Answer:
sorry for the wait but the answer is b
Explanation:
Answer:
The code uses meaningful names for variables, procedures, and classes.
Explanation:
is the answer
If columns are labelled alphabetically, what will be the label for the cell in row 1, column 16,384?
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
Hope this helps!
Which of the following are labels used to identify illustrations such as tables, charts and figures in a document?
O Headers
O Footers
O Captions
O Citations
There are data which are given charts, tables and illustrated by the help of some labelling. This labelling helps us to identify the data and makes us understand what the data says.
This labelled data has to be given some name and thus in order to represent the figures in a document. This term caption is given to those data sets in the form of tables and illustrations.Hence the option C is correct,
Learn more about the labels used to identify the tables, charts and figures in a document.
brainly.in/question/11644668.
¿por que hay peligros en internet?
Answer:
Wait
it eases off.
Get home,
gathered,
very close and look up –
we find it’s all right.
Play:
they be.
For life,
but all vanished
picture faces –
matter: I do or don’t.
More,
something
out of hold
squeeze it tightly
my best,
my best life.
Opened,
something –
back at that moment –
all marchers
the room, the door, the front
rang through the outside
Explanation:
You just figured out the root cause of an application error. You changed some configurations on the affected machines and verified that the users have full functionality. What should you do next?
After resolving the application error and verifying that users have full functionality,the next step is to document the changes made and the steps taken to resolve the issue.
How is this so?This documentation is crucial for future reference, troubleshooting, and knowledge sharing within the team.
Also, it is important tocommunicate the resolution to the relevant stakeholders,such as users or supervisors, to ensure they are aware of the resolution and can provide f eedback if necessary.
Learn more about application error at:
https://brainly.com/question/30062195
#SPJ1
What is the word to tell excel that you want it to do math
Are you referring to functions? In a cell you can type "=" and it will allow you to enter a formula to insert math equations involving other cell values.
evaluate the arithmetic expression 234+567
Answer:
801
Explanation:
234 + 567 = 801
(1 point)
5. Which of the following types of professionals are most likely to perform administrative tasks
during training?
O Market research analysts
O Public relations specialists
O Advertising sales agents
O Advertising, marketing, and promotions managers
Answer: b public relations specialist
Explanation: took the quiz on edge, got 100%
Which of the following things can
a computer "mouse' do best?
a) create a program
b) buy computer software
c) move your cursor
d) eat cheese
Answer:
A
Explanation:
If the silly way is what u want then d
program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values
The followng program is capable or configuring a macro in excel
Sub MacroExample()
Dim A As Integer
Dim B As Integer
Dim C As Integer
' Set initial values
C = 0
A = 0
' Check if B is different from C
If B <> C Then
' Assign values to A
A = B
End If
' Display the values of A and C in the immediate window
Debug.Print "A = " & A
Debug.Print "C = " & C
End Sub
How does this work ?In this macro, we declare three integer variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.
If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed in the immediate window using the Debug.Print statements.
Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1
1) In Java, what is a suitable code for the second phase directions with arrays?
Second Phase Directions attached:
Answer:
yo no entiendo nada de nada
File
Home
Insert
Formulas
Data
Review
View
Automate
Help
Editing
Calibri Light
16
B
Bra Av
2
CS
General
G
A
B
С
D
E
F
L
H
1
3
3 In cell D7, create a formula that calculates the tax for the invoice. Us
a
sales tax rate of 7.5%
SABROSA
Catering Invoice
Sabrosa Empanadas & More
1202 Biscayne Bay Drive
Orlando, FL 32804
Invoice #:
6710A Date:
10/15/20
In cell Ds, create a formula that finds the total for the order. In other
this formula should add cells D3:07.
Empanadas & More
1
In cell D9 create a formula that calculates the total after a 10% disco
you need help understanding how to take a percentage off of a total
LINE TOTAL
2 MENU ITEM
3 Empanadas: Buffalo Chicken
4 Empanadas: Braised Short Rib
5 Empanadas: Fig and Goat Cheese
6 Sides: Black beans and rice
7
UNIT PRICE
$2.98
$2.98
$3.75
$1.98
QUANTITY
20
30
25
40
TAX
8
TOTAL
TOTAL AFTER DISCOUNT:
9
+
Catering Invoice Catering Subtotal challenge
C Mode tomate Workbook to
Helo improve Office
100%
-
Explanation:
formula should add cells D3:07.
Empanadas & More
1
In cell D9 create a formula that calculates the total after a 10% disco
you need help understanding how to take a percentage off of a total
LINE TOTAL
2 MENU ITEM
3 Empanadas: Buffalo Chicken
4 Empanadas: Braised Short Rib
5 Empanadas: Fig and Goat Cheese
6 Sides: Black beans and rice
7
UNIT PRICE
$2.98
$2.98
$3.75
$1.98
QUANTITY
20
30
25
40
TAX
8
TOTAL
Deb needs to add borders on the cells and around the table she has inserted into her Word document.
Insert tab, Tables group
Table Tools Design contextual tab
Home tab, Page Layout
Home tab, Format group
Answer:
Design tab
Explanation:
Select the call or table that you will like to useThen select the design tabIn the group page background select Page Borders There you will have multiple choses for where you want your borderYou can even customize your border by pressing Custom Border at the bottom of the list for Page BordersAnswer:
Table tools design contextual tab
Explanation:
What are the best legendary pokemon?
Answer:
Any EX
Any GX
Pikachu
Raichu
Mew Two
Charizard
Taurus
Gumshoos
Lurantis
Lapras
Incineroar
Dialga
Guzzlord
Lugia
Darkrai
Sigilyph
Xerneas
Explanation:
There are more but it takes a little while to get them all
What are some current and future trends for network technology? Check all of the boxes that apply. an increase in the number and types of devices an increase in the people who will not want to use the network an increase in the number and types of applications an increase in the use of wired phones an increase in the use of the cloud
Answer: A,C,E
Source: trust me bro
Which types of scenarios would the NETWORKDAYS function help calculate? Check all that apply.
Answer:
A. days of vacation time left
B. days of school left in the year
D. years of service someone performed
Explanation:
The NETWORKDAYS function is a built in excel function which makes it easy to calculate the number of days between two specified dates the start date and the end date, this function when applied excludes weekends from the days calculated and one has the opportunity of specifying certain holidays. With this function. The number of days till vacation, the number school days left. The NETWORKDAYS is a very versatile function.
HELP ASAP PLZ PLZ PLZTegan is playing a computer game on her smartphone and the battery is getting low. When she goes to charge her phone, she notices that the cord is broken. What can Tegan do to solve her problem?
Plug in the smartphone to charge.
Put tape around the broken part of the cord.
Ask a trusted adult for help replacing the cord.
Use the laptop charger instead.
Answer:
3rd choice
Explanation:
Your first submission for the CIS 210 Course Project should include the following functionality: - Requests the user to input his/her first name - Formats the name to capitalize the first letter and makes all remaining characters lowercase, removing any spaces or special characters - Output the formatted name to the console
Answer:
In Java:
import java.util.*;
public class Main{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
String name;
System.out.print("First name: ");
name = input.next();
name= name.substring(0, 1).toUpperCase() + name.substring(1).toLowerCase();
System.out.print(name);
}
}
Explanation:
This declares name as string
String name;
This prompts the user for first name
System.out.print("First name: ");
This gets the name from the user
name = input.next();
This capitalizes the first letter of name and makes the other letters to be in lowercase
name= name.substring(0, 1).toUpperCase() + name.substring(1).toLowerCase();
This prints the formatted name
System.out.print(name);
Enter a formula in the selected cell to display the owner's draw percentage (cell B6).
The formula is an illustration of Excel formulas, and Excel formulas are used to operate on values in a cell or a range of cells
Formula in the selected cell to display the owner's draw percentage is =B6
How to write the formula?From the question, the owner's draw percentage is in the cell B6.
To enter the formula, we simply enter the name of the cell (i.e. B6)
So, we have:
B6
Excel formulas begin with the equal to "=" sign,
So, we have:
= B6
Hence, the formula is = B6
Read more about Excel formulas at:
brainly.com/question/17566733
a really excellent way of getting you started on setting up a workbook to perform a useful function.
Templates a really excellent way of getting you started on setting up a workbook to perform a useful function.
What is the workbook about?One excellent way to get started on setting up a workbook to perform a useful function is to begin by defining the problem you are trying to solve or the goal you want to achieve. This will help you determine the necessary inputs, outputs, and calculations required to accomplish your objective.
Once you have a clear understanding of your goal, you can start designing your workbook by creating a plan and organizing your data into logical categories.
Next, you can start building the necessary formulas and functions to perform the required calculations and operations. This might involve using built-in functions such as SUM, AVERAGE, or IF, or creating custom formulas to perform more complex calculations.
Read more about workbook here:
https://brainly.com/question/27960083
#SPJ1
Whats the top Anime shows?
Answer:
my hero acidemia, parasyte, naruto, attack on titan, 7 deadly sins, one piece, and jojo
Explanation:
Answer:
This is personally based on my opinion.
My top 10 favorites
Toradora
Darling in the franxx
Lucky Star
My Melody
Death note
Attack on titans
One piece
The Promise neverland
Kaguya-sama: love is war
Black cover
Which of the following represents an input on a smartphone?
A pressing the volume key
B an appointment displayed by your calendar
C your phone ringing
D your screensaver turning on
Answer:
Pressing the volume key.
Explanation:
The appointment is and output. It is being shown to you from the smartphone.
The volume key is an input. Your telling the smartphone to raise its volume.
The phone ringing is also an output, and so is the screensaver turning on.
Answer:
A. Pressing the Volume Key
Hope this helped (~0>0)~Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.
Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.
You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:
What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.
In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:
Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.What is the Case Facts?First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.
Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.
Learn more about affidavit from
https://brainly.com/question/30833464
#SPJ1
A _____ address directs the frame to the next device along the network.
Answer:
When sending a frame to another device on a remote network, the device sending the frame will use the MAC address of the local router interface, which is the default gateway.
An unicast address directs the frame to the next device along the network.
What is network?
A computer network is a group of computers that share resources on or provided by network nodes. To communicate with one another, the computers use standard communication protocols across digital linkages. These linkages are made up of telecommunication network technologies that are based on physically wired, optical, and wireless radio-frequency means and can be configured in a number of network topologies.
The term "unicast" refers to communication in which a piece of information is transferred from one point to another. In this situation, there is only one sender and one receiver.
To learn more about network
https://brainly.com/question/28041042
#SPJ13
What is the difference between laser jet printer and inkjet printer? 60 - 100 words
Answer:
A laser jet printer uses toner, while an inkjet printer sprays ink dots onto a page. Laser jet printers generally work faster than inkjet printers. Although inkjet printers are cheaper than laser jet printers, they are usually more expensive to maintain in the long run as ink cartridges have to be replaced more often. Thus, laser jet printers are cheaper to maintain. Laser jet printers are great for mass printing as they are faster and, as mentioned earlier, cheaper to replenish. Whereas inkjet printers are better for printing high quality images.
why did industrial revolution begin Britain?
Answer:
Britain also happened to have a wealth of coal, iron, and other resources in a relatively small area, which would help kick-start the Industrial Revolution. Its growing Colonial Empire also provided a ready-made (and captive) market for surplus goods, providing further impetus for entrepreneurs and new industrialists
Answer:
Success in international trade created Britain's high wage, cheap energy economy, and it was the spring board for the Industrial Revolution.
Explanation:
im trying to call the keys in a dictionary I have called "planet_dict". in order for them to be included in the for loop, the values of the keys have to be within a range of
273 <= x <= 373
I understand how to do this with certain values, but idk how to call them from a dictionary.
You can do something like this. My code iterates through the dictionary keys and then we use that key to get a value. We check if the value is between 273 and 373 and if it is, it's a water planet. My code is just a general idea of what to do. Instead of printing, you could add the key to a list and then print the contents of the list.
Write the ColorfulBouncingCircle class, where you should write the constructor, setPlayingFieldSize, and tick methods, and override the overlaps method, each according to the above descriptions. You should not have to write any code which draws; instead, a test program will be provided which will animate ColorfulBouncingCircles based on your implementation. For every time tick, the test program will compare every circle against every other circle using the overlaps method
Answer: Circle class representing circle objects which have a radius, center x, and center y. It included overlaps and draw methods. Then, we wrote a Colorfulcircle class which included a Color property and overrode the draw method of Circle. For this assignment, you are asked to create a ColorfulBouncing circle class. Begin with the versions of Circle and ColorfulCircle uploaded to Canvas ColorfulBouncingCircle should extend ColorfulCircle, Unlike the other Circle classes, it will include a velocity for the x and y axes. The constructor for ColorfulBouncingCircle includes these parameters: public colorfulBouncingcircle (double radius, double centerx, double center Color color, double xVelocity, double yvelocity) Note that we are treating x as increasing to the right and y as increasing down, as with Java's graphics coordinates system. This was also seen with Circle's draw method. ColorfulBouncingCircles will bounce around in a playing field which the tester will provide. The Colorful Bouncinesicle class should have a public static method to set the playing field width and height: public static void setPlayingFieldsize (double newwidth, double newHeight) ColorfulBouncingCircle will also include a method which should alter its center and center with each time tick (similar to a metronome's noise guiding a musician to play a song). The circle's x position should be altered according to x velocity and y position according to y velocity. However, before changing the positions, check if the center position would, after moving, be either less than 0 or greater than the playing field dimensions. If so, instead of changing the center position, alter the velocity. If the ball hits the top or bottom, the sign of its vertical velocity should be flipped: if it hits the left or right, its horizontal velocity sign should be flipped. If it hits a corner, both should be. Notice that velocity may be positive or negativel The tick method which will be called by the tester is defined in this way:
public void tick() Finally, we should override the overlaps method to make balls bounce away from each other. You should call the super method to see if your circle overlaps another circle. If so, alter this circle's velocity according to its center relative to the other circle. If this circle" is above or below the "other circle," flip the sign of "this circle's" vertical velocity. If it's to the left or right, flip the horizontal velocity As before, both may be flipped. This is NOT the same as a true elastic collision, but it should be simpler for you to implement. The sign flipping will sometimes cause the balls to "vibrate" when caught between each other. Please review the velocity changing rules carefully; they are easy to get wrong!! To review: Write the ColorfulBouncineCircle class, where you should write the constructor setPlayingfield Size, and tick methods, and override the overlaps method, each according to the above descriptions. You should not have to write any code which draws; instead, a test program will be provided which will animate ColorfulBouncingCircles based on your implementation. For every time tick, the test program will compare every circle against every other circle using the overlaps method. The test program will ask you to press Enter in the console to launch the automated tests which will assign a tentative score based on your implementation. DO NOT ALTER the Circle OR Colorful Circle files!!
Explanation:
I am trying to figure this out but every type of coding I put in has errors or it states that the things aren't the same. This coding is being done in C++.
Get a line of text from the user. Output that line. (1 pt) Ex: Enter text: IDK how that happened. TTYL. You entered: IDK how that happened. TTYL. (2) Output the line again, this time expanding common text message abbreviations. (5 pts) Ex: Enter text: IDK how that happened. TTYL. You entered: IDK how that happened. TTYL. Expanded: I don't know how that happened. talk to you later. Support these abbreviations: BFF -- best friend forever IDK -- I don't know JK -- just kidding TMI -- too much information TTYL -- talk to you later Note: If an abbreviation appears twice, only expand its first instance.
Divide a network 10.10.0.0 with subnet mask 255.255.0.0 into 62 subnets.
10.10.0.0
0000 1010. 0000 1010 . 0000 0000 . 0000 0000
255.255.0.0
1111 1111. 1111 1111 . 0000 0000 . 0000 0000
Required:
a. How many bits do we need to borrow from the host portion?
b. List the lowest and the highest IP address of the first usable subnet.
c. How many usable hosts are there in total before and after subnetting?
Answer:
A. 6 bits
B. lowest IP address is 10.10.0.1 and the highest IP address is 10.10.3.254
C. total number of usable hosts before subnetting = 65534
total number of usable hosts after subnetting = 65408
Explanation:
The IP address 10.10.0.0 with the subnet mask 255.255.0.0 is a class B address with 16 bits of the network address portion and 16 bits of the host portion.
To subnet the address to use 62 subnets (and to reduce the host IP address wasted) 6 bits are borrowed from the host portion of the address to give 2^6 = 64 subnets with two usable host addresses.
The first network address is 10.10.0.0 and the first usable host address of the subnet is 10.10.0.1 making it the lowest address, while the broadcast address is 10.10.3.255 and the address before it becomes the higher address in the network which is 10.10.3.254
The number of usable host of the network before subnetting is 2^16 -2 = 65534, while after subnetting is (2^(16-6) - 2) x 64 = 65408.
6.
is the result of the computer processing the input you provide.
Explanation:
A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.
To function, a computer system requires four main aspects of data handling: input, processing, output, and storage. The hardware responsible for these four areas operates as follows:
Input devices accept data in a form that the computer can use; they then send the data to the processing unit.