What does Reflectance and Transparency do in the properties tab?

Answers

Answer 1

Reflectance and Transparency are properties that affect how light interacts with an object in a 3D scene. Reflectance controls how much light is reflected off the surface of an object, while Transparency controls how much light passes through the object.


Reflectance is particularly important when creating materials that have a shiny or reflective surface, such as metal or glass. By adjusting the Reflectance property, you can control the amount of specular highlights that appear on the surface of the object.
Transparency, on the other hand, is used to create materials that are see-through or partially see-through, such as water or frosted glass. By adjusting the Transparency property, you can control how much light passes through the object and how much is absorbed or reflected.  Friction, force that resists the sliding or rolling of one solid object over another. Frictional forces, such as the traction needed to walk without slipping, may be beneficial, but they also present a great measure of opposition to motion. About 20 percent of the engine power of automobiles is consumed in overcoming frictional forces in the moving parts.

The major cause of friction between metals appears to be the forces of attraction, known as adhesion, between the contact regions of the surfaces, which are always microscopically irregular. Friction arises from shearing these “welded” junctions and from the action of the irregularities of the harder surface plowing across the softer surface.

Learn more about Reflectance here

https://brainly.com/question/28267043

#SPJ11


Related Questions

Please post detailed answers to the following questions. Please use complete sentences.

As the number of people who use the internet grows, so does the risk of internet safety issues like identity theft, online predators, cyber bullying, and phishing. Choose one of these issues and discuss the steps you can take to help avoid falling victim to an internet crime.

Answers

To avoid falling victim to identity theft, and cyber bullying individuals should create strong passwords and use two-factor authentication whenever possible.

What is the explanation for the above response?

They should also avoid sharing personal information, such as Social Security or credit card numbers, online or over the phone unless absolutely necessary.

Additionally, individuals should regularly monitor their credit reports and bank statements for any suspicious activity, and report any suspected identity theft to the relevant authorities immediately. Using reputable antivirus and antimalware software, being cautious of suspicious emails and links, and avoiding public Wi-Fi for sensitive transactions can also help prevent identity theft.

By taking these steps, individuals can reduce their risk of falling victim to this type of internet crime and help protect their personal information.

Learn more about cyber bullying at:

https://brainly.com/question/4689569

#SPJ1

Logical are functions used when looking for an entry or value in the spreadsheet. what is it?

Answers

The Logical function would allow you to use the spreadsheets to identify whether a scenario is True/False.  It can choose among two options depending on the outcomes of that test, and the further discussion can be defined as follows:

These selections could be used to show information, do complex calculations, or run additional tests.It offers decision-making tools for spreadsheet information. It allows to let you examine the contents of a cell or do a computation, and afterward compare the output to a specified number or value.

Learn more:

brainly.com/question/8953037

What do macOS and Windows use to prevent us from accidentally deleting files?

Answers

macOS and Windows use a Trash can—or Recycle Bin—to prevent you from accidentally deleting files. When you delete a file, it is moved to the Trash can.

Match the database function to its purpose
finds the largest number in a database that
matches conditions
DCOUNT
DMIN
adds the numbers in a field of records in a
database that matches conditions
finds the smallest number in a database that
matches conditions
DAVERAGE
counts the cells that contain numbers in a
database that matches conditions
DMAX
DSUM
averages values in a field of records in a
database that matches conditions
Icy ll

Answers

Answer:

DCOUNT

counts the cells that contain numbers in a database that matches conditions

DMAX

finds the largest number in a database that matches conditions

DMIN

finds the smallest number in a database that matches conditions

DSUM

adds the numbers in a field of records in a database that matches conditions

DAVERAGE

averages values in a field of records in a database that matches conditions

Explanation: I got it right

14 points, what is an IP v4 packet??

Answers

Answer:

Internet Protocol version 4 (IPv4)

Explanation:

is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983.

Answer:

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983.

Explanation:

Proportional spacing replaced what other kind of spacing? question 2 options: parallel spacing monospacing one-to-one spacing fixed spacing

Answers

According to the statement, Proportional spacing replaced monospacing.

Describe monospacing.

A monospaced font is one in which each letter and character takes up the same amount of horizontal space. It is also known as a fixed-pitch, fixed-width, or non-proportional font. Variable-width fonts, in contrast, feature letters and spacing that are all the same width.

Monospace fonts have their uses.

Practicality: On all screen sizes, monospaced typefaces are exceptionally simple to read. This means that your clients can quickly and easily locate what they're looking for on any device, greatly enhancing the user experience. Your users may become clients more frequently as a result.

To know more about monospace visit :

https://brainly.com/question/17824852

#SPJ4

what is wrong with the following erd meant to show a relationship between two entities? a.) there is nothing wrong with the erd. b.) there is no relationship between the entities. c.) both of the objects are attributes. d.) one of the items is set up as an attribute.

Answers

The correct answer is (b) there is no relationship between the entities. ER diagrams help to explain the logical structure of databases.

What is ER diagram?

Entity Relationship Diagrams (ER Diagrams), often called Entity Relationship Diagrams (ERDs), are diagrams that show the relationships between entity sets that are maintained in databases.

Entities, attributes, and relationships are the three fundamental ideas on which ER diagrams are built.

ER diagrams have a variety of symbols, such as rectangles for entities, ovals for characteristics, and diamond shapes for relationships.

An ER diagram initially resembles a flowchart quite a bit. However, the particular symbols and their meanings in the ER Diagram make this paradigm distinct.

The entity framework infrastructure is depicted in the ER Diagram for representational purposes.

To create a well-designed database, you can assess your data requirements methodically with the use of ER modelling.

Therefore, it is recommended that you finish your ER modelling before putting your database into operation.

To know more about database design, visit:-

https://brainly.com/question/29741944

#SPJ4

You need to apply security settings to the registry on a Windows server. Which command should you use

Answers

There are different kinds of measures taken in security. The command should you use is   Certutil.

What is Certutil

Lawrence Abrams was known to be the man that mad Windows to have a built-in program called CertUtil.

This is often used to manage certificates in Windows where one can install, backup, delete, manage, and perform a lot of functions related to certificates and certificate that are saved in Windows.

See full question below

You need to apply security settings to the registry on a Windows server. Which command should you use?

certutil

regedit

regex

cipher

Learn more about Certutil from

https://brainly.com/question/24931496

using digital signatures is primarily a technique to ____.

Answers

Using digital signatures is primarily a technique to ensure the integrity, authenticity, and non-repudiation of digital information.

How does this secure digital information?

It enables secure and verifiable electronic transactions and communications in the digital world. Digital signatures use cryptographic algorithms to create a unique digital representation of a document or message, which can be attached or embedded within the digital file.

This signature verifies that the document has not been tampered with since the signature was applied and can be attributed to a specific signer.

By employing digital signatures, individuals and organizations can establish trust, protect against fraud, and verify the validity of digital content and transactions.

Read more about digital signatures here:

https://brainly.com/question/30616795

#SPJ4

Bob is making a short film for an international film festival. he wants to store audio, video, and subtitle files together in a single file. which file format should he use to store such a video?

Answers

MOV stands for the file format should he utilize to store such a video, As Bob is creating a short film for an international film festival. He desires to store audio, video, and subtitle files together in a single file. Hence, choice A is correct.

What is MOV?

The brevity of a short film exists in what creates it and what it stands for. Although they range in length, purpose, and genre, they all desire to do the same things: save money corresponded to a feature film, increase professional attention, and practice telling shorter, more attentive stories before moving on to feature films.

A short film stands typically defined as a movie that is up to 50 minutes long, while there exists no set length need in Hollywood. That stated, the typical duration exists 20 minutes. A short movie may be computer-animated, or both.

MOV stands for a video format that was created by Apple. It's a MPEG 4 video container file that exists primarily utilized with Apple's QuickTime program. A MOV video can hold many various video formats and multimedia audio, video, and text — in the same file on separate tracks.

MOV stands for the file format should he utilize to store such a video, As Bob is creating a short film for an international film festival. He desires to store audio, video, and subtitle files together in a single file. Hence, choice A is correct.

To learn more about file format refer to:

https://brainly.com/question/24102638

#SPJ4

Write a function that converts a floating-point number to a string. Provide a parameter variable for the number of digits after the decimal point.

Answers

Here's the function that converts a floating-point number to a string in Python with a parameter variable for the number of digits after the decimal point:

```python def floatToString(f, digitsAfterDecimal): formatString = "{:." + str(digitsAfterDecimal) + "f}" return formatString.format(f) ```

In the code above, `floatToString` is the name of the function that takes two arguments, the `f` floating-point number and the `digitsAfterDecimal` integer that represents the number of digits after the decimal point.

The function works by first creating a format string that includes the desired number of digits after the decimal point. This is done using the `str.format()` method which replaces the `{}` placeholders in the format string with the values provided as arguments.

Finally, the `format()` method is called on the `formatString` with the `f` floating-point number passed as the argument to convert the number to a string with the desired number of digits after the decimal point. The resulting string is then returned by the function. I hope this helps! Let me know if you have any further questions.

Learn more about Python at:

https://brainly.com/question/32877699

#SPJ11

A switch operates in the OSI reference model __________ layer and uses the __________ address to forward packets.

Answers

Answer:

A switch operates in the OSI reference model data link layer and uses the MAC address to forward packets

Explanation:

A network switch used in wired physical network connection, has several ports and acts as the bridge in the network of computing devices with a port naming system based on MAC addresses to forward data receives at the OSI model data link layer. By incorporating the capability of routing, switches can forward data at the network layer, known as layer 3.

When you perform a search, a general search engine searches the entire Internet.
A. True
B. False

Answers

Answer:

a

Explanation:

general search is a

advanced search is b

hy does payments constitute such a large fraction of the FinTech industry? (b) Many FinTech firms have succeeded by providing financial services with superior user interfaces than the software provided by incumbents. Why has this strategy worked so well? (c) What factors would you consider when determining whether an area of FinTech is likely to tend towards uncompetitive market structures, such as monopoly or oligopoly?

Answers

(a) lengthy and complex processes for making payments (b)  legacy systems and complex interfaces (c) regulatory requirements and substantial initial investment, can limit competition

(a) Payments constitute a significant portion of the FinTech industry due to several factors. First, traditional banking systems often involve lengthy and complex processes for making payments, leading to inefficiencies and higher costs. FinTech firms leverage technology and innovative solutions to streamline payment processes, providing faster, more secure, and convenient payment options to individuals and businesses. Additionally, the rise of e-commerce and digital transactions has increased the demand for digital payment solutions, creating a fertile ground for FinTech companies to cater to this growing market. The ability to offer competitive pricing, improved accessibility, and enhanced user experience has further fueled the growth of FinTech payment solutions.

(b) FinTech firms have succeeded by providing financial services with superior user interfaces compared to incumbents for several reasons. Firstly, traditional financial institutions often have legacy systems and complex interfaces that can be challenging for users to navigate. FinTech companies capitalize on this opportunity by designing user-friendly interfaces that are intuitive, visually appealing, and provide a seamless user experience. By prioritizing simplicity, convenience, and accessibility, FinTech firms attract and retain customers who value efficiency and ease of use. Moreover, FinTech companies leverage technological advancements such as mobile applications and digital platforms, allowing users to access financial services anytime, anywhere, further enhancing the user experience.

(c) Several factors contribute to the likelihood of an area of FinTech tending towards uncompetitive market structures such as monopoly or oligopoly. Firstly, high barriers to entry, including regulatory requirements and substantial initial investment, can limit competition, allowing a few dominant players to establish market control. Additionally, network effects play a significant role, where the value of a FinTech service increases as more users adopt it, creating a competitive advantage for early entrants and making it challenging for new players to gain traction. Moreover, data access and control can also contribute to market concentration, as companies with vast amounts of user data can leverage it to improve their services and create barriers for potential competitors. Lastly, the presence of strong brand recognition and customer loyalty towards established FinTech firms can further solidify their market position, making it difficult for new entrants to gain market share.


To learn more about technology click here: brainly.com/question/9171028

#SPJ11

Match the desription with the role of Internal Audit Help executive team understand and use the COCO ERM framework through periodic education over time. Using the ERM framework to help develop audit plans helps facilitate this understanding. Can play a major role in coordinating risk assessments in the organization and help formulate risk responses. The formulation of risk responses aids in the consultive role of Internal Audit. The CAE can be a proponent of a common language. Help ensure a consistent deploymtnt of ERM across the enterprise. Assist with the reporting of exposures and audit results on an aggregate enterprise basis and with the collection, analysis and synthesis of risk-related data. Use the 5 components of ERM framework to assess the effectiveness of risk management (Possibly report to the Board)

Answers

The role of Internal Audit in relation to the COCO ERM (Committee of Sponsoring Organizations of the Treadway Commission Enterprise Risk Management) framework involves helping the executive team understand and utilize the framework, coordinating risk assessments, formulating risk responses, ensuring consistent deployment of ERM, assisting with reporting and data analysis, and assessing the effectiveness of risk management.

Internal Audit plays a crucial role in helping the executive team understand and use the COCO ERM framework by providing periodic education and facilitating the development of audit plans aligned with the framework. This helps the organization in better understanding and applying ERM principles.

Internal Audit can also play a major role in coordinating risk assessments throughout the organization and helping formulate appropriate risk responses. By collaborating with key stakeholders, Internal Audit ensures that risk assessments are comprehensive and risk responses are tailored to mitigate identified risks effectively. This contributes to the consultative aspect of Internal Audit's role.

Furthermore, the Chief Audit Executive (CAE) can advocate for the establishment of a common language related to ERM within the organization. This helps in promoting a shared understanding of risk concepts and terminology, facilitating communication and collaboration across different departments.

Internal Audit also assists in ensuring the consistent deployment of ERM across the enterprise. By providing guidance, monitoring ERM implementation, and promoting best practices, Internal Audit helps in achieving a standardized and integrated approach to risk management.

Another important aspect of Internal Audit's role is assisting with the reporting of exposures and audit results on an aggregate enterprise basis. This involves collecting, analyzing, and synthesizing risk-related data to provide comprehensive reports to management and possibly the Board of Directors. Internal Audit uses the five components of the ERM framework (internal environment, objective setting, event identification, risk assessment, and risk response) to assess the effectiveness of risk management practices within the organization.

Learn more about framework here:

https://brainly.com/question/14661976

#SPJ11

5. (5 points) Construct the truth table and determine whether the proposition is a tautology, contradie tion, or contingency PNP V-9)

Answers

The given statement is P ∨ ¬P. To evaluate whether the given statement is a tautology, contradiction or contingency, we construct a truth table. The truth table for the given statement is as follows: P¬PP ∨ ¬PTrue False False ∨ True True False True ∨ FalseTrue True False ∨ False False True .

The truth table above shows that the given statement P ∨ ¬P is a tautology. This means that the statement is true for all possible truth values of its propositional variables. Therefore, the statement is true regardless of the truth values of P and ¬P.Table for P ∨ ¬PP¬PP ∨ ¬PTrueFalseFalse ∨ True True True FalseTrue ∨ FalseTrueTrueFalse ∨ FalseFalseAs shown in the truth table, the given statement P ∨ ¬P is a tautology.

This implies that the statement is true for all possible truth values of its propositional variables. As a result, the statement is always true regardless of the truth values of P and ¬P.A tautology is a type of compound statement that is always true. It can be obtained by combining two or more simple statements using logical connectives. This means that the truth value of the tautology is always true irrespective of the truth values of the propositions it is composed of.

To know more about tautology visit :

https://brainly.com/question/29494426

#SPJ11

What is one thing the ADDIE model does NOT account for?
O An investigation of the problem and audience
O The need for end users to receive training in the use of the product
O The existence of various types of media that could be used to deliver the content
O New discoveries and needs that come up in the process of the design step

Answers

Answer:

O An investigation of the problem and audience

Explanation:

ADDIE stands for Analysis, Design, Development, Implementation, and Evaluation which is defined as an instructional systems design framework that helps to develop training courses.

The main idea behind the development of ADDIE was to provide a good learning experience through structured training methods. But there was a limitation of ADDIE that is, it is not able to recognise or investigate the problems and unable to solve the issues.

Hence, the correct option is "An investigation of the problem and audience".

Answer:

It should be the last option

Explanation:

how infographic newsletter is created

Answers

An excellent marketing tool for disseminating company news and content links is a newsletter. To discover more, get your complimentary infographic right away!

What are production of newsletter ?

A magazine is just what it sounds like: a letter with news. It is most frequently described as a type of direct mail that is sent out on a regular basis to a predetermined audience. It is succinct, simple to read, and gives crucial details. It ought to be planned to spark curiosity and awareness. In terms of design, language, and structure, simple is the operative word for newsletters. You can create a newsletter that adheres to the simple criteria with the help of this Factsheet. Do you ever wonder if creating newsletters is a time and effort waste as a newsletter editor? Think about this: 80% of readers of newsletters believe they are valuable, 90% say each issue gives them a new idea, and 75% say they preserve issues.

To know more about of newsletter visit:

https://brainly.com/question/6250970

#SPJ1

The collection of tools for conducting vulnerability assessments and attacks is sometimes referred to as a "____".
a. black box c. gray box
b. white box d. tiger box

Answers

The collection of tools for conducting vulnerability assessments and attacks is sometimes referred to as a d) tiger box.

A tiger box is a comprehensive toolkit that contains various hardware and software tools designed to assist security professionals in identifying, assessing, and exploiting security vulnerabilities in a target system or network. These tools can include scanners, password crackers, exploit frameworks, and other utilities.

Tiger teams, which are groups of ethical hackers or penetration testers, often use these tiger boxes to simulate real-world attacks and assess the security of a system. The goal is to identify vulnerabilities and weaknesses in the system's security measures before malicious hackers can exploit them.

By using a tiger box, security professionals can conduct white box (knowledge of internal system workings), black box (no prior knowledge of the system), and gray box (limited knowledge of the system) testing, depending on the information available and the desired level of thoroughness in the assessment.

Therefore, the correct answer is d. tiger box.

Learn more about security here: https://brainly.com/question/27960062

#SPJ11

Damage to data or equipment that in which the data or equipment can not be recovered is which concern

Answers

Damage to data or equipment in which the data or equipment can not be recovered in the concern associated with data loss.

What happens when data is lost or damaged?

The notoriety of a business may definitely suffer due to data loss or damage. It involves a complete process of communicating a data loss incident to customers, but it can unintentionally outcome in a lack of trust and discontent.

According to the context of this question, the mechanism of data loss takes place when data is completely or partially destroyed, corrupted, or made unreadable by software applications and users. It is thought that the process of data loss accidentally or unintentionally happens.

Therefore, damage to data or equipment in which the data or equipment can not be recovered is the concern associated with data loss.

To learn more about Data loss, refer to the link:

https://brainly.com/question/15027705

#SPJ9

Your question seems incomplete. The most probable complete question is as follows:

Damage to data or equipment that in which the data or equipment can not be recovered is which concern?

a concern associated with data loss. a concern associated with data recovery.a concern associated with data indentation.

_______ codes are supplemental codes used to help researchers collect data, track illness and disease, and measure quality of care

Answers

Answer:

Category II CPT codes are supplemental tracking codes, also referred to as performance measurement codes. These numeric alpha codes [e.g., 2029F: complete physical skin exam performed] are used to collect data related to quality of care.

why is this not working out? I'm confused I thought that because it was a "guess.isdigit()" it would only continue if i was a number??

why is this not working out? I'm confused I thought that because it was a "guess.isdigit()" it would
why is this not working out? I'm confused I thought that because it was a "guess.isdigit()" it would

Answers

Answer:

Because guess is not converted to int

Explanation:

try adding line "guess = int(guess)" between lines "if guess.isdigit():" and "print("That's Correct!")"

This is because input() returns data of type string. Arithmetic operations cannot be performed between different types. Just replace the first line with this and your problem will be solved.

guess = int(input("Guess a number between 1 and 10: "))

need help on question 5! no links pls

need help on question 5! no links pls

Answers

Answer: less than 50%, it’s about 49%

Explanation:

Answer:

59.5

so I would say the 3 third option

Linux. An employee named Bob Smith, whose user name is bsmith, has left the company. You've been instructed to delete his user account and home directory.
Which of the following commands would do that? (choose 2)
(8.9 #3)
userdel bsmith
userdel bsmith; rm -rf /home/bsmith
userdel -r bsmith
userdel -h bsmith

Answers

The following commands will delete Bob Smith's user account and home directory: userdel -r bsmith, userdel bsmith; rm -rf /home/bsmith.

Userdel is a command in the Linux operating system that removes user accounts. The command's functionality is to remove a user account from the system, delete any documents owned by the user in their home directory, and remove the user's mailbox (if any) from the system.The -r flag is used to remove a user's home directory and all documents owned by that user. In other words, it deletes a user's account and everything that is associated with it in the system.

For instance, userdel -r bob will remove the bob user account and all data associated with the user account.What is the significance of the rm -rf /home/bsmith command?The rm -rf /home/bsmith command is another way to delete the bsmith user's home directory.

Learn more about Linux: https://brainly.com/question/25480553

#SPJ11

Which of the following best describes the value returned by the procedure?

Which of the following best describes the value returned by the procedure?

Answers

The procedure does not end since it won't end, the procedure returns nothing since it won't terminate

What is the reason that it won't terminate?

Since the opposite condition never gets satisfied it keeps on running the loop.

Here j will increment by one and the result will also get increased by 1 so we can conclude that it will never end and the loop also keeps on incrementing, for estimating these we should always need to look at the while loop since it is iterating continuously, this is a never-ending program as well as it won't get terminated even though the loop ends.

Hence we can say that the procedure does not end and the procedure returns nothing since it won't terminate

To know more about c language programming follow this link

https://brainly.com/question/26535599

#SPJ1

Create a new Microsoft Access database named DryCleaning.
Note that Microsoft Access does not support the use of SQL scripts to create databases. In a Microsoft Word document, type the SQL script that you would use to create the database.

Add a table named Customers. In Microsoft Word, type the SQL script that you would use to create the table. Include the following fields:


CustomerNumber (AutoNumber, Primary Key, required)

FirstName (Text(25), required)

LastName (Text(25), required)

Phone (Text(12), required)

Email (Text(100))

Add a table named Invoice. In Microsoft Word, type the SQL script that you would use to create the table. Include the following fields:

InvoiceNumber (Number-Long Integer, required, Primary Key)

CustomerNumber (Foreign Key, Number-Long Integer, Required)

DateIn (Date/time, required)

DateOut (Date/time)

TotalAmount (Currency)

Add a table named Invoice_Item. In Microsoft Word, type the SQL script that you would use to create the table. Include the following fields:

ItemNumber (AutoNumber, Primary Key, required)

InvoiceNumber (Foreign Key,Number-LongInteger, required)

Item (Text(50), required)

Quantity (Number-Long integer, required)

UnitPrice (Currency, required)

Write INSERT statements to add the data provided below to the tables

Create a new Microsoft Access database named DryCl
In one Word document

paste the SQL statement to meet the following criteria. Put a title above each as stated and save each query with the title name. You will add needed documentation from Part II to this document.

List the phone and last name of all the customers. Titled this01CustomerPhone-LastName

List the phone and last name of all the customers with the first name "Nikki." Titled this 02NikkiPhoneLastName

List the phone, first name, and last name of all the customers having phone numbers with "2" and "3" as the second and third numbers, respectively. Titled this 03PhoneWith?23.

Determine the maximum and minimum total amount. Save As04AverageTotalAmount.

Show the first and last names of all the customers who have had an order with total amount greater than $100.00. Use a subquery and present the results first sorted by last names in the ascending order and then by first names in the descending order. Titled this05CustomersTotalAmountGreaterThan100.

From the Customers table, concatenate each customer's last name and first name by using the comma-space-delimited technique; name the virtual column as "Full Name." Titled this06CustomerLastFirstNamesConcantenated.

Use a subquery to show the first and last name of all the customers who have had an order with an item named "Dress Shirt". Present the results first sorted by last name in the ascending order (Titled this07FirstLastNamesDressShirtSortedLastName) and then by first name in the descending order. Titled this08FirstLastNamesDressShirtSortedFirstNameDescending.

Use a join with a subquery to show the first name, last name, and total amount of all the customers who have had an order with an item named "Dress Shirt". Present the results first sorted by last name in the ascending order (Titled this09FirstLastNamesDressShirtSortedLastNameWithTotal) and then by first name in the descending order. Titled this10FirstLastNamesDressShirtSortedFirstNameDescending

Calculate the average total amount. Titled this 11AverageTotalAmount.

Answers

SU ITS3102 W5 A2 LastName FirstInitial.doc is the file name for your document. The Dry Cleaning database you create should be named U ITS3102 W5 A2 LastName _FirstInitial DryCleaning.accdb. Total:250.

How can you build your first Microsoft Access database?

Build a database. Wide Open. Choose File > New if Access is already open. Select a template or click on Blank database. Pick a location, give the database a name, and then click Create. When the database opens, choose Enable content if necessary from the yellow message box.

What features does Microsoft Access have?

Apps like Mom & Pop Inventory Tracker can be integrated with a normal Access database. A web-based database can be created and published using the new features of Microsoft Access. In addition to this, improvements for developers as well as an image gallery and browser control have been included.

To know more about database visit :-

https://brainly.com/question/29412324

#SPJ4

Explain any TWO (2) data information that shall be covered under "Safety Data Sheet" and elaborate why do you think the information is needed

Answers

Safety data sheets include details about chemical items that assist users in evaluating the risks. They outline the risks the chemical poses and include details on handling, storage, and emergency procedures in the event of an accident.

The properties of each chemical, its physical, health and environmental properties, protective measures, and precautions for handling, storage and transportation of the chemical are contained in a safety data sheet (formerly called safety data sheet).

Provides recommendations for each individual chemical on topics such as:

PPE, or personal protective equipmentfirst aid techniquescleanup procedures for spills

To learn more on Safety Data Sheets, here:

https://brainly.com/question/28244620

#SPJ4

quick and easy points how is this wrong Ap computer science?

quick and easy points how is this wrong Ap computer science?

Answers

The correct answer to the given question is Strings and not Variables.

This is because in JavaScript, the use of Strings is enclosed between a pair of either single quotation marks '' or double quotation marks "" and there is no difference between using double or single quotes, as they both serve the same function.

What is a String?

This refers to a linear sequence of characters, words, or other data and is a literal constant or variable

Hence, we can see that The correct answer to the given question is Strings and not Variables.

This is because in JavaScript, the use of Strings is enclosed between a pair of either single quotation marks '' or double quotation marks "" and there is no difference between using double or single quotes, as they both serve the same function.

Read more about strings in programming here:

https://brainly.com/question/15683939

#SPJ1

n administrator in charge of user endpoint images wants to slipstream and use image deployment. which boot method would best support this?

Answers

PXE boot method would best support slipstreaming and using image deployment for user endpoint images.

PXE (Preboot Execution Environment) is a boot method that allows a computer to boot and load an operating system from a network. With PXE, the administrator can create a centralized image deployment system that can be used to deploy and update user endpoint images. Slipstreaming can also be done using PXE by integrating software updates and patches into the deployment image, resulting in a more efficient and streamlined deployment process. Overall, PXE provides a flexible and scalable solution for managing user endpoint images.

learn more about  boot method here:

https://brainly.com/question/31726283

#SPJ11

11. Find the output of the following programs:
CLS
X= 7
FOR I = 1 to 10
PRINT X
IF X MOD 2 = 0 THEN
X= X/2
ELSE
X=X* 3+1
END IF
Next I
END​

Answers

Answer:

See picture.

Explanation:

Ran it on repl it.

11. Find the output of the following programs:CLSX= 7FOR I = 1 to 10PRINT XIF X MOD 2 = 0 THENX= X/2ELSEX=X*
Other Questions
Actividad1: En general, la dificultad para arrancar electrones aumenta de izquierda a derecha en cada periodo de la tabla peridica. Busca en la tabla peridica potasio (K), calcio (Ca) y uranio (U) y basndote en sus posiciones indica cul de ellos tendr una funcin de trabajo ms baja y cul ms alta:Menor funcin de trabajo:Mayor funcin de trabajo:2.- La energa de un electrn emitido se mide en electrn-voltios(eV). Un electrn con una energa de 1 eV puede superar un campo elctrico de 1 voltio. En el simulador, aumenta la tensin hasta que encuentres la tensin ms alta que todava permite a los electrones llegar al ampermetro.Tensin =El volaje que has encontrado es igual a la energa de los electrones emitidos en eV. Which of the following statements is false?O Mexico City is the financial center of Mexico.O Mexico City is the entertainment center of Mexico.o Mexico City has the lowest grime rate in Mexico.O Mexico City is the political capital of Mexico. Question 8 of 25What is the reference angle for 202?O A. 58B. 22C. 68D. 32 explain why the rate of diffusion of carbon dioxide into stomata on a leaf is higher on a warm day Can you please help? I'm stuck :( Collision Resolution of Hashing (15 points) To resolve the collisions in hashing, we learned two approaches: opening hashing, wherein all records that hash to a particular slot are placed on that slots linked list, and closed hashing, where recodes are stored directly in the hash table. There are two closed hashing mechanisms: bucket hashing, where hash table are divided into buckets, and linear probing, wherein if the home position is occupied, it checks the next slot in the hash table. Assume that you have a 10-slot closed hash table (the slots are numbered0 through 9). Consider a list of numbers: 18, 36, 64, 13, 73, 25, 8. Show the final hash table that would result if you used the hash function h(k) = k mod 10 anda. Open hashingb. Bucket hashing with 5 buckets, each of size 2.c. Linear probing 3. Project ReportsSubmit a sample copy of a Construction Monthly Progress Report, showing the following information.a. Brief Description of Project Scopeb. Progress and Forecast of Main Itemsc. Issues and Problems encounteredd. Time Schedule Update and look ahead plane. Budget Analysisf. Quality Control Metricsg. Safety Metricsh. Project Administration and Issues (06.03) write an essay4(2x + 3) 5yFrom the expression above, provide an example of each of the following: sum, term, product, factor, quotient, and coefficient. If any are not present, write "not present." Which of these diagrams is a convex mirror? Lowest form of energy from the sun how many miles away is 1.63 seconds of sound Describe why questioning is important to teamwork. Offer guidelines to follow when questioning team members. solve the equation a=m-n for the variable n A linear relationship is given in the table.x 2 1 0 1 2y 12 7 2 3 8What is the slope of the relationship?A: 5B: 5C: one fifthD: negative one fifth find the sum 59.34+1.85 A football is thrown upward at a(n) 23 degree angle to the horizontal. The acceleration of gravity is 9.8 m per s. To throw a(n) 52 m pass, what must be the initial speed of the ball? Answer in units of m per s. Which of the following is not a reason why brand loyalty is declining? Doha Ltd has QAR100 Million to invest. They plan to invest half of the money. Based on the NPV value, which project should they select? A NPV = 10 B NPV = -10 C NPV = 5 D NPV = 11 A 1000-kg object hangs from the lower end of a steel rod 5.0 m long that is suspended vertically. The diameter of the rod is 0.80 cm and Young's modulus for the rod is 210,000 x 106 N/m2. What is the elongation of the rod due to this object Given vectors u and y placed tail-to-tail, lul = 8, = 15 and 0=65". Find the sum of the vectors u and v if is the angle between them.