Answers

Answer 1

Answer:

first answer is correct 8

second answer is 12


Related Questions

A method which returns a value is referred to as…

Answers

Well, it could be multiple things.

For example:
A function can return a value. (i.e: int test() { return 1; }

A declaration can return a value. (i.e: int test2 = 1;)

But I'd say a function because it makes more sense logically.

What was the basis of building ARPAnet?

Answers

The basis of building ARPAnet is due to the zeal or the desire to assign  information over wide  distances without the use of  dedicated phone connections that will exist between all computer on a network.

What is ARPANET?

ARPANET is known to be the very first network that was said to be made up of distributed control.

Note that It was said to be implement TCP/IP protocols as it is the one that starts the use of Internet along  with use of these technologies.

Therefore, The basis of building ARPAnet is due to the zeal or the desire to assign  information over wide  distances without the use of  dedicated phone connections that will exist between all computer on a network.

Learn more about ARPAnet from

https://brainly.com/question/13721059
#SPJ1

To find the item with the lowest cost in column C, what Excel formula should be used in C11? SUM (C3:C10) =MAX (C4:C10) MIN (C3:C10) =MIN (C4:C10)

Answers

Answer:

The correct excel formula to use can't be sum cause that's addition of everything in the column. It can't be Max cause that's for the highest. Depending on where the values start, it could be either MIN(C3:C10) or MIN(C4:C10)

The correct Excel formula to find the item with the lowest cost in column C would be =MIN(C3:C10).

The MIN function in Excel is used to find the minimum value in a range of cells. In this case, we want to find the lowest cost in column C, so we use the MIN function with the range C3:C10. This will compare the values in cells C3 to C10 and return the smallest value.

When you enter the formula =MIN(C3:C10) in cell C11, Excel will evaluate the range C3:C10 and return the smallest value in that range. It will display the item with the lowest cost from column C.

By using the MIN function in Excel, you can easily identify the item with the lowest cost in a given range of cells. This is useful for analyzing data and making decisions based on the minimum value in a set of values. Excel provides a range of functions to perform calculations and analyze data, making it a powerful tool for managing and manipulating numerical information.

To know more about Excel Formula, visit

https://brainly.com/question/20497277

#SPJ11

write a program called minmax.py that accepts integers from standard input and writes their minimum and maximum values to standard output.

Answers

The program called minmax.py of minimum and maximum values to standard output will be:

import stdio  a = stdio.readAllInts()

smallest = a[0]

largest = a[0]

for num in a:

    if num > largest:

        largest = num

    if num < smallest:

        smallest = num

 print("Minimum =", smallest)

 print("Maximum =", largest)

What is a program?

A program is a set of instructions written in a programming language that a computer can execute. Software contains computer program as well as documentation and other intangible components. Source code refers to a computer program in its human-readable form. Because computers can only execute native machine instructions, source code requires the execution of another computer program. As a result, using the language's compiler, source code can be converted to machine instructions. The resulting file is referred to as an executable. Source code may also be executed within the language's interpreter.

To learn more about program

https://brainly.com/question/27359435

#SPJ4

hey i just wanted to know is brainly illegal?
cause i used an answer on brainly and now i'm "under investigation"

Answers

No it’s not and yolo who cares

Answer:

No it's not

Explanation:

I just realized how long ago this question was posted-

A publication created by a business or individual that is distributed on a regular basis - Weekly, monthly, or quarterly. Used to
provide informational updates to a specific club, group, organization, agency, or business

Answers

Newsletter

Hope this helps!

and
Why the computer is called dilligent
Versatile machine?give long answer ​

Answers

Answer:

The answer to this question is given below in this explanation section.

Explanation:

"Why the computer is called diligent

Versatile machine"

Computer is called versatile machine because it is used in almost all the fields for various purposes.Because it can perform the task repeatedly without loosing its speed and accuracy for a long time.They are versatile because they can be used for all sorts of task.They can also do many of the same tasks in different ways.Computer is the electronic device which perform the logical and mathematical calculation.Computer is known as the  versatile machine because it is very fast in every field and its part of life without it was cannot imagine life.

It can do the work faster and in every field the computer is used for making their work faster.

It can perform the work fast so it is called versatile machine.

Advantages of versatile machine:

Computer are very fast due to which thousand of job can be performed within the short period of time.Complex mathematical problems and logical operations can be solved by using this computer.As computer is versatile device,multiple task like communication,graphics,documentation can be done.

Disadvantages of versatile machine:

Computers are machine hence they have no brain so they work according to the program instruction set inside it.It is an electronic deice and it uses electronic sources to work,So it is very risk to store data and information on the computer independently because some electric and electronic damages may damage the data.So we have to make regular backup of the data.

Which group often works as part of a team to secure an organization's computers and networks?

Answers

Network administrators are group often works as part of a team to secure an organization's computers and networks.

What is a network administrator do?

Network and computer systems administrators are known to be people that are said to be responsible for the daily  running of the  operation of these networks.

Hence, Network administrators are group often works as part of a team to secure an organization's computers and networks.

Learn more about Network administrators from

https://brainly.com/question/5860806

#SPJ1

que es el prototipo de representación tradicional

Answers

Answer:

abahueheheje ehehebe ehebe even 3ehe ebe

question 2 a data analyst wants to change the default file format that gets exported by the knit button in rstudio. where should they change the output format?

Answers


To change the default file format that gets exported by the knit button in RStudio, a data analyst should change the output format in the YAML header of the R Markdown document.

The YAML header is a section at the beginning of an R Markdown document that contains metadata about the document, such as the title, author, and output format. By default, the output format is set to HTML, but it can be changed to other formats such as PDF, Word, or even a plain text file. To change the output format, the analyst should follow these steps 1. Open the R Markdown document in RStudio 2. At the beginning of the document, locate the YAML header, which is enclosed by three dashes at the top and bottom. 3. Within the YAML header, find the line that specifies the output format, which should look like this: output: html_document 4. Change the output format to the desired format by replacing "html_document" with the appropriate format name, such as "pdf_document", "word_document", or "md_document". For example, if the analyst wants to change the output to a PDF file, they would change the line to:  output: pdf_document 5. Save the changes to the R Markdown document and click the Knit button to export the document in the new format.

When creating reports or presentations in RStudio, data analysts often use R Markdown, which is a plain-text format that allows them to weave together code, text, and visualizations into a single document. One of the benefits of using R Markdown is that it can easily be converted to different file formats, such as HTML, PDF, or Word, by clicking the Knit button in RStudio. By default, the output format is set to HTML, but sometimes the analyst may want to change the output format to a different file type.  To change the output format, the analyst should modify the YAML header of the R Markdown document. The YAML header is a section at the beginning of the document that contains metadata about the document, such as the title, author, and output format. The output format is specified using the "output" option, which is followed by the format name and any additional options or settings.  For example, if the analyst wants to change the output format to PDF, they should replace "html_document" with "pdf_document" in the YAML header.

To know more about RStudio visit:

https://brainly.com/question/31367170

#SPJ11

Help Me

What are the four types of graphic models?

Answers

Answer:

-Bayesian network

-Naive Bayes classifier where we use a tree with a single root

-Dependency network where cycles are allowed

-Tree-augmented classifier or TAN model

Explanation:

The contrast ratio of blue 80 text on a yellow-10 background is __ to 1.

80

8

70

4

Answers

Answer:

The Answer is 8...

Explanation:

Answer:

8

Explanation:

80/10= 8

When writing a proposal, in which section do you explain your project’s conclusion with a perfect takeaway message?


A. Statement of objective

B. Visual synopsis

C. Distribution strategy

D. Audience-engagement strategy

E. Publicity and fundraising strategy

Answers

Answer:

A conclusion with a perfect takeaway message should typically be included in the final section of a proposal, which is often called the "Conclusion" or "Summary" section. This section should provide a brief overview of the main points and results of the proposal, and should aim to persuade the reader to support the project or take the desired action. The conclusion should also include a clear and concise takeaway message that summarizes the key points of the proposal and highlights the value or impact of the project. The takeaway message should be written in a way that is memorable and compelling, and should encourage the reader to take action or support the project.

Explanation:

You are in a group of five people whose small airplane crashed and
now you are stranded on a deserted tropical island for 24 hours. The
safety island is 3 miles away and can not be reached by walking.
Limited supplies from the plane have washed ashore(a flashlight, 2
bottles of water, a sheet, the tail of the plane, a bottle of perfume,
a ball of string, and a knife). Flora(plants/vegetation) and
fauna(animals) exist on the island.
1. You must use all of the supplies
2. Think of the "what if" issues: ex. How will your group
protect themselves from the animals? How can you reach
the safety island? How will your group eat? The sea
contains salt water, etc.

Answers

First and foremost, it's important to prioritize survival and safety in this situation.

What are the necessary steps?

Here are some steps that the group could take using the available supplies:

Using the knife and ball of string, construct a shelter that can protect the group from the elements and provide a place to sleep. The sheet can be used as a roof or to create walls, and the tail of the plane can be used for support.

With the flashlight and knife, explore the island to find a fresh water source. If one is not found, the group can ration the two bottles of water until they can be rescued.

Use the knife and ball of string to create weapons and tools for protection and gathering food. The perfume can be used as a deterrent for some animals.

If there is no source of fresh water on the island, the group can use the ball of string and sheet to create a solar still to purify salt water from the sea.

Finally, the group can work together to come up with a plan to safely make their way to the safety island. This may involve using the tail of the plane as a makeshift raft, or building a larger boat using materials found on the island.

To protect themselves from animals, the group can create weapons and tools using the knife and ball of string.

Learn more about word problem on;

https://brainly.com/question/21405634

#SPJ1

what is Information communication technology?

Answers

Information communication is the use of devices to communicate with others such as family and friends.

List some good names for devices on your home network or on the network in your school's lab. Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.

Answers

Answer:

Following are the answer to this question:

Explanation:

The following is the list of name devices, which is used home network or the school lab.

hrtr01(home router 1). schadmrtr02(school building router 2). clpc01, and clpc02 (computer laboratory pc 1 and 2) .

Uses:

Its use as descriptive names as necessary without gives potential hacks much more relevant data.  It provides only areas that are essential for both device identification.  It allows the name for irrelevant or redundant information doesn't over-complicated.

(b) Explain what is meant by a MAC address.
T​

Answers

Answer:

A MAC ADDRESS is a hardware identification number that uniquely identifies each device on a network.

Explanation:

Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bag_ounces followed by "seconds". End with a newline. Remember that print() automatically adds a newline.

Answers

Answer:

In Python:

def print_popcorn_time(bag_ounces):

   if bag_ounces < 3:

       print("Too small")

   if bag_ounces > 10:

       print("Too large")

   else:

       print(str(6 * bag_ounces)+" seconds")

       

Explanation:

This defines the function

def print_popcorn_time(bag_ounces):

This checks if bag_ounces < 3

   if bag_ounces < 3:

If yes, it prints too small

       print("Too small")

This checks if bag_ounces > 10

   if bag_ounces > 10:

If yes, it prints too big

       print("Too large")

If otherwise,

   else:

Multiply bag_ounces by 6 and print the outcome

       print(str(6 * bag_ounces)+" seconds")

Answer:

Explanation:

def print_popcorn_time(bag_ounces):

  if bag_ounces < 3:

      print("Too small")

  elif bag_ounces > 10:

# Use of 'if' for this portion, will only yield a test aborted for secondary tests

      print("Too large")

  else:

      print(str(6 * bag_ounces)+" seconds")

user_ounces = int(input())

print_popcorn_time(user_ounces)

Which word-processing feature provides a quick way to execute commands without using your mouse.

Answers

Keyboard Shortcuts are a word processing function that gives you a quick way to carry out operations without using the mouse. The best choice is B.

A hot key is a key or group of keys on a computer keyboard that, when simultaneously pressed, carry out an action (such launching an application) more quickly than a mouse or other input device. Shortcut keys are another name for hot keys. Hot keys are supported by many operating systems and programs. After clicking to initiate the selection, move the pointer over the desired text while continuing to hold down the left mouse button. Anywhere in the word, click twice. Once the pointer has been moved to the left of the line and has turned into an arrow pointing to the right, click.

The complete question is- Which word-processing feature provides a quick way to execute commands without using your mouse?

Print Preview

Keyboard Shortcuts

Find and Replace

Spelling and Grammar​

Learn more about operating here-

https://brainly.com/question/18095291

#SPJ4

What is the typical educational requirement for a non-entry level software programmer?
a high school diploma
b technical certificate
c bachelor’s degree
d master’s degree

Answers

Answer:Technical Certificate

Explanation:just took the unit test

Answer:

B ON EDG.

Explanation:

What connections do you see between variables and what you learned about the Input-Output-Store-Process model of a computer?

Answers

Answer:

h

Explanation:

Which of the following represent features of free software licensing? Check all of the boxes that apply.
is concerned with defending users' freedom of use
is always free of cost
makes source code available for editing
allows users to redistribute modified software as proprietary
is an idea that was developed by the Open Source Initiative (OSI)

Answers

Answer: A :is concerned with defending users’ freedom of use

C:makes source code available for editing

Explanation:

Answer:

a and c

Explanation:

web design, pls help me i need this in 40 minutes ​

web design, pls help me i need this in 40 minutes

Answers

<input type="color">: This input type allows the user to select a colour using a colour picker. , This input type, "date," enables users to choose a date from a calendar.

Which seven different text structures are there?

A few examples of text structures are sequence/process, description, time order/chronology, proposition/support, compare/contrast, problem/solution, cause/effect, inductive/deductive, and research.

How should a date be formatted?

Here is a general rule to remember when writing dates with commas: in the month-day-year format (used in the United States), use commas after the day and year. Do not use any commas when using the day-month-year format, which is used in the UK and other nations. In 2007, on May 13, Daniel was born.

To know more about input type visit:-

https://brainly.com/question/14543408

#SPJ1

what's your opinion on sentrent (it's a Pokemon)​

Answers

Answer:

Amazing and cute

Explanation:

It's small strong has a really cool shiny version but only has a max CP of 698

all in all I quite like it because of it's special defence so yeah it's a decent pokemon

TRY IT Choose the Right Technology MP3 player Widescreen laptop computer Smartphone Tablet computer with wireless Internet Suppose your parents are planning to take you and your younger brother on a tour of several European countries. You are in charge of choosing a device for your family's vacation that will allow you to look up where to eat, what to see, and what to do. You will need something that you, your parents, and your younger brother can use. The device needs to accommodate your dad's large hands and your mother's request that it fit in her handbag, which is about half the size of a backpack O Digital camera Audio recorder DONE Which one of the following devices would you choose to meet those requirements?​

Answers

the answer is:

d. tablet computer with wireless internet.

analyze the following code. group of answer choices count < 100 is always true at point a count < 100 is always true at point c count < 100 is always true at poin

Answers

The condition "count < 100" is always true at points a and c, but we do not have enough information to determine its truth at "poin."

To analyze the given code, we need to understand what is happening at points a, c, and poin.

Based on the information provided, we know that the condition "count < 100" is being evaluated at these points.

At point a, it is stated that "count < 100 is always true." This means that the value of "count" must be less than 100 for this condition to be true at point a.

At point c, it is also stated that "count < 100 is always true." So, similar to point a, the value of "count" must be less than 100 for this condition to be true at point c.

However, the information regarding "poin" is incomplete. It is not clear whether "count < 100 is always true" at "poin." Therefore, we cannot make any conclusions about the condition at "poin" based on the information provided.

In summary, the condition "count < 100" is always true at points a and c, but we do not have enough information to determine its truth at "poin."

To know more about condition visit:

https://brainly.com/question/19035663

#SPJ11

The US government appropriates less than one million dollars in funding each year to STEM education programs. True False

Answers

Answer:

False.

Explanation:

A STEM course typically comprises of science, technology, engineering and mathematics.

The US government appropriates more than one million dollars in funding each year to STEM education programs. The government of the United States of America create scholarship opportunities for its citizens in order to assist students develop a career in STEM-related field.

Educate to Innovate campaign is an example of STEM education programs developed and established by the US government to fund STEM education programs.

Answer: False

Explanation:

I have this assignment

Common methods of securing an IT system do NOT include

A) protecting system integrity by using antimalware programs

B) protecting data integrity by unblocking unauthorized access

C) protecting data integrity by creating backups, entering and editing data correctly

D) setting permissions to restrict access

Answers

Common methods of securing an IT system do not include B) protecting data integrity by unblocking unauthorized access.

What purposes do IT systems serve?

An information technology system (IT system) is typically an information system, a communications system, or, more specifically, a computer system, that has about all peripheral devices, software, as well as hardware, that is used by a little number of IT users.

They include:

Make a backup of your data.Use secure passwords.When working remotely, use caution.Install malware and antivirus protection.

Note that it does not include option B because that cannot guarantee system security.

Learn more about IT system from

https://brainly.com/question/25720881
#SPJ1

Provide Real World Examples That Differentiate The Characteristics Of P, And NP Arguments And Show If P=NP.

Answers

P and NP are complexity classes used to classify computational problems based on their algorithmic complexity.

P (Polynomial Time) represents the class of problems that can be solved in polynomial time. These problems have efficient algorithms that run in a reasonable amount of time as the input size grows. Examples of P problems include sorting an array, finding the shortest path in a graph, and checking if a number is prime.

NP (Nondeterministic Polynomial Time) represents the class of problems for which a solution can be verified in polynomial time. These problems may not have efficient algorithms to find the solution directly, but once a potential solution is provided, it can be verified efficiently. Examples of NP problems include the Traveling Salesman Problem (TSP), the Knapsack Problem, and the Boolean Satisfiability Problem (SAT).

The question of whether P is equal to NP or not remains an unsolved problem in computer science. If P=NP, it would mean that every problem for which a solution can be verified in polynomial time also has an efficient algorithm to find the solution directly. This would have significant implications for various fields, such as cryptography, optimization, and artificial intelligence.

To date, no one has been able to prove or disprove P=NP. The Clay Mathematics Institute has even listed the problem as one of the seven Millennium Prize Problems, offering a million-dollar prize for its resolution.

Learn more about Polynomial Time here:

https://brainly.com/question/32571978

#SPJ11

what addresses when systems can be accessed by employees, customers, and partners?

Answers

The addresses at which systems can be accessed by employees, customers, and partners depend on the specific network and infrastructure setup of an organization.

There are generally two common types of addresses used for accessing systems :

Internal addresses: These are used for accessing systems within the organization's private network. Internal addresses are typically assigned through the use of private IP addresses and are not directly accessible from the internet. Employees, customers, and partners may access these systems by connecting to the organization's intranet or using a virtual private network (VPN) to establish a secure connection.

External addresses: These are used for accessing systems that are publicly accessible over the internet. External addresses are typically associated with public IP addresses and domain names. Customers and partners can access these systems by using web browsers, applications, or other appropriate means to connect to the organization's public-facing services or websites.

It's important to note that the specific addresses and access methods can vary depending on the organization's security policies, network architecture, and the services being provided. Access to systems may require authentication, authorization, and adherence to access control policies to ensure proper security and privacy measures are in place.

To learn more about IP addresses visit : https://brainly.com/question/14219853

#SPJ11

Other Questions
Atme end of the cooper cycle experiment you produced a dark red power Your Friend bed boude wiha 107 you wewe Iki comedy Your product contains copper Your friend's con copper oxide Your experiment was less mest because it can bon copper andere O any O :00 cond Od (0) Is QRS=TUV? If so, name the postulate that applies.A. Congruent - SSSB. Might not be congruentC. Congruent - ASAD. Congruent - SAS write a net ionic equation for the overall reaction that occurs when aqueous solutions of sodium hydroxide and oxalic acid Today only, a desk is being sold at a 29% discount. The sale price is $497.What was the price yesterday? A nurse is caring for a client diagnosed with rheumatoid arthritis (ra). Which assessment finding does the nurse expect to assess? 1. What act forbid colonist to move west of the Application Mountains? what is your name and where are u from?? Phylogeny can be based on morphological homologies and molecular homologies. What are the advantages and limitations to using each (a) Show that 2 sin cos ko sink + 0 - sink (x-1) 0. Consider the sequence {an} = {cos no} and the partial sums sn = n - Rear k=1 (b) Hence, find all solutions of the equation 8(b) s(a 1) = 114 7 This road uses didn't use c is not used d are not used 8 Paper was invented. a b a in b on c by d with by big lorries. 9 The computer was being repaired a b is being repaired c is repairing d repairs the Chinese. at the moment. Grade 10 English: Student Textbook Revision 2 (Units 4-6) D The main focus of a marketing information system is ona) the coordination of external information sources.b) classifying data into the proper information categories.c) data storage and retrieval.d) the accurate maintenance of inventory levels.e) gathering information on competitive activity. Write a recursive formula and an explicit formula for the following arithmetic sequence.13, 22, 31, 40, 49, .....A recursive formula is a1 = ___, an = ___. A client who has been takin the prescribed does of zolpidem for 5 days return to the clinic for a follow up visit which statement by the client indicate the medication has been effective How do you find the LCM of two numbers if one of them is a prime number? what are the two animals of the coastal plains of Gujarat ofThe test scores for a grouppupils are as folows:7, 4, 3, 9, 1,8, 4, 5, 4 what is the modal Score? Assessingis based on more than just numbers; it requires seeing how yourbody composition is changing.O muscle massO weight lossO physical perfectionO diabetes risk How many aromatic rings in morphine In what three ways did God help Joseph? How does mutagen cause cancer?.