write a statement that assigns myexamscore with 82. write a statement that assigns mycurvedexamscore with myexamscore 5.

Answers

Answer 1

myExamScore = 82- a statement that assigns myexamscore with 82.

myCurvedExamScore = myExamScore + 5- a statement that assigns mycurvedexamscore with myexamscore 5.

What is statement?

a single statement or remark: assertion; a report of information; an opinion. A statement, such as "Pizza is tasty," asserts the truth of a certain proposition. The legal, banking, and governmental sectors all use different forms of statements. Every sentence contains a claim or a purpose. You must report an accident to the police and describe what you witnessed in your statement. Statements, in general, are the kinds of sentences that can be either true or false. When a sentence can express numerous statements, it is ambiguous. You must determine which statement is being expressed when a sentence is unclear. a spoken or written communication or proclamation that presents information, such as facts or details.

To know more about statement, visit:

https://brainly.com/question/3281093

#SPJ4


Related Questions

suggest any complete anime......​

Answers

watch the fate series

With respect to iot security, what term is used to describe the digital and physical vulnerabilities of the iot hardware and software environment?
a. Traffic Congestion
b. Device Manipulation
c. Attack Surface
d. Environmental Monitoring

Answers

Answer: Answer Surface

Explanation:

Fill in the word to complete the sentence.
A ___________ is a line ignored by Python during execution.

Answers

Answer:

Service Layer

Explanation:

Recommend a minimum of 3 relevant tips for people using computers at home, work or school or on their SmartPhone. (or manufacturing related tools)

Answers

The three relevant tips for individuals using computers at home, work, school, or on their smartphones are ensure regular data backup, practice strong cybersecurity habits, and maintain good ergonomics.

1)Ensure Regular Data Backup: It is crucial to regularly back up important data to prevent loss in case of hardware failure, accidental deletion, or malware attacks.

Utilize external hard drives, cloud storage solutions, or backup software to create redundant copies of essential files.

Automated backup systems can simplify this process and provide peace of mind.

2)Practice Strong Cybersecurity Habits: Protecting personal information and devices from cyber threats is essential.

Use strong, unique passwords for each online account, enable two-factor authentication when available, and regularly update software and operating systems to patch security vulnerabilities.

Be cautious while clicking on email attachments, downloading files, or visiting suspicious websites.

Utilize reputable antivirus and anti-malware software to protect against potential threats.

3)Maintain Good Ergonomics: Spending extended periods in front of a computer or smartphone can strain the body.

Practice good ergonomics by ensuring proper posture, positioning the monitor at eye level, using an ergonomic keyboard and mouse, and taking regular breaks to stretch and rest your eyes.

Adjust chair height, desk setup, and screen brightness to reduce the risk of musculoskeletal problems and eye strain.

For more questions on computers

https://brainly.com/question/24540334

#SPJ8

Harry’s Shoe Store has noticed a significant increase of revenue of $123,000. The manager has also determined that the total expenses equal to $128,000. Will this business net a profit or loss? _______ How much of a profit or loss? ________

Answers

Answer: Loss by $5,000

Explanation:

As you see, the loss is greater than profit. Simply subtract loss-profit

what does it mean when the save button on the quick access toolbar changes to a circular set of two arrows?

Answers

When the save button on the quick access toolbar changes to a circular set of two arrows, it means that workbook is saved in the cloud  (It means word is automatically syncing your changes back to OneDrive).

The Quick Access Toolbar (QAT) is simply known as small modifiable toolbar. It is often located at the top of the office application window that is, it can be seen next to the Microsoft Office button. It is known to have its own  set of independent commands and render quick access to commands like Save, Undo, Redo, etc. OneDrive is a renown Microsoft cloud service and a type of cloud services that helps individuals to link up oneself to all our files. It allows storage and protection of  files, sharing and get to them any time.

Conclusively, we can say that When the save button on the quick access toolbar changes to a circular set of two arrows, it means that workbook is saved in the cloud  (It means word is automatically syncing your changes back to OneDrive).

Learn more from:

https://brainly.com/question/17163678

what does it mean when the save button on the quick access toolbar changes to a circular set of two arrows?

If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature

Answers

The key would he use to create the digital signature is Mike public key.

Which key is used to sign messages?

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

https://brainly.com/question/17486027

CRT displays are used in laptops because they a flat.

True
False

Answers

Answer:

true

is answer

Explanation:

he ha hagbxbffjyet

Answer:

They used to, but they dont anymore. So the answer is false!

Have a great day!

Keisha wants to change the default printer before printing an e-mail. Which steps will accomplish this task?
on the Home tab, clicking Print and choosing the desired printer from the Printer drop-down list
O on the File tab, clicking Print and choosing the desired printer from the Printer drop-down list
O on the Home tab, clicking Open and choosing the desired printer from the Printer drop-down list
O on the File tab, clicking Open and choosing the desired printer from the Printer drop-down list
lol

Answers

Answer:

The steps that will accomplish the task are;

On the File tab, clicking Print and choosing the desired printer from the Printer drop-down list

Explanation:

In steps required to change the default printer on Microsoft Outlook before printing as e-mail are as follows;

1) Select the File tab on the Menu bar

2) Click on the Print option on the File's Menu

3) From the Print window displayed under the File Menu in Microsoft Outlook select the desired printer from the Printer options drop-down list

The steps that will accomplish the task are On the File tab, clicking Print and choosing the desired printer from the Printer drop-down list.

Anything that interferes with the sender's creating and delivering a message and the receiver interpreting the message is called__
communication
distortion
distraction
netiquette

Answers

Communication distortion is any interference that affects the accurate transmission of a message.

What is communication?

Communication is the exchange of information and ideas between people, usually through speaking, writing, or body language. It is an essential part of everyday life, involving not only personal interaction but also the ability to convey thoughts and feelings to others. Communication is important for social interaction and helps us to express ourselves, build relationships, and understand the world around us. Communication is a vital part of every human relationship and helps us to form connections with others.

This interference can be caused by any number of factors and can range from a simple misunderstanding to a major disruption of the communication process. Examples of communication distortion include physical barriers, such as noise, physical distance, time, or cultural differences; psychological barriers, such as emotions, attitudes, and beliefs; and technical barriers, such as technology or language. Communication distortion can cause misunderstandings, which can lead to ineffective communication and even conflict.

By understanding the potential causes of communication distortion, leaders can take steps to reduce the risks. They can improve the physical environment to reduce distractions, such as noise and visual clutter. They can create an atmosphere of trust and respect to reduce psychological barriers, such as feelings of distrust or anger. They can also use technology and language that are common and easy to understand to reduce technical barriers. Leaders should also practice good netiquette, which is the set of guidelines for responsible and polite online behavior.

By taking steps to reduce communication distortion, leaders can ensure that their messages are accurately received and understood. This will help create a more productive and positive work environment.

To know more about communication click-

https://brainly.com/question/26152499

#SPJ4

True or False: A ruler is used to measure units of length, inches, feet
and yards.

Answers

Answer:

True

Explanation:

Rulers are used to measure relatively small increments including centimeters, inches, feet and even yards (yardsticks).

The answer is true...

How do you download music to put it on a slide for a presentation?

Answers

To acquire music for your presentation, just adhere to these guidelines:

The Guidelines

Find a legitimate source of music, such as royalty-free or licensed options, that enable you to use it for presentations lawfully and without violating any copyright laws.

Several platforms are available for downloading music without royalties, including Sound Cloud, You T ube Audio Library, as well as paid platforms like Audio Jungle and Epidemic Sound.

Carefully select and download music by perusing the assortment of available tracks and choosing the one that complements your presentation. Search for a button or hyperlink on the platform that enables you to download and store the music file onto your computer.

To incorporate sound in your slide, initiate your presentation software, select the desired slide, and locate the feature that allows you to add audio or multimedia. Find the music file that has been downloaded onto your computer and insert it into the slide.

Adapt the configurations: To make sure that the music is played precisely during the presentation, you may tailor the audio preferences, such as the volume, playback duration, or commencement/conclusion times, depending on the presentation software.

Read more about presentation here:

https://brainly.com/question/24653274

#SPJ1

What element of your risk mitigation strategy helps keep future additions to your network from introducing new security vulnerabilities?

Answers

Regular security audits and assessments are essential elements of a risk mitigation strategy that help prevent new security vulnerabilities when adding future additions to the network.

Regular security audits and assessments play a crucial role in preventing the introduction of new security vulnerabilities when adding new elements to a network. By conducting these audits and assessments, organizations can identify and address any weaknesses or potential vulnerabilities in their existing infrastructure and ensure that proper security measures are in place. When new additions, such as devices, applications, or systems, are introduced to the network, conducting a thorough security audit helps assess their potential impact on the overall security posture. This includes examining the security controls, access permissions, configuration settings, and potential vulnerabilities associated with the new additions. Any identified issues or gaps can then be addressed promptly to ensure that the new elements are integrated securely into the network environment.

Regular security audits and assessments also help organizations stay updated with evolving security threats and industry best practices. By regularly reviewing and assessing the network's security measures, organizations can proactively identify and mitigate potential vulnerabilities before they are exploited by malicious actors. In conclusion, regular security audits and assessments are a vital component of a risk mitigation strategy that helps prevent the introduction of new security vulnerabilities when adding future elements to a network. They enable organizations to maintain a strong security posture and ensure that new additions are integrated securely and do not compromise the overall network security.

Learn more about network here: https://brainly.com/question/30456221

#SPJ11

Question 11
1 pts
You need to find the square root of a value. Which of the following functions would you
use?
int
fabs
pow
O sqrt

Answers

Answer:

sqrt

Explanation:

Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task. It can be classified into the following categories;

If you need to find the square root of a value. The function you would use is sqrt.

In Computer programming, the sqrt () function is a mathematical tool which allows a user to find the square root value of any numerical value (numbers)

For example the code for finding the square root of a value using Python programming language is;

num = 36

\\This is the value of the original number\\

sqrt = num ** (0.5)

print ("The square root of the number "36" is 6")

Answer:

sqrt

Explanation:

i'm in python

One problem with dynamic arrays is that once the array is created using the new operator the size cannot be changed. For example, you might want to add or delete entries from the array similar to the behavior of a vector. This project asks you to create a class called DynamicStringArray that includes member functions that allow it to emulate the behavior of a vector of strings.

Answers

To emulate the behavior of a vector of strings, you can create a class called DynamicStringArray. This class should include member functions that allow adding and deleting entries from the array. Here's an example implementation:

1. Start by creating a private member variable to store the array of strings. Let's call it "data" and declare it as a dynamic array of strings.

2. Create a private member variable to keep track of the current size of the array. Let's call it "size".

3. In the constructor of the class, initialize the "data" array with an initial size and set the "size" variable accordingly.

4. Create a member function called "addEntry" that takes a string as a parameter. Inside this function, create a new temporary array with a size that is one element larger than the current size. Copy all elements from the "data" array to the temporary array using a loop. Then, add the new string at the end of the temporary array. Finally, delete the old "data" array and assign the temporary array to the "data" member variable. Update the "size" variable accordingly.

5. Create a member function called "deleteEntry" that takes an index as a parameter. Inside this function, create a new temporary array with a size that is one element smaller than the current size. Copy all elements from the "data" array to the temporary array except for the element at the given index. Finally, delete the old "data" array and assign the temporary array to the "data" member variable. Update the "size" variable accordingly.

6. To access an element at a specific index, create a member function called "getEntry" that takes an index as a parameter and returns the string at that index in the "data" array.

With these member functions, your DynamicStringArray class can now emulate the behavior of a vector of strings by allowing the addition and deletion of entries from the array.

To know more about DynamicStringArray visit:

https://brainly.com/question/33636506

#SPJ11

help me pleaseeeeeeeee​

help me pleaseeeeeeeee

Answers

Answer:

Git hub or. Stackoverflow has most of the answers about programming

Explanation:

Pradeep and his cousin went to the corner store to buy candy. His cousin paid and told Pradeep he could pay him back. "You owe me 4⁄5 of a dollar," laughed his cousin. "How much is that?" Pradeep asked. "You tell me!" his cousin replied. How much does Pradeep owe his cousin?

Answers

Answer:

"It is 80 cents"

Explanation:

In order to calculate how much this actually is, we would need to multiply this fraction by the value of a whole dollar which is 1. We can divide the fraction 4/5 and turn it into the decimal 0.80 which would make this much easier. Now we simply multiply...

0.80 * 1 = $0.80

Finally, we can see that 4/5 of a dollar would be 0.80 or 80 cents. Therefore Pradeep would answer "It is 80 cents"

Name the technique used to separate the mixture of colours in black ink ​

Answers

Answer:

chromatography

hope it helps

Since the water carries the different pigments at different rates, the black ink separates to reveal the colors that were mixed to make it. In this experiment, you're using a technique called chromatography.

So the answer is chromatography

An analog video is a video signal transmitted by an analog signal, captured on a (blank)

Answers

Answer:Analog component signals are comprised of three signals, analog R′G′B′ or YPbPr. Referred to as 480i (since there are typically 480 active scan lines per frame and they are interlaced), the frame rate is usually 29.97 Hz (30/1.001) for compatibility with (M) NTSC timing.

Explanation:

What decimal value does the 8-bit binary number 10011110 have if it is on a computer using two's complement representation?

Answers

The 8-bit binary number 10011110 have decimal value of -98 if it is on a computer using two's complement representation.

The MSB displays the sign in the 2's complement representation of binary integers by using a '0' for the positive sign and a '1' for the negative sign. Magnitude representation is done using the remaining bits. The largest value that an 8-bit binary number can represent is decimal 255, or binary 11111111. Its calculated as follows: 1*128 +1*64+1*32+1*16+1*8+1*4+1*2+1+1 = decimal 255.

Learn more on 8-bit binary number here: https://brainly.com/question/21807213#

#SPJ4

which statements compares the copy and cut commands

Answers

The statement that accurately compares the copy and cut commands is 2)Only the cut command removes the text from the original document.

When using the copy command, the selected text is duplicated or copied to a temporary storage area called the clipboard.

This allows the user to paste the copied text elsewhere, such as in a different location within the same document or in a separate document altogether.

However, the original text remains in its original place.

The copy command does not remove or delete the text from the original document; it merely creates a duplicate that can be pasted elsewhere.

On the other hand, the cut command not only copies the selected text to the clipboard but also removes it from the original document.

This means that when the cut command is executed, the selected text is deleted or "cut" from its original location.

The user can then paste the cut text in a different place, effectively moving it from its original location to a new location.

The cut command is useful when you want to relocate or remove a section of text entirely from one part of a document to another.

For more questions on cut commands

https://brainly.com/question/19971377

#SPJ8

Question: Which statement compares the copy and cut commands?

1. only the copy command requires the highlighting text

2. only to cut command removes the text from the original document

3. only the cut command uses the paste command to complete the task

4. only the copy command is used to add text from a document to a new document

counseling is considered urgent crisis counseling

Answers

Answer:

yes

Explanation:

Define the binary operation * on the set of rational numbers as : a*b = ab a - b. what is the inverse element for 5 with respect to this operation?

Answers

The inverse element for 5 with respect to the given binary operation * is 4.

To find the inverse element for 5 with respect to the binary operation * on the set of rational numbers, we need to find another rational number such that when it is operated with 5 using the given binary operation *, the result is the identity element.
The identity element for this operation is 1, as for any rational number a, a*1 = a - 1 = a.
To find the inverse element for 5, we need to find a rational number x such that 5*x = 1.
Using the given binary operation *, we have:
5*x = 5 - x = 1
To solve this equation, we can rearrange it to isolate x:
5 - x = 1
-x = 1 - 5
-x = -4
Now, we can multiply both sides of the equation by -1 to solve for x:
x = (-4)(-1)
x = 4

For more such questions binary,Click on

https://brainly.com/question/30049556

#SPJ8

Select the correct answer.
Which option should you select to accept a tracked change?
O A.
Accept
Reject
O C. Review
OB.
O D. Delete

Answers

Answer:

Explanation:

Which option should you select to accept a tracked change?

A.  Accept

Mention five(5) businesses that needs computer to apperate.

Answers

Answer:

1. Accounting

2. software developing

3. Website designing

4. Online transaction

5. Advertising




What is PID Control? Define overshoot, rise time, and steady state error. How are these parameters corrected with the help of PID Control.

Answers

PID Control is an abbreviation for Proportional Integral Derivative Control. It is an automatic control system that regulates physical phenomena by constantly adjusting an output variable based on an input signal. The PID controller does not anticipate future behavior based on past data;

rather, it is reactive in nature. The controller aims to minimize the difference between the desired setpoint and the measured process value by manipulating the input signal.What is Overshoot?Overshoot is the amount of oscillation about the setpoint before reaching a stable state. It is a type of error that occurs when the system overshoots the setpoint, resulting in a transient response.

Overshoot is measured in terms of a percentage of the setpoint, and it can be influenced by the controller's proportional gain, integral gain, and derivative gain.What is Rise Time?Rise Time is the amount of time it takes for the system to reach 90% of the final value from the time of a step change in the input signal. It is defined as the time increased to correct it.If the rise time is long, the proportional gain can be increased or the derivative gain can be lowered.If there is steady-state error, the integral gain can be increased to correct it.A PID controller is used to regulate a process variable by adjusting an output variable based on an input signal, as well as to improve performance by minimizing the difference between the setpoint and the actual process variable value.

To know more about PID controller visit:

brainly.com/question/33457642

#SPJ11

give two examples of situations or applications where electronic circuits are used​

Answers

The two examples of situations or applications where electronic circuits are used​ are mobile phone handsets, and also for TV or computers.

What are the applications of electronic circuits?

Electronics are said to be mostly used in the automobile industry and it is one that make use of the engine control and car-entertainment systems.

Note that  It is used in regards to utility systems such as boiler feed pumps, high voltage DC transmission and others.

Hence, The two examples of situations or applications where electronic circuits are used​ are mobile phone handsets, and also for TV or computers.

Learn more about electronic circuits from

https://brainly.com/question/2969220

#SPJ1

True or False: You should always be running at least two sets of
ads against each other.

Answers

answer:

true

explanation

there must be at least 2 sets of ads to be against each other because it gives attention to your company, which will help you to gain 5000+ people, which will make rivalry

you have a polygon feature representing a plot of land. the plot will now have two different crops grown on it. how would you modify the plot polygon feature to reflect the two crops?

Answers

To modify the plot polygon feature to reflect two different crops, you can use a process called "splitting" or "dissolving" the polygon feature. This process involves dividing the polygon into two separate parts based on the crop type.

To split the polygon feature, you can use a GIS software tool such as ArcGIS or QGIS. In these software tools, you can use the "Split" or "Clip" tool to separate the polygon into two parts based on the location of the different crops. You can either draw a line manually to split the polygon or use an existing layer that represents the crop types to perform the split.

Alternatively, you can use the "Dissolve" tool to merge the two parts of the polygon that contain the same crop type. This tool will create a new polygon feature that reflects the different crop types on the plot of land. The resulting polygon will have a separate attribute field that indicates which part of the polygon represents which crop type.

In summary, modifying the plot polygon feature to reflect two different crops can be done by either splitting or dissolving the polygon based on the location of the crops. This process can be performed using GIS software tools such as ArcGIS or QGIS.

To know more about polygon polygon feature visit:

https://brainly.com/question/17138059

#SPJ11

Who is mostly responsible for your security online?

Answers

Answer:

You are most reponsible for your own security online

Explanation:

Other Questions
The ability to use language to communicate effectively by using well-organized narratives primarily depends upon the development of ____________ skill. Why was Marguerite intrigued by Mrs. Flowers?Because Mrs. Flowers was a mystery in the town.Because Mrs. Flowers attended Marguerite's Church.Because Mrs. Flowers was unlike anyone Marguerite has met before.Because Mrs. Flowers was her mother's best friend. refers to how useful the tool is to measure a persons attributes for a specific job opening. Suppose the value of the S&P 500 stock index is currently 2,000. a. If the 1-year T-bill rate is 3% and the expected dividend yield on the S&P 500 is 2%, what should the 1-year maturity futures price be? b, what if the T-bill rate is less than the dividend yield, for example, 1%? The T-bill rate is less than the dividend yield, then the futures price should be how long is 10% of 60 minutes Please help I need this done by tomorrow 12. A certain sum of money is divided among 2 boys and 3 girls. One boy gets 27 and the other boy gets 3/14. The balance is divided equally among the 3 girls. Find the shere of each girl out of all these animals which is the biggest emu kangaroo kookaburra wombat this is for 1963266mizuki88 hope you like it :) A 92-ft tree casts a shadow that is 120 ft long. What is the angle of elevation of the sun? Write the equation of the line that passes through the points (1,7) and (1,7). Put your answer in fully simplified point-slope form, unless it is a vertical or horizontal line. (ii) which one of the following combinations will tend to produce the highest rate of return according to the fama-french three-factor model? assume beta is constant in all cases. (a) large market capitalization and high book-to-market ratio (b) large market capitalization and low book-to-market ratio (c) small market capitalization and high book-to-market ratio (d) small market capitalization and a book-to-market ratio of 1.0 (e) small market capitalization and a low book-to-market ratio there are 20 boys in JSS2 If the ratio of boys to girls is 2:3 how many student are there in JSS2 7. Perform the following transformations on the graph of f. g(x)= -2f(2x + 1) + 1 1. What is LeapFrogs business model? What are the particular benefits/value to customers that LeapFrog provides? Explain why these are useful for LeapFrogs key customer segments.2. Analyze Mike Woods process of discovering/developing his business model initially. Highlight key activities and events. Use relevant keywords and concepts from the readings Assume that you are a company secretary of Dragon Equipment's SAOG. The annual general meeting of the company is scheduled on May 28,2022. What are the different types of resolution you may pass in the meeting? Explain each category. Which of the following is an example of segregation that occurred in spite ofthe Fourteenth Amendment?A. Blacks earned the same amount of money as whites who held similar jobs.B. Blacks could not eat at the same restaurants as whites.OC. Whites and Blacks lived together peacefully in the sameneighborhoods.D. Blacks and whites had to pay poll taxes in order to vote inelections.SUBMIt 3. A three-bedroom house in Burbville sold for $190,000. If housing prices are expected to increase1.8% compounded annually in that town, write a function that models the price of the house in tyears. The reverse transcriptase enzyme of HIV is less accurate than other polymerases, which causes it to make errors relatively frequently. As a result, HIV has a high ___ rate. getting start of hack the box service scanning: perform an nmap scan of the target. what is the version of the service that is running on port 8080?