month (for example 14.2, 14. 12.6). What data type can he use to store all these values?
A. Floating point number
B. Integer
C. Array
D. String
Answer: the correct answer is C
Explanation: array is 100% correct
I got the question right
Select the correct answer.
Which relationship is possible when two tables share the same primary key?
А.
one-to-one
B.
one-to-many
C.
many-to-one
D.
many-to-many
Answer:
Many-to-one
Explanation:
Many-to-one relationships is possible when two tables share the same primary key it is because one entity contains values that refer to another entity that has unique values. It often enforced by primary key relationships, and the relationships typically are between fact and dimension tables and between levels in a hierarchy.
In our situation now a days in online class we are experiencing different problems such as internet
problems like internet connection low quality gadgets technical problems using laptops and computers set up as an ict student how can you solve these common learning problems based on the knowledge you gained in computer hardware servicing
Which of the following statements describe the benefits of a career in transportation, distribution, and logistics (TDL)? everfi
The statement that describes the benefits of a career in transportation, distribution, and logistics (TDL) is: It seeks to reduce logistics costs for the company and increase satisfaction for buyers.
What is a career in transportation, distribution, and logistics (TDL)?The planning, management, and transportation of people, materials, and commodities via road, pipeline, air, train, and water are the main areas of employment for the Transportation, Distribution, and Logistics Career Cluster.An expanding sector known as transportation, distribution, and logistics (TDL) links producers and other businesses with customers. To move items from one site to another securely and on schedule, a large TDL workforce is required due to the sharp development in eCommerce.In order to make sure that the product reaches the customer at the appropriate location and time while taking distribution and logistics into account, that profession assesses what is pertinent to logistics transport.Learn more about TDL refer to :
https://brainly.com/question/29275775
#SPJ4
which of the following is not a technique that can compromise the security of a network switch?arp spoofing (arp: address resolution protocol)mac address floodingdhcp server spoofing (dhcp: dynamic host configuration protocol)dhcp snoopingnone of the above (i.e., all of the above are switch attacks.)
The technique that is **not** a technique that can compromise the security of a network switch is **DHCP snooping**.
DHCP snooping is actually a security feature implemented on network switches to mitigate DHCP-based attacks. It works by inspecting DHCP messages and verifying the legitimacy of DHCP servers and clients within a network. DHCP snooping helps prevent DHCP server spoofing and unauthorized DHCP server configurations.
On the other hand, the other three techniques mentioned—ARP spoofing, MAC address flooding, and DHCP server spoofing—are indeed techniques that can compromise the security of a network switch.
- ARP spoofing is a method where an attacker falsifies ARP messages to associate their MAC address with the IP address of another device on the network, leading to potential interception or disruption of network traffic.
- MAC address flooding is a technique where an attacker floods a switch with a large number of fake MAC addresses, overwhelming the switch's MAC address table and causing it to behave inefficiently or potentially crashing it.
- DHCP server spoofing involves an attacker setting up a rogue DHCP server on the network, leading to unauthorized IP address assignment and potential network traffic interception.
It's important to implement proper security measures, such as enabling DHCP snooping and other security features, to protect against these types of attacks on network switches.
Learn more about MAC address here:
https://brainly.com/question/25937580
#SPJ11
The process of moving data and users to a new system or a new hard drive is known as _______________.
Migrating to a new system or hard drive involves moving users and their data. This procedure is referred to as migration.
Data, programmes, and configuration settings are transferred from one system or storage device to another during migration. When switching to a new operating system, piece of hardware, piece of software, server, or cloud-based platform, this procedure is frequently required. In order to ensure that all data is transferred accurately, safely, and without loss or corruption, data migration is a crucial procedure that needs to be carefully planned and carried out. Data analysis, data mapping, testing, and implementation are common steps in the process. Organisations that successfully migrate can increase productivity, decrease downtime, and improve user experience.
learn more about hard drive here:
https://brainly.com/question/10677358
#SPJ11
What is (are) the PG-rated movie(s) rented by active customers having the largest replacement cost? And How much is it (are they)?
(Hint #1 PG-rated movies have rating value equal to ‘PG’. Hint #2. In the "active" field of customer table, 1 indicates an active customer, and 0 indicates an inactive customer. Hint #3. There may be more than one movie returned.) Display: movie title and movie length
In order to extract the rental data for active customers, we must combine the customer, rental, inventory, and film tables. We then must filter the results to only include PG-rated films with the highest replacement cost.
What columns in the movie table are empty?There is a category for each film in the collection (action, comedy, adventure), although some films have not yet been assigned a genre. The genres column in these records contains NULL values. For NULL, there is a matching ID in the genres table. Thus, the columns movieid, title, and genres in the movies table are listed as follows.
SELECT f.title, f.length, MAX(f.replacement_cost) AS max_replacement_cost
FROM customer c
WHERE c.active = 1 AND f.rating = 'PG'
GROUP BY f.title, f.length
HAVING f.replacement_cost = max_replacement_cost;
To know more about tables visit:-
https://brainly.com/question/22736943
#SPJ4
why are medical related professions and human resources important?
Answer:
See below.
Explanation:
Medical related professions are identified as one of the core building blocks of a healthcare system. The role of "medical related professionals" in healthcare industry is confined to managing safety and legal issues, ensuring efficient performance, and developing problem solving and decision-making skills.
Placing parenthesis around a word, in a search, provides an exact match to that word
in the results.
True
False
Answer:
Explanation:
Placing parenthesis around a word, in a search, provides an exact match to that word in the results.
True
Completed the given flowchart using the algorithm steps which is given in wrong order. 1.Input time 2.Stop 3.Print "Good morning" 4.Start 5.IF time<12.00 pm
Answer:
The correct order is "4 1 5 3 2".
Explanation:
In the given question, the flowchart is missing, and its choices were not defined. so, in this question, we define the correct flowchart and correct order.
please find the attachment of the flowchart.
In the flowchart first, we start the process after that, we input the time value and use the if block that checks time value is less then "12:00 pm".
if the given condition is true, it will print the "Good morning" value and stop the program.
The study of ancient dna from extinct sources has been made possible by what technology?
The technology that has made it possible to study ancient DNA from extinct sources is DNA sequencing. This breakthrough technology allows scientists to extract and analyze DNA from ancient remains, such as bones and teeth, even if they are thousands of years old.
DNA sequencing involves determining the order of nucleotides in a DNA molecule, which provides valuable information about the genetic makeup of an organism. By comparing the DNA sequences from ancient remains to those of modern species, scientists can gain insights into the evolutionary history, population dynamics, and genetic traits of extinct species.
Additionally, ancient DNA extraction techniques have also played a crucial role in enabling the study of ancient DNA. These techniques involve carefully extracting and purifying DNA from ancient remains, which can be challenging due to degradation and contamination. However, advancements in DNA extraction methods have significantly improved the ability to recover and analyze ancient DNA, opening up new possibilities for understanding extinct species and their relationships to modern organisms.
Know more about DNA sequencing, here:
https://brainly.com/question/31650148
#SPJ11
Whenever you are designing a project for commercial use (making money) and need to use photographs with people in them you must obtain a__________release.
Answer:
Copyright
Explanation:
Why is a high bounce back rate a negative signal of a webpage's quality?
1) Because this behaviour is an indicator that the website might be engaging in click fraud.
2) Because this behaviour indicates that the searcher did not like what they saw or find what they were looking for.
3) Because the search engine must load the SERP again, and this wastes the server's bandwidth.
4) Because search engine rankings are determined by websites' conversion rate, and a high bounce rate means a low conversion rate
Because this behaviour is an indicator that the website might be engaging in click fraud.
What is Webpage's quality?This content includes descriptions of products and services, websites with company information, pictures, and blog entries.
The content of the website is another crucial factor to take into account because it will affect whether customers come back in the future. If people visit your website with certain goals in mind, the quality of the material will also determine how popular it is.
Throughout each visit, the visitor's decision to stay or leave will depend on the value and quality of the information provided.
Therefore, Because this behaviour is an indicator that the website might be engaging in click fraud.
To learn more about Behavior, refer to the link:
https://brainly.com/question/29751317
#SPJ1
interventions make use of cell phones, pagers, palm pilots, tablets, and other mobile technologies to deliver interventions and assess health-related events in the natural environment.
ecological momentary
Ecological momentary interventions make use of cell phones, pagers, palm pilots, tablets, and other mobile technologies to deliver interventions and assess health-related events in the natural environment.
Interventions are a type of prevention, where the primary goal is to stop the onset of a particular condition or illness and maintain overall health. The environment can significantly impact an individual's health and well-being. The natural environment is the immediate and broader surroundings that influence one's health. Technologies have made it possible to use mobile devices to deliver interventions and track health-related events in the environment. EMA allows researchers to capture data in real-time or at specific intervals as participants go about their daily lives, providing a more accurate and ecologically valid representation of their experiences compared to traditional retrospective self-report measures. Participants are typically prompted to respond to brief surveys or assessments multiple times throughout the day, either through notifications on their mobile devices or at pre-determined intervals. Therefore, ecological momentary interventions can use mobile technologies to capture real-time information from individuals.
Learn more about Environment:https://brainly.com/question/24182291
#SPJ11
A web application consists of one or more web pages. group of answer choices true false
Answer:
true
Explanation:
web application is a software or program which is accessible using any web browser.
how has the dependence on technology made humanity less intelligent?
Answer:
People now rely on the internet for answers.
Nobody truly learns stuff and keeps it with them anymore. They know they can just search it again, and get the answer.
Task 4
Write Fe is the statement is about the file explorer, and MC if it is for my computer
1. it allows user to access the local drivers
2.you can put your favorite application in this management
3.it prodives the GUI for accessing file system
4.the storage of the computer can be seen here
5.you can see the storage condition of any connected drive here
6.there is a default folders and file here instantly
7.you can view different folders and file here instantly
8. if you insert a flash drive on your computer you can check the storage in this area
9.the desktop documents downloads music pictures videos are the default folders here
10.it previous mane in windows explorer
Statement about file explorer and my computer are given below.
1)Fe - it allows the user to access the local drives. The file explorer provides a graphical interface for users to navigate and access the files and folders on their local drives.
2)MC - you can put your favorite application in this management.
This statement is related to the computer's desktop or start menu, where users can organize shortcuts to their favorite applications or programs.
3)Fe - it provides the GUI for accessing the file system. The file explorer provides a graphical user interface (GUI) that allows users to interact with the file system.
4)MC - the storage of the computer can be seen here. This statement refers to the computer's storage capacity, including the primary hard drive and any additional drives.
5)Fe - you can see the storage condition of any connected drive here.
6)Fe - there are default folders and files here instantly. When opening the file explorer, there are usually default folders and files displayed instantly.
7)Fe - you can view different folders and files here instantly. The file explorer allows users to view and navigate through different folders and files instantly.
8)MC - if you insert a flash drive on your computer, you can check the storage in this area.
9)MC - the desktop, documents, downloads, music, pictures, and videos are the default folders here.
10)Fe - it was previously named Windows Explorer.
For more questions on file explorer
https://brainly.com/question/30320716
#SPJ8
type of cable inside the computer connecting the mother
board and internal storage devices, such as the hard drive,
CD- or DVD-ROM
Answer:
CPU
Explanation:
GPS systems, music players, voice recorders, and electronic book readers are all devices that are being replaced by
A) VoIP
B) Cell phones
C) Smart phones
Smartphones : GPS systems, music players, voice recorders, and electronic book readers are all devices that are being replaced by
GPS systems, music players, voice recorders, and electronic book readers are all standalone devices that have been integrated into smartphones. Smartphones offer functionalities such as GPS navigation, music playback, voice recording, and e-book reading, making them versatile devices that can replace the need for individual devices dedicated to these specific functions. With the advancement of technology, smartphones have become a popular all-in-one solution for various tasks and have gradually replaced the need for separate devices.
learn more about:- GPS systems here
https://brainly.com/question/30672160
#SPJ11
Write a program that hardcodes a proposed password and checks that it is an acceptable password.
If the proposed password is acceptable password, the program writes a message "Password zzzzzzzzz is acceptable" and ends.
If it is not acceptable, it writes a message "Password is acceptable because it "
Where
is the password which was checked.
is one of:
"is not at least 7 characters long."
"does not contain both upper and lower case alphabetic characters."
"does not contain at least 1 digit."
is used if the PW is not acceptable, else the word not isn't printed.
"is an acceptable password."
Acceptable passwords:
are at least 7 characters long.
contain both upper and lower case alphabetic characters.
contain at least 1 digit.
The logic of this program can be quite tricky. Hint: use toUpperCase(), toLowerCase, and equals(). You will also need nested ifs.
Here some sample runs of the program; your output should look substantially the same:
C:\>java PasswordChecker
Enter your password:
snowflake
Password snowflake is not acceptable because it does not contain both upper and lower case alphabetic characters."
Enter your password:
SnowFlake
Using the knowledge in computational language in JAVA it is possible to write the code that write a program that hardcodes a proposed password and checks that it is an acceptable password.
Writting the code:
class InvalidPasswordException extends Exception {
int passwordConditionViolated = 0;
public InvalidPasswordException(int conditionViolated)
{
super("Invalid Password: ");
passwordConditionViolated = conditionViolated;
}
public String printMessage()
{
switch (passwordConditionViolated) {
case 1:
return ("Password length should be"
+ " between 8 to 15 characters");
case 2:
return ("Password should not"
+ " contain any space");
case 3:
return ("Password should contain"
+ " at least one digit(0-9)");
case 4:
return ("Password should contain at "
+ "least one special character");
case 5:
return ("Password should contain at"
+ " least one uppercase letter(A-Z)");
case 6:
return ("Password should contain at"
+ " least one lowercase letter(a-z)");
}
return ("");
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
How would you design an adaptive environment for people who are blind?
Answer:
I would make more things accessible to blind people. Such as having more binding stuff everywhere for the blind people to trace their finger over so they know what their reading. I would also find people to assist blind people so they don't run into things.
What is the output of the following code snippet? int i = 1; while (i != 9) { System.out.print(i + " "); i++; if (i == 9) { System.out.println("End"); } } 1 End 1 End 1 End (but the loop is an infinite loop) 1 End (but the loop is an infinite loop) 1 2 3 4 5 6 7 8 End 1 2 3 4 5 6 7 8 End 1 2 3 4 5 6 7 8 End (but the loop is an infinite loop)
Answer:
1 2 3 4 5 6 7 8 End
Explanation:
int i = 1;
while (i != 9){
System.out.print (i + " ");
i ++;
if (i == 9){
System.out.println("End");
}
}
python
how do I fix this error I am getting
code:
from tkinter import *
expression = ""
def press(num):
global expression
expression = expression + str(num)
equation.set(expression)
def equalpress():
try:
global expression
total = str(eval(expression))
equation.set(total)
expression = ""
except:
equation.set(" error ")
expression = ""
def clear():
global expression
expression = ""
equation.set("")
equation.set("")
if __name__ == "__main__":
gui = Tk()
gui.geometry("270x150")
equation = StringVar()
expression_field = Entry(gui, textvariable=equation)
expression_field.grid(columnspan=4, ipadx=70)
buttonl = Button(gui, text=' 1', fg='black', bg='white',command=lambda: press(1), height=l, width=7)
buttonl.grid(row=2, column=0)
button2 = Button(gui, text=' 2', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button2.grid(row=2, column=1)
button3 = Button(gui, text=' 3', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button3.grid(row=2, column=2)
button4 = Button(gui, text=' 4', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button4.grid(row=3, column=0)
button5 = Button(gui, text=' 5', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button5.grid(row=3, column=1)
button6 = Button(gui, text=' 6', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button6.grid(row=3, column=2)
button7 = Button(gui, text=' 7', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button7.grid(row=4, column=0)
button8 = Button(gui, text=' 8', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button8.grid(row=4, column=1)
button9 = Button(gui, text=' 9', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button9.grid(row=4, column=2)
button0 = Button(gui, text=' 0', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
button0.grid(row=5, column=0)
Add = Button(gui, text=' +', fg='black', bg='white',command=lambda: press("+"), height=l, width=7)
Add.grid(row=2, column=3)
Sub = Button(gui, text=' -', fg='black', bg='white',command=lambda: press(2), height=l, width=7)
Sub.grid(row=3, column=3)
Div = Button(gui, text=' /', fg='black', bg='white',command=lambda: press("/"), height=l, width=7)
Div.grid(row=5, column=3)
Mul = Button(gui, text=' *', fg='black', bg='white',command=lambda: press("*"), height=l, width=7)
Mul.grid(row=4, column=3)
Equal = Button(gui, text=' =', fg='black', bg='white',command=equalpress, height=l, width=7)
Equal.grid(row=5, column=2)
Clear = Button(gui, text=' Clear', fg='black', bg='white',command=clear, height=l, width=7)
Clear.grid(row=5, column=1)
Decimal = Button(gui, text=' .', fg='black', bg='white',command=lambda: press("."), height=l, width=7)
buttonl.grid(row=6, column=0)
gui.mainloop()
Answer:
from tkinter import *
expression = ""
def press(num):
global expression
expression = expression + str(num)
equation.set(expression)
def equalpress():
try:
global expression
total = str(eval(expression))
equation.set(total)
expression = ""
except:
equation.set(" error ")
expression = ""
def clear():
global expression
expression = ""
equation.set("")
if __name__ == "__main__":
gui = Tk()
equation = StringVar(gui, "")
equation.set("")
gui.geometry("270x150")
expression_field = Entry(gui, textvariable=equation)
expression_field.grid(columnspan=4, ipadx=70)
buttonl = Button(gui, text=' 1', fg='black', bg='white',command=lambda: press(1), height=1, width=7)
buttonl.grid(row=2, column=0)
button2 = Button(gui, text=' 2', fg='black', bg='white',command=lambda: press(2), height=1, width=7)
button2.grid(row=2, column=1)
button3 = Button(gui, text=' 3', fg='black', bg='white',command=lambda: press(3), height=1, width=7)
button3.grid(row=2, column=2)
button4 = Button(gui, text=' 4', fg='black', bg='white',command=lambda: press(4), height=1, width=7)
button4.grid(row=3, column=0)
button5 = Button(gui, text=' 5', fg='black', bg='white',command=lambda: press(5), height=1, width=7)
button5.grid(row=3, column=1)
button6 = Button(gui, text=' 6', fg='black', bg='white',command=lambda: press(6), height=1, width=7)
button6.grid(row=3, column=2)
button7 = Button(gui, text=' 7', fg='black', bg='white',command=lambda: press(7), height=1, width=7)
button7.grid(row=4, column=0)
button8 = Button(gui, text=' 8', fg='black', bg='white',command=lambda: press(8), height=1, width=7)
button8.grid(row=4, column=1)
button9 = Button(gui, text=' 9', fg='black', bg='white',command=lambda: press(9), height=1, width=7)
button9.grid(row=4, column=2)
button0 = Button(gui, text=' 0', fg='black', bg='white',command=lambda: press(2), height=1, width=7)
button0.grid(row=5, column=0)
Add = Button(gui, text=' +', fg='black', bg='white',command=lambda: press("+"), height=1, width=7)
Add.grid(row=2, column=3)
Sub = Button(gui, text=' -', fg='black', bg='white',command=lambda: press("-"), height=1, width=7)
Sub.grid(row=3, column=3)
Div = Button(gui, text=' /', fg='black', bg='white',command=lambda: press("/"), height=1, width=7)
Div.grid(row=5, column=3)
Mul = Button(gui, text=' *', fg='black', bg='white',command=lambda: press("*"), height=1, width=7)
Mul.grid(row=4, column=3)
Equal = Button(gui, text=' =', fg='black', bg='white',command=equalpress, height=1, width=7)
Equal.grid(row=5, column=2)
Clear = Button(gui, text=' Clear', fg='black', bg='white',command=clear, height=1, width=7)
Clear.grid(row=5, column=1)
Decimal = Button(gui, text=' .', fg='black', bg='white',command=lambda: press("."), height=1, width=7)
Decimal.grid(row=6, column=0)
gui.mainloop()
Explanation:
I fixed several other typos. Your calculator works like a charm!
The developer names of fields in Access follow a certain convention Although they might be difficult for the user, but we can provide a user friendly version of the name by typing
Typing a "Display Name" for the field. This allows the user to easily understand what the field represents, even if the developer name is technical or confusing.
What is a Display Name?A display name is a user-friendly name that is assigned to an entity in a software application or system to make it easier for users to identify and understand its purpose. Display names are often used to mask technical names or code names that may be confusing or meaningless to end-users.
For example, in an email application, the technical name for an email folder might be "Inbox," but the display name for the folder might be "Received Messages" to make it more clear to users what the folder contains. Display names are typically customizable by users or administrators to suit their preferences or needs.
Find out more on developer names here: https://brainly.com/question/27406405
#SPJ1
what is memory?
How many type of memory in computer system?
Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory.
How many type of memory in computer system?two typesMemory is also used by a computer's operating system, hardware and software. There are technically two types of computer memory: primary and secondary. The term memory is used as a synonym for primary memory or as an abbreviation for a specific type of primary memory called random access memory (RAM).Hope it helps you my friendHave a great day aheadGood morning friendCell phones use which of these storage technologies?a) Digital versatile discb) Optical drivec) Flash memory cardd) Flash drive
Answer: Flash memory card
Explanation: Flash memory devices also include SD and memory cards which cell phones use.
Cell phones use flash memory cards and flash drives as storage technologies. Therefore, option C is correct.
Flash memory is a type of non-volatile memory that maintains data even when power is turned off. It is commonly used in mobile devices like cell phones and tablets due to its small size, low power consumption, and fast access times.
Flash memory cards, such as microSD cards, are removable storage devices that can be inserted into cell phones to expand their storage capacity. Flash drives are also known as USB drives or thumb drives.
Learn more about flash memory cards, here:
https://brainly.com/question/32107156
#SPJ6