Print preview is a feature that displays on the screen what a hard copy would look like when printed. By using print preview, you can find any errors that may exist or fix the layout before printing, which can save ink or toner and paper by not having to print more than once.
Question providede in the document please use my provided codes!!
Answer:
become successful in your Photo to the best of all time favorite
website is a collection of (a)audio files(b) image files (c) video files (d)HTML files
Website is a collection of (b) image files (c) video files and (d)HTML files
What is websiteMany websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.
To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.
Learn more about website from
https://brainly.com/question/28431103
#SPJ1
the computer that process data that are represented in the form of discrete values are called
Answer:
Digital computer
Explanation:
The computer that process data that are represented in the form of discrete values are called digital computer.
What is “Fair Use”?
It is the set of concepts that cannot be copyrighted or trademarked.
It is a set of situations that cause existing trademarks to expire.
It is the set of laws that enforce copyrights and trademarks.
It is a set of legal exceptions to copyrights and trademarks.
Answer:
C
Explanation:
How is the decimal number 96 expressed in binary code?
O A. 1100011
O B. 1110001
O C. 1100000
O D. 1000100
Answer:
o c.1100000
Explanation:
on a calculator punch in the number 96then press on the 2ndF button then the right bratket button and the unswer will showWhat are the core steps to add revisions or features to a project?(1 point)
Responses
Evaluate feasibility of the goals, create a list of functionality requirements, and develop the requirements of the feature.
Evaluate feasibility of the goals, develop programming solutions, and evaluate how well the solutions address the goals.
understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature.
Communicate with the client, create a sprint backlog, develop the project, and evaluate how well the solution fits the requirements.
The core steps to add revisions or features to a project are ""Understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature." (Option C)
How is this so?
The core steps to add revisions or features to a project include understanding the goals,evaluating the impact on the project, creating a list of functionality requirements,and developing the requirements of the feature.
These steps ensure that the goals are clear, the impact is assessed, and the necessary functionality is identified and implemented effectively.
Learn more about project management at:
https://brainly.com/question/16927451
#SPJ1
Which of the following is MOST likely to be an outcome of the digital divide?
A premium pizza is comprised of exactly 40 ounces of toppings. The available toppings are listed below with their corresponding weight (in ounces). There can be multiple entries of each topping, as long as the total weight is equal to 40 ounces. [18 points] For example, a pizza can contain 1 topping of pepperoni, 2 toppings of sausage, 1 topping of bacon, and 2 toppings of onion:1∗4+2∗10+1∗6+2∗5=401∗4+2∗10+1∗6+2∗5=40(ounces) A pizza cannot contain 7 toppings of bacon:7 ∗6=42>40A pizza cannot contain only 3 toppings of sausage :3
*
10=30<40Define a rule pizza
(P,S,B,O,M)
to find out how many of each topping can be contained on a pizza, where arguments
P,S,B,O
, and
M
represent the weights (in ounces) of the Pepperoni, Sausage, Bacon, Onion, and Mushroom toppings, respectively. [14] 3.2 Use your pizza rule to find all possible outputs to the following question (goal). [2] I ?- pizza(1, S, 1, O, M). Put all answers of the question in a comment in the file. 3.3 Use your pizza rule to find all possible outputs to the following question (goal). [2] I ?- pizza(
P,S,B,O,1)
. Put all answers of the question in a comment in the file.
Exactly 40 ounces of ingredients make up a premium pizza. The toppings that are available are mentioned below with their associated weights (in ounces).
For illustration, a pizza toppings list might include two toppings of onion, one of bacon, two of sausage, and one of pepperoni.: 1*4 + 2*10 + 1*6 + 2*5 = 40 (ounces)
There cannot be seven bacon toppings on a pizza: 7 * 6 = 42 > 40
A pizza must have just three sausage toppings: 3*10 = 30 < 40
To determine the maximum number of each topping that can be placed on a pizza, define the rule pizza(P, S, B, O, M), where P, S, B, O, and M represent the weights in ounces of the toppings, respectively, of pepperoni, sausage, bacon, onion, and mushrooms.
pizza(P,S,B,O,M):-
member(P,[0,1,2,3,4,5,6,7,8,9,10]),
member(S,[0,1,2,3,4]),
member(B,[0,1,2,3,4,5,6]),
member(O,[0,1,2,3,4,5,6,7,8]),
member(M,[0,1,2,3,4,5]),
S is 4*P + 10*S + 6*B + 5*O + 7*M,
S =:= 40.
Learn more about pizza here:
https://brainly.com/question/14451377
#SPJ4
When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c. aborts program execution d. returns to the calling function
Answer:
sorry this is tought
Explanation:
no idea
Stem assessment 4: divisible by
Explanation:
4 IS DIVISIBLE BY 2,4,1
IF MY ANSWER IS USEFUL MARK ME AS BRILLINT
this method should find the last occurance of x inside arr and return its index. if x isnt found inside the arr, the method should return -1
The final index of an element in an ArrayList object is obtained using Java's lastIndexOf() method for ArrayList objects.
Which of the above functions is used to locate the first and last instances, respectively, of a given string within another string?char *strstr is declared. Input Value: If strstr is successful, it returns a pointer to the element in s1 where s2 starts (points to s2 in s1). If there is a problem (if s2 doesn't appear in s1), strstr returns null.
How can I find the last occurrence index?The lastIndexOf() method returns the string's string's index (position) at which a given value last appears. The string is browsed from end to beginning using the lastIndexOf() method.
To know more about Array List visit :-
https://brainly.com/question/17265929
#SPJ4
please help me please i really need helpp so i can pass
Answer:
Piezoelectric gauge is used to convert charge into measureable electric signal.
Universal serial bus interface allows a computer and flash drive to exchange information.
Analytical balance is used to measure mass
Ultrasonic flow sensors measure the seed of water using ultrasonic waves.
Explanation:
Analytical balance is used to measure mass. An analytical balance is a device that can measure the mass of an object accurately. It can also measure very small amount of mass with a range between 0.1mg - 0.01mg.
Universal serial bus interface allows a computer and flash drive to exchange information. A Universal Serial Bus (USB) is an interface that allows communication between peripheral devices and a computer. It connects peripheral devices such as mouse, keyboards, printers, scanners, external hard drives and flash drives with the computer.
Piezoelectric gauge is used to convert charge into measureable electric signal. A piezoelectric gauge has a piezoelectric sensor that uses piezoelectric effect to measure changes in pressure, temperature, force and convert these changes into electrical charge.
Ultrasonic flow sensors measure the speed of flowing liquid using ultrasonic waves. It uses sound waves to determine the speed of the liquid.
What is the purpose of a frame check sequence (FCS) footer?
Answer:
Frame check sequence (FCS) refers to the extra bits and characters added to data packets for error detection and control.
Explanation:
Network data is transmitted in frames. Each frame is comprised of bits of data appended to the header, which holds basic information such as source and destination media access control (MAC) addresses and application. Another set of characters is added to the end of the frames, which are checked at the destination. Matching FCSs indicate that delivered data is correct.
what is the best kind of internet connection
Answer:
Fiber-Optic internet would be the best kind of internet connection.
if you are saving money to buy a house in eight years your time horizon is:
Answer:
8
Explanation:
they are saving money to buy it in 8
If I am saving money to buy a house in eight years your time horizon will be 8.
How is time horizon determined?Place your current age on one end and the age you want to be when you reach your most distant investing goal—for many individuals, this is retirement—on the other end. The time horizon you have for that future aim is the years in between these two ages.
How do you calculate time horizon:
You can start outlining the entire potential range of your investing life using your age. Place your current age on one end and the age you want to be when you reach your most distant investing goal—for many individuals, this is retirement—on the other end. Your time horizon for that future goal is the number of years between these two ages.
So: Current age = 20
Anticipated time for time horizon = 8 years
So age of saving = 28
Hence= age of maturity -current age
= 28-20
= 8
Hence, 8 years is the time for my time horizon in saving money for house purchase.
Learn more about time horizon from
https://brainly.com/question/2534146
#SPJ1
full meaning of XP in computer
Answer → eXPerience
Which of the following is an example of critical reading?
Select all that apply:
Accepting textual claims at face value Considering an argument from a different point of view
Reviewing an argument to identify potential biases
Skimming a text to locate spelling errors or typos
Looking for ideas or concepts that confirm your beliefs
Answer:
Which of the following is an example of critical reading? Select all that apply:
a.Accepting textual claims at face valueb.Considering an argument from a different point of viewc. Reviewing an argument to identify potential biasesd. Skimming a text to locate spelling errors or typose. Looking for ideas or concepts that confirm your beliefs
what is an input device
Which collection of fields demonstrates a logical organization of information in a table that tracks product data?
Product ID, Product Name, Price, Customer Address
Product ID, Product Name, Product Description, Price
Customer Name, Favorite Product, Customer Address
Customer Name, Product Name, Order Total
The collection of fields that demonstrates a logical organization of information in a table that tracks product data is: Product ID, Product Name, Product Description, Price
What is the logical organization?This group of fields captures the basic facts about a commodity, containing allure singular word that modifies a noun, name, writing, and price.
By arranging this facts in a table, it enhances smooth to search, sort, and permeate commodity established differing tests. This table can still be connected to additional tables in a table, in the way that a table that tracks consumer orders or a table that tracks stock levels.
Read more about logical organization here:
https://brainly.com/question/28026055
#SPJ1
The collection of fields that demonstrates logical organization of information in a table that tracks product data is
B. Product ID, Product Name, Product Description, PriceWays of organizing of information in a tableA table that tracks product data should include fields that logically organize information to enable efficient storage and retrieval the collection of fields that demonstrates a logical organization for this purpose is option b which includes product id product name product description and price.
Product id is a unique identifier for each product product name and description provide information about the product and price indicates how much the product costs customer address favorite product and order total are fields that are more appropriate for a table that tracks customer or sales data rather than product data
Learn more about organization of information at
https://brainly.com/question/18402159
#SPJ1
Hydraulic pressure is the same throughout the inside of a set of brake lines. What determines the amount of resulting mechanical
force is the size of the piston in the wheel cylinder or caliper. For example: 100 psi of fluid pressure acting against a caliper piston
with 4 square inches of surface area will result in 400 lbs of clamping force.
A fluid line with 200 psi in it acting against a piston with 3 square inches of area would result in 600 lbs of force.
A fluid line with 50 psi acting on a larger piston with 12 square inches of surface area would result in 600 lbs of force, and so on...
How much fluid pressure would it take to lift a 6000 lb truck on a lift with a 60 quare inch piston (such as on an automotive lift)?
Give your answer and try to justify your answer using an equation or formula.. Pressure x surface area equals mechanical force,
or... force divided by surface area equals fluid pressure
Answer: 1000 square ponds of force hope you know the answer
Explanation: i guessed
explain any three precautions that you must take when cleaning a computer
Answer:
The best way to clean any computer component or device is to follow the manufacturer's instructions in your user manual.
Always power off the system first.
Always use anti-static wristband or other professional grounding devices.
Never work on carpeted surfaces.
Which of the following is a reason to use a template?
a. To save time when creating a new presentation
b. To use a consistent design throughout your presentation
c. To get ideas for possible content for a presentation
Answer:
B, To use a consistent design throughout your presentation
Explanation:
Templates basically enforce overall consistency by having a pre-determined structure and layout. All documents made using a template will match its layout exactly. When it comes to your document's content, Word's Styles tool is a great way to maintain consistent formatting.
What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me
Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.
Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.
PLS MARK ME AS BRAINLIEST.
Password protection restricts access to a resource, while encryption secures the actual content of that resource by transforming it into an unreadable form.
Ask about the difference between password protection and encryption.
Now, Password protection and encryption serve different purposes when it comes to securing data.
Password protection is a method of restricting access to a device, system, or specific files by requiring users to enter a password. It acts as a barrier to prevent unauthorized individuals from accessing the protected resource.
The password is typically a combination of characters that only authorized users should know.
Encryption, on the other hand, is a technique used to convert plain text or data into an unreadable format, called ciphertext, using an encryption algorithm.
The ciphertext can only be decrypted back to its original form by someone possessing the decryption key.
Encryption ensures that even if someone gains unauthorized access to the data, they will not be able to read or understand it without the decryption key
Hence, Both measures are commonly used together to enhance data security.
To learn more about password protection visit:
https://brainly.com/question/32167725
#SPJ3
How many NOTS points are added to your record for not completely stopping at a stop sign?
2. Write a C program that generates following outputs. Each of the
outputs are nothing but 2-dimensional arrays, where ‘*’ represents
any random number. For all the problems below, you must use for
loops to initialize, insert and print the array elements as and where
needed. Hard-coded initialization/printing of arrays will receive a 0
grade. (5 + 5 + 5 = 15 Points)
i)
* 0 0 0
* * 0 0
* * * 0
* * * *
ii)
* * * *
0 * * *
0 0 * *
0 0 0 *
iii)
* 0 0 0
0 * 0 0
0 0 * 0
0 0 0 *
Answer:
#include <stdio.h>
int main(void)
{
int arr1[4][4];
int a;
printf("Enter a number:\n");
scanf("%d", &a);
for (int i=0; i<4; i++)
{
for(int j=0; j<4; j++)
{
if(j<=i)
{
arr1[i][j]=a;
}
else
{
arr1[i][j]=0;
}
}
}
for(int i=0; i<4; i++)
{
for(int j=0; j<4; j++)
{
printf("%d", arr1[i][j]);
}
printf("\n");
}
printf("\n");
int arr2[4][4];
int b;
printf("Enter a number:\n");
scanf("%d", &b);
for (int i=0; i<4; i++)
{
for(int j=0; j<4; j++)
{
if(j>=i)
{
arr1[i][j]=b;
}
else
{
arr1[i][j]=0;
}
}
}
for(int i=0; i<4; i++)
{
for(int j=0; j<4; j++)
{
printf("%d", arr1[i][j]);
}
printf("\n");
}
printf("\n");
int arr3[4][4];
int c;
printf("Enter a number:\n");
scanf("%d", &c);
for (int i=0; i<4; i++)
{
for(int j=0; j<4; j++)
{
if(j!=i)
{
arr1[i][j]=c;
}
else
{
arr1[i][j]=0;
}
}
}
for(int i=0; i<4; i++)
{
for(int j=0; j<4; j++)
{
printf("%d", arr1[i][j]);
}
printf("\n");
}
printf("\n");
return 0;
}
Explanation:
arr1[][] is for i
arr2[][] is for ii
arr3[][] is for iii
As a computer programmer, a principal of a famous
private school in your country has a challenge in his
school when it comes to people from all walks of life
checking the entry requirement for admission into the
school.
As a computer programmer, write a simple application
in pseudocode that will enable people from any part of
the world to use in checking the entry requirement.
The entry requirement is as follows
1. The student must be a Ghanaian
2. Must be 18 years and above
3. Must be a male or female
This program would allow people check the entry requirement for admission into this famous private school.
START
nationality = INPUT : “Enter your country of origin”
IF the variable country is equal to Ghana
PRINT "Accepted"
ELSE
PRINT "Not accepted"
age = INPUT : "Enter your age"
IF the variable age is equal to 18 THEN,
PRINT "Accepted"
ELSE IF the variable age is greater than 18
PRINT "Accepted"
ELSE
PRINT "Under age"
gender = INPUT : "Enter your gender (Male/M/m or Female/F/f)";
IF the variable gender is equal to "Male" "M" and "m" THEN,
PRINT "Male"
ELSE IF the variable gender is equal to "Female" "F" and "f" THEN,
PRINT "Male"
Else
PRINT "Unspecified gender";
END
What is an algorithm?An algorithm can be defined as a standard formula which comprises a set of finite steps and instructions that must be executed by a software program, in order to proffer solutions to a problem on a computer, under appropriate conditions.
What is a pseudocode?
A pseudocode can be defined as a description of the steps that are contained in an algorithm, especially through the use of a plain (natural) language.
Read more on pseudocode here: brainly.com/question/13208346
#SPJ1
please answer in python language
Which of the following would be considered software? Select 2 options.
memory
printer
operating system
central processing unit (CPU)
Microsoft Office suite (Word, Excel, PowerPoint, etc.)
Thing
Answer:
Microsoft Office suite (Word, Excel, PowerPoint, etc.), and thing
Explanation:
The Operating system and Microsoft Office suite will be considered as software.
A Software is the opposite of Hardware in a computer system.
Let understand that Software means some set of instructions or programs on a computer which are used for operation and execution of specific tasks.There are different type of software and they include:
Application Software are software installed into the system to perform function on the computer E.g. Chrome.System Software is the software designed to provide platform for other software installed on the computer. Eg. Microsoft OS. Firmware refers to set of instructions programmed on a hardware device such as External CD Rom.In conclusion, the Operating system is a system software while the Microsoft Office suite is an application software.
Learn more about Software here
brainly.com/question/1022352
transferring data from a local computer to a remote computer is referred to as what?
Answer: uploading
Explanation:
it’s referred as uploading when you move data from one to another
odify the guessing-game program so that the user thinks of a number that the computer must guess.
The computer must make no more than the minimum number of guesses, and it must prevent the user from cheating by entering misleading hints.
Use I'm out of guesses, and you cheated and Hooray, I've got it in X tries as your final output.
The guessing-game program that the user thinks of a number that the computer must guess is illustrated below.
How to illustrate the program?The appropriate program for the guessing game will be:
import random
import math
smaller = int(input("Enter the smaller number: "))
larger = int(input("Enter the larger number: "))
count = 0
print()
while True:
count += 1
myNumber = (smaller + larger) // 2
print('%d %d' % (smaller, larger))
print('Your number is %d' % myNumber)
choice = input('Enter =, <, or >: ')
if choice == '=':
print("Hooray, I've got it in %d tries" % count)
break
elif smaller == larger:
print("I'm out of guesses, and you cheated")
break
elif choice == '<':
larger = myNumber - 1
else:
smaller = myNumber + 1
Learn more about programs on:
https://brainly.com/question/16397886
#SPJ1