The application for an online store allows for an order to be created, amendes processed. Each of the functionalities represent a module. Before an order can amended though, the order needs to be retrieved. Question 2 Answer all questions in this section Q.2.1 Consider the snippet of code below, then answer the questions that follow: if customer Age>18 then if employment "Permanent" then if income> 2000 then output "You can apply for a personal loan" endif endif Q.2.1.1 If a customer is 19 years old, permanently employed and earns a salary of R6000, what will be the outcome if the snippet of code is executed? Motivate your answer. Q.2.2 Using pseudocode, plan the logic for an application that will prompt the user for two values. These values should be added together. After exiting the loop, the total of the two numbers should be displayed. N endif

Answers

Answer 1

The code snippet in question Q.2.1 uses nested if statements to check the age, employment status, and income of a customer to determine if they can apply for a personal loan. If the conditions are met, the output will be "You can apply for a personal loan".

The pseudocode in question Q.2.2 outlines a program that prompts the user for two numbers, adds them together, and displays the total.

Q.2.1.1 If a customer is 19 years old, permanently employed and earns a salary of R6000, the outcome of the snippet of code will be "You can apply for a personal loan". This is because the customer's age is greater than 18, employment status is permanent, and income is greater than R2000, satisfying all the conditions for applying for a personal loan.

Q.2.2 Here's a pseudocode for an application that prompts the user for two values, adds them together, and displays the total:

total = 0

repeat twice

   prompt user for a number

   add the number to the total

end repeat

display the total

In this pseudocode, the `total` variable is initialized to 0. The loop is repeated twice to prompt the user for two numbers. For each iteration of the loop, the user is prompted for a number and the number is added to the `total`. After the loop exits, the `total` value is displayed.

To know more about  nested if statements, visit:
brainly.com/question/30648689
#SPJ11


Related Questions

Which feature in PowerPoint is used to correct common capitalization and text formatting issues but can also be modified for more robust and personalized corrections?

Grammar Checker
Insights
Spelling Checker
AutoCorrect

Answers

Answer:

AutoCorrect: D on edge

Explanation:

Answer:

D.AutoCorrect

Explanation:

a software function that automatically makes or suggests corrections for mistakes in spelling or grammar made while typing.: a computer feature that attempts to correct the spelling of a word as the user types it The iPad boasts an autocorrect system that will try to figure out what you mean to type even when you don't quite tap the right keys.

Consider Emily's balance statement:

a) Emily's supervisor asked her to revise the balance statement. What does she need to revise? Why?

Consider Emily's balance statement:a) Emily's supervisor asked her to revise the balance statement. What

Answers

Answer: The purpose of a balance sheet is to give interested parties an idea of the company's financial position, in addition to displaying what the company owns and owes.

Explanation:

Write a program code in the python programming language to find simple interest given the
formula SI = (P*R*T)/100.
Read P(Principal), R (Rate), T (Time) from the keyboard and Calculate Simple Interest (SI).

Answers

Answer:

p = float(input('Principal: '))

r = float(input('Rate: '))

t = float(input('Time: '))

si = (p * r * t) / 100

print(si)

The "float" before the input in the first 3 lines is so you're able to input decimals. If you're not using decimals, you can switch the "float" to "int". However, if you input a decimal number after you switched to int, you will receive an error

The advantage of a digital camera in taking nighttime photographs is that you can see
the results right away.
• True
© False

Answers

Answer:

Ima say true

Explanation:

Children’s toymaker AlgosRUs is creating a stacking puzzle where n oddly shaped discs need to be placed on k pegs, and has employed you to help with the task. Each disc can either be placed directly on a peg or must be placed on top of another disc that is strictly larger than it in all directions. Your task is to decide whether n given shapes can be assembled into k "stacks" to be placed on the pegs

Answers

In the given problem, children’s toymaker AlgosRUs is creating a stacking puzzle where n oddly shaped discs need to be placed on k pegs, and has employed you to help with the task.

Each disc can either be placed directly on a peg or must be placed on top of another disc that is strictly larger than it in all directions. Your task is to decide whether n given shapes can be assembled into k "stacks" to be placed on the pegs.A stacking puzzle is a classic problem that involves placing various discs with different diameters onto a set of pegs. However, there is a twist: a smaller disc must always be on top of a larger disc.

A simple algorithm to solve this problem is to perform a recursive backtracking search, but it will have a time complexity of O(2^n). Here is a method to solve the problem with dynamic programming. Using a two-dimensional matrix DP[n+1][k+1], where DP[i][j] represents the minimum number of steps to solve the problem with i discs and j pegs, we can initialize the base cases as DP[1][i]=1, DP[i][1]=i and DP[i][j]=inf.

To know more about toymaker visit:

https://brainly.com/question/8572085

#SPJ11

Which Windows 10 feature provides an automated diagnosis and repair of boot problems plus a centralized platform for advanced recovery tools?

A. Recovery Drive
B. Windows Preinstallation Environment (Windows PE)
C. Windows Recovery Environment (WinRE)
D. System Reset

Answers

Windows Recovery Environment (WinRE) is the Windows 10 feature that provides an automated diagnosis and repair of boot problems, along with a centralized platform for advanced recovery tools.

WinRE is a minimal operating system that boots into a separate environment, separate from the main Windows installation, and is designed to help users troubleshoot and fix various issues that may prevent normal booting of the system.

WinRE offers a range of recovery options, including system restore, startup repair, system image recovery, and access to the command prompt for manual troubleshooting. It serves as a valuable tool for resolving boot-related problems and restoring the stability and functionality of the Windows 10 operating system.

Learn more about Windows Recovery here:

https://brainly.com/question/31812570

#SPJ11

why is it necessary to have a w-2 or 1099 form when using tax preparation software?

Answers

The reason why it is necessary to have a w-2 or 1099 form when using tax preparation software is to:

Allow the software engineer to report his income

According to the given question, we are asked to show the reason why it is necessary to have a W-2 or 1099 form when a software engineer is preparing software.

As a result of this, we can see that these two forms are both used by the Internal Revenue Service so that individuals such as the software engineer can report their income and make their tax payments.

Read more here:

https://brainly.com/question/24749083

SONY PICTURES ENTERTAINMENT HACK November 24th, 2014
1. Was Sony's response to the breach adequate? Why or why not?
2. Should the U.S. government help private organizations that are attacked (or allegedly attacked) by foreign governments? Why or why not?
Please Elaborate

Answers

2. The US government helps private organizations.

1. Sony's response to the breach was not adequate. The company did not have the necessary security measures to prevent the attack from happening in the first place. This led to the loss of confidential information and damage to Sony's reputation. The company's reaction to the attack was slow, and it took them several days to notify its employees and customers about the breach. This delayed response increased the risk of identity theft and other fraudulent activities.

Furthermore, Sony did not have an effective incident response plan in place, which would have enabled the company to respond more efficiently to the breach. Sony's handling of the breach demonstrated a lack of preparedness and an inability to contain the breach.

2. Yes, the U.S. government should help private organizations that are attacked by foreign governments. Cyberattacks on private companies can result in the theft of sensitive information, intellectual property, and financial resources, which can cause significant economic losses and national security threats. In addition, private companies may not have the necessary resources or expertise to respond adequately to cyberattacks.

By providing technical expertise, intelligence, and resources, the U.S. government can help private companies prevent and respond to cyberattacks. This will protect critical infrastructure, such as the financial sector, energy, and transportation systems, which are all vulnerable to cyberattacks. The government can also take measures such as imposing sanctions and other legal actions against foreign governments that are involved in cyberattacks, which will deter future attacks.

In conclusion, cyberattacks are a significant threat to the security and economy of the U.S. The government should provide assistance to private companies that are attacked by foreign governments to protect national security, the economy, and the citizens of the country.

preesure is drived quantity? why​

Answers

Answer:

Basically, anything quantity that is not defined as one of the 7 base quantities is a derived quantity by definition. Pressure is not one of the 7 base quantities. Hence it is a derived quantity.

Answer:

The units of pressure is called derived units because it is simply derived from base unit which is distance and a derived unit which is force, which is derived from acceleration, a derived unit as well, and mass, a base unit. ... Thus making work a derived unit.

Explanation:

Basically, anything quantity that is not defined as one of the 7 base quantities is a derived quantity by definition. Pressure is not one of the 7 base quantities. Hence it is a derived quantity.

Mark Brainliest.

Courses Design and implement a set of classes that define various courses in your curriculum. Include information about each course such as the title, number, description, and department that teaches the course. Consider the categories of classes that constitutes your curriculum when designing your inheritance structure. Create a main driver class to instantiate and exercise several of the classes

Answers

A. The classes should be designed based on the categories of classes that constitute the curriculum, and each class should include the title, number, description, and department.

Take the following steps to Create a main driver class to instantiate and exercise several of the classes

Begin by creating a Course class that includes the title, number, description, and department for each course. Create subclasses for each category of class in the curriculum. For example, if the curriculum includes classes such as classes in the Humanities, Sciences, and Mathematics, create a subclass for each one. Include any additional attributes or methods that are relevant to each subclass. Finally, create a main driver class to instantiate and exercise several of the classes. The main driver class should include methods to create the objects, access their attributes, and call their methods.

For more questions like  Main driver click the link below:

https://brainly.com/question/15059573

#SPJ4

the security system has detected a downgrade attempt when contacting the 3-part spn

Answers

Text version of LSA Event 40970 When contacting the 3-part SPN, the security system discovered an attempt to downgrade.

What is a three-part SPN?The service class comes first, the host name comes second, and the service name comes third (if it's present). Adding a ":port" or ":instancename" component as a suffix to the host name part is optional.Text version of LSA Event 40970 When contacting the three-part SPN, the security system discovered an attempt to downgrade. The error message reads, "The SAM database on the Windows Server does not have a computer account for the workstation trust relationship (0x0000018b)" An authentication refusal was made.In every domain of an Active Directory, there is a default account called KRBTGT. It serves as the domain controllers' KDC (Key Distribution Centre) service account.        

To learn more about Security system refer to:

https://brainly.com/question/29037358

#SPJ4

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters

Answers

The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.

What are binary sequences?

A binary sequence is known to be also called a bitstream. This is regarded as is a string of ones and zeros.

The information in storage which can be in form of text message, a photograph, a song, a computer program, etc. may looks the same, like in a form or sequence of bits.

See options below

4

6

7

8

Learn more about bits from

https://brainly.com/question/19667078

i need a computer science help.....and I rlly want it right now...this the question
calculate all multiples of 5 that are less than a randomly generated number between 12 and 45. for example the random number is 16. the output is then 5,10,15 python

so basically if type a number between 12 and 45 it shud give me all the multiples of 5 less than the number i typed......pls help;-;

Answers

Define, en tus propias palabras, lo que son los sistemas de información.

write the header file (.h file) of a class acc2 containing: a data member named sum of type int. a constructor accepting no parameters. a function named getsum that accepts no parameters and returns an int.

Answers

// acc2.h

// c++ class header for acc2
class acc2
{
public:

// getsum()
int getsum()
{
return sum_;
}

// Default constructor
acc2()
{
sum_ = 0;
}

private:
int sum_;
}

public int thirdMax(int[] nums) {Integer max1 = null;Integer max2 = null;Integer max3 = null;for (Integer n : nums) {if (n.equals(max1) || n.equals(max2) || n.equals(max3)) continue;if (max1 == null || n > max1) {max3 = max2;max2 = max1;max1 = n;} else if (max2 == null || n > max2) {max3 = max2;max2 = n;} else if (max3 == null || n > max3) {max3 = n;}}return max3 == null ? max1 : max3;}

Answers

The code you provided is a function called `thirdMax(int[] nums)`, which aims to find the third maximum number in an array of integers.


In the function `public int thirdMax(int[] nums)`, the input is an integer array named `nums`. The function has three Integer variables, `max1`, `max2`, and `max3`, initially set to null. These will be used to store the three maximum values found in the array.
The function iterates through the array using a for-each loop, checking each integer `n`. If `n` is equal to any of the current maximum values, the loop continues to the next iteration. Otherwise, the code checks if `n` is greater than the current maximum values and updates the maximums accordingly, shifting the previous maximum values down.
After iterating through the array, the function checks if `max3` is still null. If it is, it means there are fewer than three distinct values in the array, so it returns the maximum value `max1`. Otherwise, it returns the third maximum value `max3`.

learn more about (int[] nums) here:

https://brainly.com/question/28259097

#SPJ11

(1) Consider the following relational schema and a set of functional dependencies valid in the schema.

R = (A, B, C, D)

F = {A → C, C → D}

Find the highest normal form valid for the relational schema. If the schema is not in BCNF, then decompose the schema into the smallest number of relational schemas where each one is in BCNF. Try to enforce as many functional dependencies as possible in the decomposed schemas. List all derivations of functional dependencies, minimal keys, the highest normal forms, and decompositions (if necessary).

(2) Consider the following relational schema and a set of functional dependencies valid in the schema.

R = (A, B, C, D, E)

F = {AB → C, C → D, D → E}

Find the highest normal form valid for the relational schema. If the schema is not in BCNF, then decompose the schema into the smallest number of relational schemas where each one is in BCNF. Try to enforce as many functional dependencies as possible in the decomposed schemas. List all derivations of functional dependencies, minimal keys, the highest normal forms, and decompositions (if necessary).

(3) Consider the following relational schema and a set of functional dependencies valid in the schema.

R = (A, B, C, D, E)

F = {A → BCD, D → E}

Find the highest normal form valid for the relational schema. If the schema is not in BCNF, then decompose the schema into the smallest number of relational schemas where each one is in BCNF. Try to enforce as many functional dependencies as possible in the decomposed schemas. List all derivations of functional dependencies, minimal keys, the highest normal forms, and decompositions (if necessary).

(4) Consider the following relational schema and a set of functional dependencies valid in the schema.

R = (A, B, C, D, E)

F = {A → BD, B → C} Find the highest normal form valid for the relational schema. If the schema is not in BCNF, then decompose the schema into the smallest number of relational schemas where each one is in BCNF. Try to enforce as many functional dependencies as possible in the decomposed schemas. List all derivations of functional dependencies, minimal keys, the highest normal forms, and decompositions (if necessary).

Answers

The objective is to analyze and normalize the schemas, determining the highest normal form and performing decomposition if necessary.

What is the objective of the given questions regarding relational schemas and functional dependencies?

The given questions pertain to the process of normalizing relational schemas based on functional dependencies. Normalization is a technique used to eliminate data redundancy and ensure data integrity in databases. The goal is to decompose a schema into smaller schemas that adhere to specific normal forms.

In each question, a relational schema (R) and a set of functional dependencies (F) are provided. The task is to determine the highest normal form valid for the schema. If the schema is not in Boyce-Codd Normal Form (BCNF), it needs to be decomposed into smaller schemas that satisfy BCNF.

To solve these questions, you need to analyze the functional dependencies, identify minimal keys, and assess the normal forms of the schema. Based on the dependencies, you can determine the highest normal form and perform decomposition if required.

For each question, provide a step-by-step explanation of the normalization process, including derivations of functional dependencies, identification of minimal keys, determination of the highest normal form, and decomposition (if necessary).

The specific solutions to these questions would require a detailed analysis of the functional dependencies and applying normalization rules, which exceeds the word limit for the explanation.

Learn more about objective

brainly.com/question/12569661

#SPJ11

Television and movies are an important medium of communication. Perform online and offline research, and describe the history of Hollywood movies and how it has evolved as a platform for communication.

Answers

Answer:

The American film industry, popularly called Hollywood, has played an important role as a platform for communication. It has influenced audiences the world over. The history of Hollywood begins in 1910 with the silent movie In Old California. The 1920s saw the arrival of movies with sound and music. In the 1940s, during and after World War II, movies were made on themes related to war. In the 1950s, Hollywood movies began to compete with television, as television entered American homes. Cutting to the 1990s, the use of animation in movies began to rise. The 2000s saw a continuation of this trend. Movies are now made using the most advanced technology and effects.

Hollywood movies play an important role in the communication process. It can bridge the gap between different communities, cultures, races, and nations. For example, the movie The Help highlighted the gross discrimination the Blacks suffered during the 1960s. Movies have also played a great role in building harmony between cultures. For example, the movie Eat, Pray, Love explores Eastern cultures. Animated movies are enjoyed by movie lovers of all ages, and often end with a good message.

Explanation:

PLATO

Barriers to communication _____. Select 3 options.

1. are just an issue on cross-cultural teams
2. are inevitable, and there is nothing you can really do to remove them
3. apply to all communications, not just cross-cultural
4. can be anything that prevents someone from receiving and understanding a message that is communicated
5. may include language and communication style

Answers

Answer:

3. apply to all communications, not just cross-cultural.

4. can be anything that prevents someone from receiving and understanding a message that is communicated.

5. may include language and communication style.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

An effective communication can be defined as an act that typically involves conveying or disseminating information efficiently and effectively from an individual (sender) to another (recipient) without any redundancy. Thus, effective communication ensures that messages or information are transmitted properly, guarantees a feedback, lacks the use of harsh tones, ensures both parties are well understood, gives room for clarity etc.

Barriers to communication refers to anything that prevents the successful transmission, receipt and understanding of a message and they;

I. Apply to all communications, not just cross-cultural.

II. Can be anything that prevents someone from receiving and understanding a message that is communicated.

III. May include language and communication style.

You've been using a windows store app and need to exit out of it. what should you do?

Answers

To exit a Windows Store app, you can either drag the app window to the bottom of the screen or use the keyboard shortcut Alt + F4.

To exit out of a Windows Store app, you can follow these steps:
1. Move your cursor to the top of the app window. If you are using a touchscreen device, swipe down from the top edge of the screen.
2. Wait for the cursor to change to a hand or a grabbing symbol.
3. Click and hold the cursor, then drag it to the bottom of the screen.
4. Once the app window shrinks and becomes a small thumbnail, release the cursor.
5. The app will close, and you will be taken back to the Start screen or the desktop, depending on your settings.

Alternatively, you can use the keyboard shortcut Alt + F4 to close the active app. Pressing these keys simultaneously will close the app and return you to the previous screen. Remember that Windows Store apps are designed to run in the background, so closing them doesn't necessarily mean they are completely shut down. They may continue to run in the background to receive notifications or perform other tasks.

Learn more about Windows

https://brainly.com/question/17004240

#SPJ11

four example of computer software?​

Answers

answer= safari, ms-word, moviemaker, ms-paint, firefox,etc...

What is the name of the character set created to allow
computers to represent other languages?​

Answers

Answer:

UTF-8, which stands for Unicode Transformation Format – 8-bit.

Answer: ASCII

Explanation:

The ASCII character set is a 7-bit set of codes that allows 128 different characters.

If you found my answer useful then please mark me brainliest.

difference between second and third generation of computer

Answers

Answer:

one is less advanced and 3rd is more advanced and sometimes has fixed bugs and/or more features

Explanation:

I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding FLVS fine ill put it 100 plz help meee





Part 1: Plan and Write the Pseudocode
Using pseudocode, write an algorithm that someone else can follow.
Decide on a question to ask the user. Some ideas include:
What grade are you in?
What sport do you play?
Where did you go on vacation?
Use one variable to store the response.
Use one if-else statement to make a decision based on the user's input.
Display two messages; one for each condition (True and False).
Insert your pseudocode here: (you only need to do one)
Flowchart
Write it out

Get input:

If statement:

Print if true:

Print if false:


Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Write one if-else statement using user input.
Include a print message for both conditions (True and False).
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question
Response
What was the purpose of your program?

How could your program be useful in the real world?

What is a problem you ran into, and how did you fix it?

Describe one thing you would do differently the next time you write a program.




Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.

you can also give me a link to your work and ill use it as a guide I will not copy
my g mail is my user name

Answers

Answer:

give other guy brainliest

write a statement that assigns a string scalar nameperson to the following sequence of 11 characters: jon,pressor

Answers

nameperson = 'jon,pressor'

The variable nameperson is assigned the string value 'jon,pressor'.

How to assign the string scalar nameperson?

Certainly! Here's the statement that assigns a string scalar nameperson to the sequence of 11 characters "jon,pressor":

python

nameperson = "jon,pressor"

In this statement, the variable nameperson is assigned the value "jon,pressor", which is a string containing the sequence of 11 characters. The string is enclosed in double quotes (") to indicate that it is a string literal.

By assigning this value to the variable nameperson, we can refer to it later in the program and perform operations or manipulations on the string as needed.

Learn more about string

brainly.com/question/32338782

#SPJ11

What should a vessel operator do to keep a proper lookout

Answers

The thing that a vessel operator should do to keep a proper lookout is to Regularly scan the horizon .

What Does an Operator of a Vessel Do?

A vessel operator is in charge of managing a variety of shipboard activities, which includes the personnel management, payments, as ell as paperwork.

It should be noted that he should be able to Regularly scan the horizon,Providing vital marine services all over the world, vessel operations  can be seen as one of the important workboat sector and a rising portion of the merchant marine fleet and they are employed by the coastal network of ports that run along the coasts, outlying islands, and territories.

Learn more about vessel operator at:

https://brainly.com/question/30262742

#SPJ1

Final answer:

To keep a proper lookout while operating a vessel, a student should constantly scan the surrounding area, use available resources, and communicate effectively with other vessels.

Explanation:

To keep a proper lookout while operating a vessel, there are several important steps to follow:

Scan the surrounding area constantly to detect other vessels, objects, or hazards.Use all available resources such as radar, charts, and navigation aids to gather information about the course, speed, and intentions of other vessels.Communicate clearly and effectively with other vessels to establish right-of-way, avoid collisions, and navigate safely.

By following these steps, a vessel operator can maintain situational awareness and prevent accidents or collisions on the water.

Learn more about Keeping a proper lookout while operating a vessel here:

https://brainly.com/question/32213116

one problem with mail surveys is non-response bias. whaty does this means?

Answers

Mail surveys are one of the most efficient and cost-effective methods of collecting feedback and conducting market research. However, non-response bias is one of the problems associated with mail surveys.

In research, bias is a systematic error that occurs when the findings of a study are not representative of the population being studied. Non-response bias refers to the bias that occurs when the sample of respondents who did not respond to a survey differs from those who did respond, and this difference in the sample affects the validity of the results obtained.

Non-response bias can be caused by several factors, such as the following: A lack of interest in the subject matter: A recipient may not be interested in the subject matter being studied, and this may lead to non-response. The complexity of the questionnaire: If the questionnaire is complex and difficult to understand, respondents may not complete the survey. The survey's length: If the survey is too long, respondents may not complete the survey due to a lack of time or patience.

Learn more about Non-response bias: https://brainly.com/question/30763632

#SPJ11

Non-response bias refers to a systematic error that arises in survey research when the results obtained from the people who respond to a survey are significantly different from the results that would have been obtained if the entire population of interest had participated in the survey.

Respondents that do not respond are typically different from those who do respond. This implies that the characteristics of the respondents who participate in the survey are not representative of the population. If the proportion of respondents who respond is not representative of the population, the survey results may be biased.To summarize, Non-response bias in survey research can lead to systematic errors. Non-response bias is a systematic error that can arise in survey research when the results obtained from the people who respond to a survey are significantly different from the results that would have been obtained if the entire population of interest had participated in the survey. Non-respondents are typically different from those who do respond. As a result, the characteristics of the respondents who participate in the survey may not be representative of the population. Non-response bias can make survey results unreliable. Therefore, researchers must take steps to minimize non-response bias in their surveys to obtain more accurate and reliable results.

To learn more about Non-response bias, visit:

https://brainly.com/question/30763632

#SPJ11

What is plagiarism? Suppose you are an online store owner & you caught someone copying your store items and selling them at a lower price. What will you do? Keep in mind that your business in ONLINE

Answers

Answer:

Plagiarism is the reproduction of someone's Idea, language , work or expressions like one's original idea , language, work or expression. and not giving acknowledgment to the owner of the Idea, language, work or expression.

when someone copies your store Items and sell them at lower price the best course of action is keep your business ideas and product secrets close to yourself because you cannot have a monopoly of the market since it is an online business

Explanation:

Plagiarism is the reproduction of someone's Idea, language , work or expressions like one's original idea , language, work or expression. and not giving acknowledgment to the owner of the Idea, language, work or expression.

when someone copies your store Items and sell them at lower price the best course of action is keep your business ideas and product secrets close to yourself next time, because you cannot have a monopoly of the market since it is an online business hence there will be no action

NEED HELP ASAPPP

what will this code output?

print(9//2)

Answers

Answer:

The output depends on the programming language;

'//' in many languages means comment (javascript, C, C++, etc.)

In that case, this would return an error.

If the programming language does not use '//' for comments (e.g., Python) this will output a boolean 1 because '//' is not an operator.

hi
is it right?
"I think there is a small mistake in the quotation(second not first)"​

hiis it right?"I think there is a small mistake in the quotation(second not first)"

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

  The correct option to this question is:

.clr{color:blue;}

I write the complete code of HTML using this CSS style to execute this scenario as given below

<html>

<head>

<style>

.clr

{

color:blue;

}

</style>

</head>

<body>

<a href="pg.html" class="clr">click here</a>

<h2 class="clr">Home</h2>

</body>

</html>

The bold text is a complete code of this question.  When you will run it it will execute a link and Home text on the page in blue color. So the correct option is .clr{color:blue;}

Richard has recently updated the antivirus software on his tablet. While browsing through some music websites, he receives a pop-up mentioning that his tablet is under threat and many viruses are present on the system. The pop-up urges Richard to download freeware to protect his tablet from damage. What problem is Richard facing in this scenario? A. Richard is being asked to download the optimal configuration for his system. B. Richard is being asked to download updates for his system. C. Richard is being asked to download fake antivirus software. D. Richard is being asked to download a free music application.

Answers

Answer:

The Answer is C  

Explanation:

Other Questions
Create a musical timeline from the mid-1940s to the 1980s, with dates and most notable pieces performed by musicians. The events should depict a major commercial success, an innovation, or the beginning of something very important to music. Help me please!!!!!!!! Printing signs costs $28 for the design plates plus $2 per sign. Which equation correctly describes the cost, c, of s signs?A) 2c = 8 + 28 B) c = 2s + 28C) 28 = 2s - CD) c = 28s - 2 Quinzels earn 1254 each month his total deductions is 20% Kerry invited 23 friends to his pool party. They played a game where everyone had to separate into groups. Each group had the same number of children. The game could not be played with all 24 children in one group, and each group had to have more than 2 children.Which of the following are ways that they could divide into groups? Select all that apply. A. They can form 4 groups of 6. B. They can form 12 groups of 2. C. They can form 8 groups of 3. D. They can form 4 groups of 9. E. They can form 2 groups of 12. What are the coordinates of each point after quadrilateral ABCD is rotated 270 about the origin? Select numbers from the pull-down menus to complete the coordinates. Numbers may be used once, more than once, or not at all. During your assessment, your pt suddenly loses consciousness. After calling for help and determining that the pt. is not breathing, you are unsure whether the pt. has a pulse. What is your next action? You are choosing 4 of your 7 trophies and arranging them in a row on a shelf.In how many different ways can you choose and arrange the trophies?A.24B.28C.840D.5040 A faucet can fill a bathtub in 6 minutes. The drain can empty the tub in 10 minutes. If both the faucet in the drain are open at the same time, this situation is represented by this expression, where T is the number of minutes it will take to completely fill the bathtub. [tex]\frac{t}{6}-\frac{1}{10}[/tex]which expression can also represent the situationA. T / 15B. 4t / 15C. T^2 / 60D. T+60 / 60 Three equivalent ratios for 6.25 to 1.25 Springs collect water from an underground source called Aquafers.O TrueO False What do you do with a chemist who diedAnswer:BuriumExplain the joke then explain why this joke is funny A sample of gas has a volume of 12.0L and a pressure of 2.00 atm. If the pressure of gas is increased to 6.00 atm, what is the new volume of the gas?A. 2LB. 4LC. 16 LD. 8L PLEASE HELP FAST!!!!!! one way in which RSI can be prevented? During what phase of the business cycle are prices the highest? Help me please with this public policy: politics, analysis, and alternativesby kraft, michael e. / furlong, scott r.edition : 7th 21publisher : sageisbn 13 : 9781544374611 WHO EVER TELLS ME THIS AND GETS IT RIGHT GET BRAINIEST Mrs Thompson bought a new Bugatti for $300,000. The formula V =300,000(10.125)y models the value of the system,V, in dollars, after depreciation for y years. In this formula, what is the meaning of the term (1-0.15)?