After Hours Work Jackie Mills, MA, has been asked by the Office Manager (OM) to use her computer account to update patient files in the computer. The office has changed to a new software program and needs to reset the billing cycle for the current patients. So that the new project doesn't interfere with Jackie's regular work, she has requested that she come in an hour and a half earlier. Jackie also explains that by coming in earlier than the rest of the staff, she can concentrate and be more efficient. The OM agrees, and has approved for her to sign in earlier on her time sheet until the project is finished. The OM has planned for this project to take between 10 and 15 hours to complete. At the end of the first week, the OM has noticed that Jackie has signed in two hours early each day. At the beginning of the second week, the Office Manager asks Jackie how the project is coming along since she has had about 10 hours of work into it. Jackie states that the project is much more involved than what she expected, and that it would take her at least another 20-30 hours to complete it, if not longer. This statement surprises the OM; the software company assured her it is a fairly easy and quick process to reset the billing cycle for current patients. The OM herself has already reset a couple of accounts due to special circumstances. Question 1: If the OM is unsure or weary of Jackie's actions, how could the OM verify Jackie's work? Question 2: If the OM was able to prove Jackie wasn't doing her work, what actions should be taken against Jackie?

Answers

Answer 1

If the OM is unsure or weary of Jackie's actions, the OM can verify Jackie's work by looking at all that she has done and evaluating it.

If the OM was able to prove Jackie wasn't doing her work, the actions that should be taken against Jackie are:

WarningSuspensionOr a query letterWhat is the role of a office manager?

An office manager is known to be a person that is said to be one that makes sure that an office is said to be on a  smooth run.

They are known to be people that carry out duties such as coordinating meetings, sending a lot of emails, putting together  office supplies and giving a lot of general support to  staff.

Therefore, If the OM is unsure or weary of Jackie's actions, the OM can verify Jackie's work by looking at all that she has done and evaluating it.

If the OM was able to prove Jackie wasn't doing her work, the actions that should be taken against Jackie are:

WarningSuspensionOr a query letter

Learn more about  Office Manager (OM) from

https://brainly.com/question/2736549

#SPJ1


Related Questions

How many bits is needed to distinctly address 226KB in a byte addressable Memory?

Answers

To distinctly address 226kb in a byte addressable memory, one would need 8 bits.

What is an addressable memory?

Word addressing in computer architecture implies that addresses of memory on a computer authenticate words of memory.

In contrast to byte addressing, where addresses authenticate bytes, it is commonly employed.

What is the calculation justifying the above answer?

Given:

2⁸ = 256

and 226 < 256

Hence, we need 8 bit.

Learn more about addressable memory:
https://brainly.com/question/19635226
#SPJ1

In which sections of your organizer should the outline be located?

Answers

The outline of a research proposal should be located in the Introduction section of your organizer.

Why should it be located here ?

The outline of a research proposal should be located in the Introduction section of your organizer. The outline should provide a brief overview of the research problem, the research questions, the approach, the timeline, the budget, and the expected outcomes. The outline should be clear and concise, and it should be easy for the reader to follow.

The outline should be updated as the research proposal evolves. As you conduct more research, you may need to add or remove sections from the outline. You may also need to revise the outline to reflect changes in the project's scope, timeline, or budget.

Find out more on outline at https://brainly.com/question/4194581

#SPJ1

explain mechanical computer ,electromechanical and electronic computer with example

Answers

Answer:

A mechanical computer uses moving parts to do it’s calculations. Think old style adding machines.Electronic computers use electronic oscillators to generate a clock. The oscillator might include a mechanical element such as a crystal, but the majority of the clock signal is processed in the electrical domain.

Explanation:

An example of a mechanical computer clock is a Swiss watch movement, which needs no electronics. Movement is based upon springs coupled to other mechanical pieces. Swiss watches are high precision mechanical computers that do counting. There are other types of more sophisticated mechanical computers. Research the works of Konrad Zuse and his Z1 mechanical computer.

A student made the following table describing matter and non-matter. Why is the table incorrect?


Light energy is a form of matter.

All matter takes up space.

Non-matter has a mass.

Rock is an example of non-matter.

(science btw)

Answers

Answer:

The table is incorrect because "All matter takes up space" because Matter = Mass

Explanation:

write a program using one-dimensional array that get the smallest input value from the given array. Array size is 10.​

Answers

Here is an example of a program that uses a one-dimensional array to find the smallest input value from an array of size 10 in Python:

def find_smallest_value(arr):

   smallest = arr[0] #initialize the first element of array as the smallest

   for i in range(1, len(arr)): # start the loop from 1 as we already have the first element as the smallest

       if arr[i] < smallest:

           smallest = arr[i]

   return smallest

arr = [5, 2, 8, 9, 1, 3, 4, 6, 7, 10]

print("The smallest value in the array is:", find_smallest_value(arr))

This program defines a function find_smallest_value() that takes an array as an input. Inside the function, it initializes the first element of the array as the smallest. Then it uses a for loop to iterate through the array, starting from the second element. For each element, it checks if the current element is smaller than the current smallest value. If it is, it updates the smallest value. After the loop is finished, it returns the smallest value. In the last line, we call the function and pass the array and print the result.

You can change the elements of the array and test it again to see the result.

8
Among the structural semantic elements, which of these elements represents a section of content that is independent of a web page or site content?
a) section
b) article
c) header
d) aside

Answers

The elements represents a section of content that is independent of a web page or site  is article

What is meant by web page ?

A web page is a straightforward document that a browser can see. These publications are created using the HTML coding system (which we look into in more detail in other articles). A web page can incorporate many various sorts of resources, including style data, which governs the appearance and feel of the page.

A web page is a document that may be found online. A web browser can be used to view web pages that are stored on a web server. Huge amounts of text, graphics, audio, video, and hyperlinks can all be found on a single web page. To other web pages, use these hyperlinks.

To learn more about web page refer to:

https://brainly.com/question/28431103

#SPJ1

The elements represents a section of content that is independent of a web page or site  is article.

What is meant by web page ?A web page is a straightforward document that a browser can see. These publications are created using the HTML coding system (which we look into in more detail in other articles). A web page can incorporate many various sorts of resources, including style data, which governs the appearance and feel of the page.A web page is a document that may be found online. A web browser can be used to view web pages that are stored on a web server. Huge amounts of text, graphics, audio, video, and hyperlinks can all be found on a single web page. To other web pages, use these hyperlinks.

To learn more about Web page refer to:

https://brainly.com/question/28431103

#SPJ1

Which three statements about RSTP edge ports are true? (Choose three.) Group of answer choices If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status. Edge ports can have another switch connected to them as long as the link is operating in full duplex. Edge ports immediately transition to learning mode and then forwarding mode when enabled. Edge ports function similarly to UplinkFast ports. Edge ports should never connect to another switch.

Answers

Answer:

Edge ports should never connect to another switch. If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status.

In this assignment, you will develop a C++ program and a flowchart that calculates a cost to replace all tablets and desktop computers in a business. Customers paying cash get a ten percent discount applied to the total cost of the computers (desktop and tablets). Customers financing the purchase incur a fifteen percent finance charge based on the total cost of the computers (desktop and tablets). Tablets costs $320.00 each and desktops costs $800.00 each. The tax is 75% (.075).

Requirements:
⦁ Use the following variables of the appropriate type: name of company selling the computers, the cost per each type of computer, number of computers to be purchased, discount if paying cash, sales tax rate. Tablets =$320 each and desktop computers = $800.00 each. Sales Tax Rate = .075, Discount Percent = .10, and Finance Charge = .15.
⦁ Variable names must be descriptive.
⦁ Use additional variables to hold subtotals and totals.
⦁ For customers paying cash, the discount should be subtracted from the total computer cost.
⦁ For customers financing the purchase, the finance charge should be added to the total computer cost.
⦁ The body of your program must use variables only; there should not be any "hard coded" values in the output statements. An example of hardcoding is
***Cost of tablets = 4 * 320****.
⦁ Use cout to output the values of the variables to the console. Your cout statement MUST use the variables to display the values
⦁ Display the cost of the computers, tax and average cost per computer. The average cost will be the total cost divided by the number of computers purchased. Display the discount if the customer decides to pay cash or the finance charge if the customer finances the purchase.
⦁ Output must be labelled and easy to read as shown in the sample output below.
⦁ Program must be documented with the following:
⦁ // Name
⦁ // Date
⦁ // Program Name
⦁ // Description
⦁ Develop a flowchart

Hints:
Total cost of computers = cost per tablet * number of tablets purchased + cost per desktop * number of desktops purchased
Calculate the cost if paying cash or financing
Calculate the tax
Average cost per computer = Total computer cost divided by the number of computers purchased

Answers

Answer:

Explanation:

The objective of this program we are to develop is to compute a C++ program and a flowchart that calculates a cost to replace all tablets and desktop computers in a business.

C++ Program

#include<iostream>

#include<iomanip>

using namespace std;

/*

⦁ // Name:

⦁ // Date:

⦁ // Program Name:

⦁ // Description:

*/

int main()

{

const double SalesTaxRate = .075, DiscountPercent = .10, FinanceCharge = .15;

const double TABLET = 320.00, DESKTOP = 800.00;

double total = 0.0, subTotal = 0.0,avg=0.0;

int numberOfTablets, numberOfDesktop;

cout << "-------------- Welcome to Computer Selling Company ------------------ ";

cout << "Enter number of tablets: ";

cin >> numberOfTablets;

cout << "Enter number of desktops: ";

cin >> numberOfDesktop;

subTotal = TABLET * numberOfTablets + numberOfDesktop * DESKTOP;

char choice;

cout << "Paying cash or financing: (c/f): ";

cin >> choice;

cout << fixed << setprecision(2);

if (choice == 'c' || choice == 'C')

{

cout << "You have choosen paying cash." << endl;

total = subTotal - subTotal * DiscountPercent;

cout << "Discount you get $" << subTotal * DiscountPercent<<endl;

cout << "Sales Tax: $" << SalesTaxRate * total << endl;

total = total + total * SalesTaxRate;

cout << "Total computers' Cost: $" << total << endl;

avg = total / (numberOfDesktop + numberOfTablets);

cout << "Average computer cost: $ " << avg << endl;

}

else if (choice == 'f' || choice == 'F')

{

cout << "You have choosen Finance option." << endl;

total = subTotal + subTotal * FinanceCharge;

cout << "Finance Charge $" << subTotal * FinanceCharge << endl;

cout << "Sales Tax: $" << SalesTaxRate * total << endl;

total = total + total * SalesTaxRate;

cout << "Total computers' Cost: $" << total << endl;

avg = total / (numberOfDesktop + numberOfTablets);

cout << "Average computer cost: $ " << avg << endl;

}

else

{

cout << "Wrong choice.......Existing.... ";

system("pause");

}

//to hold the output screen

system("pause");

} }

OUTPUT:

The Output of the program is shown in the first data file attached below:

FLOWCHART:

See the second diagram attached for the designed flowchart.

In this assignment, you will develop a C++ program and a flowchart that calculates a cost to replace
In this assignment, you will develop a C++ program and a flowchart that calculates a cost to replace

It’s been a brutally cold and snowy winter. None of your friends have wanted to play soccer. But
now that spring has arrived, another season of the league can begin. Your challenge is to write a
program that models a soccer league and keeps track of the season’s statistics.
There are 4 teams in the league. Matchups are determined at random. 2 games are played every
Tuesday, which allows every team to participate weekly. There is no set number of games per
season. The season continues until winter arrives.
The league is very temperature-sensitive. Defenses are sluggish on hot days. Hotter days allow for
the possibility of more goals during a game.

If the temperature is freezing, no games are played that week. If there are 3 consecutive weeks of freezing temperatures, then winter has arrived and the season is over.

Teams class
Each team has a name.
The program should also keep track of each team’s win-total, loss-total, tie-total, total goals scored, and total goals allowed.
Create an array of teams that the scheduler will manage.
Print each team’s statistics when the season ends.

Games class
In a game, it’s important to note each team’s name, each team’s score, and the temperature that day.
Number each game with integer ID number.
This number increases as each game is played.
Keep track of every game played this season.
This class stores an ArrayList of all games as a field.
Your program should determine scores at random. The maximum number of goals any one team can score should increase proportionally with the temperature.
But make sure these numbers are somewhat reasonable.
When the season ends, print the statistics of each game.
Print the hottest temperature and average temperature for the season.

Scheduler class
Accept user input through a Scanner. While the application is running, ask the user to input a temperature. (Do while)
The program should not crash because of user input. If it’s warm enough to play, schedule 2 games.
Opponents are chosen at random.
Make sure teams aren’t scheduled to play against themselves.
If there are 3 consecutive weeks of freezing temperatures, the season is over.

A test class with a main is to be written
Also take into account if there are no games at all

Answers

Below is an example of a program that models a soccer league and keeps track of the season's statistics in Java:

What is the Games class?

java

import java.util.ArrayList;

import java.util.Random;

import java.util.Scanner;

class Team {

   private String name;

   private int winTotal;

   private int lossTotal;

   private int tieTotal;

   private int goalsScored;

   private int goalsAllowed;

   // Constructor

   public Team(String name) {

       this.name = name;

       this.winTotal = 0;

       this.lossTotal = 0;

       this.tieTotal = 0;

       this.goalsScored = 0;

       this.goalsAllowed = 0;

   }

   // Getters and Setters

   public String getName() {

       return name;

   }

   public int getWinTotal() {

       return winTotal;

   }

   public int getLossTotal() {

       return lossTotal;

   }

   public int getTieTotal() {

       return tieTotal;

   }

   public int getGoalsScored() {

       return goalsScored;

   }

   public int getGoalsAllowed() {

       return goalsAllowed;

   }

   public void incrementWinTotal() {

       winTotal++;

   }

   public void incrementLossTotal() {

       lossTotal++;

   }

   public void incrementTieTotal() {

       tieTotal++;

   }

   public void incrementGoalsScored(int goals) {

       goalsScored += goals;

   }

   public void incrementGoalsAllowed(int goals) {

       goalsAllowed += goals;

   }

}

class Game {

   private int gameId;

   private String team1;

   private String team2;

   private int team1Score;

   private int team2Score;

   private int temperature;

   // Constructor

   public Game(int gameId, String team1, String team2, int temperature) {

       this.gameId = gameId;

       this.team1 = team1;

       this.team2 = team2;

       this.team1Score = 0;

       this.team2Score = 0;

       this.temperature = temperature;

   }

   // Getters and Setters

   public int getGameId() {

       return gameId;

   }

   public String getTeam1() {

       return team1;

   }

   public String getTeam2() {

       return team2;

   }

   public int getTeam1Score() {

       return team1Score;

   }

   public int getTeam2Score() {

       return team2Score;

   }

   public int getTemperature() {

       return temperature;

   }

   public void setTeam1Score(int team1Score) {

       this.team1Score = team1Score;

   }

   public void setTeam2Score(int team2Score) {

       this.team2Score = team2Score;

   }

}

class Scheduler {

   private ArrayList<Team> teams;

   private ArrayList<Game> games;

   private int consecutiveFreezingWeeks;

   // Constructor

   public Scheduler(ArrayList<Team> teams) {

       this.teams = teams;

       this.games = new ArrayList<>();

       this.consecutiveFreezingWeeks = 0;

   }

   // Schedule games based on temperature

   public void scheduleGames(int temperature) {

       if (temperature <= 32) {

           consecutiveFreezingWeeks++;

           System.out.println("No games played this week. Temperature is below freezing.");

       } else {

           consecutiveFreezingWeeks = 0;

           int maxGoals = 0;

           // Calculate max goals based on temperature

           if (temperature <= 50) {

               maxGoals = 3;

           } else if (temperature <= 70) {

               maxGoals = 5;

Read more about Games class here:

https://brainly.com/question/24541084

#SPJ1

The purpose of a flowchart is similar to the purpose of pseudocode.
True
False

Answers

I would say true. They both exist to provide people with a reference point.

Answer:

True

Explanation:

Pseudocode: In computer science, pseudocode is a plain language description of the steps in an algorithm or another system. Pseudocode often uses structural conventions of a normal programming language, but is intended for human reading rather than machine reading.

Flowchart: A flowchart is a type of diagram that represents a workflow or process. A flowchart can also be defined as a diagrammatic representation of an algorithm, a step-by-step approach to solving a task. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows.

They are both human-written descriptions of the process or algorithm of a task.

I hope this helpedThanks for your timeJuri Davis

Which of the following is not a characteristic of a good value log entry

Answers

What are we supposed to find? Help us

What is nanotechnology?​

Answers

Answer:

Nanotechnology is a field of research and innovation concerned with building 'things' - generally, materials and devices - on the scale of atoms and molecules.

Explanation:

The diameter of a human hair is, on average, 80,000 nanometres.A nanometre is one-billionth of a metre – ten times the diameter of a hydrogen atom.

Answer:

Nanotechnology are the areas of science and engineering where phenomena that take place at dimensions in the nanometre scale are utilised in the design, characterisation, production and application of materials, structures, devices and systems.

What is the best way to deal with a spam

Answers

Simply ignoring and deleting spam is the best course of action. Avoid responding to or engaging with the spam communication because doing so can let the sender know that your contact information is still live and invite additional spam in the future. Additionally, it's critical to mark the email as spam using your email program or by reporting it to the relevant authorities. Make careful to report the spam to the proper authorities for investigation if it appears to be a phishing scheme or contains hazardous content.

Your manager has asked you to write a program that displays the percentage of males and female in your class. The program should prompt the user to enter the number of males and females and display the results.

Answers

Explanation:

The program using python programming language would be:

First, we write the Input prompt.

Input  prompt for the user

number_of_males_in_class = int (input ('Enter the number of males: '))

number_of_females_in_class = int(input('Enter the number of females: '))

Next, we write the Process algorithm.

Process  algorithm

total_number_of_students_in_class = number_of_females_in_class + number_of_males

_in_class

percentage_of_males_in_class = number_of_males_in_class / total_number_of_students

_in_class

percentage_of_females_in_class = number_of_females / total_number_of_students

Finally, the Output process

Output process

print('Total number of males in class =', format(percentage_of_males_in_class, '.0%'))

print('Total number of females =', format(percentage_of_females_in_class, '.0%'))

a malware expert wants to examine a new worm that is infecting windows devices. verify the sandbox tool that will enable the expert to contain the worm and study it in its active state.

Answers

The expert can contain the worm and study it in its active stage using the sandbox tool cuckoo.

How can malware avoid being detected by antivirus software so that it is no longer recognized by its signature?

Malware developers discovered they could tweak their code to get around antivirus programs that rely on signatures by using compression techniques. There are numerous programs available for compression, but the most well-known is named Ultimate Packer for executables (UPX).

What might occur if programmers do not run logic statement tests on the software before users try it out?

In order to generate a null point and cause the application to crash, a malicious process can change the execution environment. Some events won't happen in the expected sequence.

To know more about malware visit:-

https://brainly.com/question/14759860

#SPJ4

2 questions HELP ASAP

2 questions HELP ASAP

Answers

Answer:

The answer to question 2 would be turn the sprite to the right 360 degrees.

The answer to the question 2 would be the last option

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least

Answers

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least  65 percent transfer efficiency.

What is the transfer efficiency

EPA lacks transfer efficiency requirement for auto refinishing spray guns. The EPA regulates auto refinishing emissions and impact with rules. NESHAP regulates paint stripping and coating operations for air pollutants.

This rule limits VOCs and HAPs emissions in automotive refinishing. When it comes to reducing overspray and minimizing wasted paint or coating material, transfer efficiency is crucial. "More efficiency, less waste with higher transfer rate."

Learn more about transfer efficiency  from

https://brainly.com/question/29355652

#SPJ1

Which of the following is an example of an inline element? A. B. C. D.

Answers

what are the answers??

Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.

Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.

You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:

What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.

Answers

In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:

Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.

What is the Case Facts?

First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.

Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.

Learn more about affidavit from

https://brainly.com/question/30833464

#SPJ1

Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure out all the possible ways the function could be broken.
function findMin(num1, num2){
if(num1 < num2){
return num1;
} else {
return num2;
}
}
A. findMin(-1, 0)
findMin(2,4)
findMin(5,10)
B. findMin(5,3)
findMin(7,2)
findMin(5,1)
C. findMin(1,1)
findMin(-2,2)
findMin(0,3)
D. findMin(-1,1)
findMin(1,-1)
findMin(1,1)

Answers

Answer:

D

Explanation:

Based on the information given, the correct option will be:

D. findMin(-1,1)

findMin(1,-1)

findMin(1,1)

It should be noted that based on the information given, the correct option is D because it contains a duplicate set of numbers.

In this case, "1,1", would be vital in breaking the algorithm and require a bug fix from the developer. This then makes it the most helpful.

In conclusion, the correct option is D.

Learn more coding on:

https://brainly.com/question/22654163

A ______________ is a way of taking a screenshot or a picture of your computer screen. ​

Answers

Answer:

prt scan+Windows logo

Please help its timed! Which of the following is an event? Select 4 options. adding three and four in a program. moving a mouse. clicking a mouse button. a sensor detecting the motion of an earthquake detector. scanning a credit card when you shop? ​

Answers

The option that is an event is known to be clicking a mouse button.

What is a computer event?

An event, in a computing context, is known to be any kind of action that aim to know or  is identified by a program and has a good importance for system hardware or software.

Events  examples  keystrokes and mouse clicks, program loading and others. so we can say that the option that is an event is known to be clicking a mouse button.

Learn more about  program from

https://brainly.com/question/1538272

#SPJ1

Create a program to calculate the wage. Assume people are paid double time for hours over 60 a week. Therefore they get paid for at most 20 hours overtime at 1.5 times the normal rate. For example, a person working 70 hours with a regular wage of $20 per hour would work at $20 per hour for 40 hours, at 1.5 * $20 for 20 hours of overtime, and 2 * $20 for 10 hours of double time. For the total wage will be:

20 * 40 + 1.5 * 20 * 20 + 2 * 20 * 10 = 1800

The program shall include the following features:

a. Prompt the user to enter the name, regular wage, and how many work he/she has worked for the week.
b. Print the following information:NameRegular wageHours worked in one weekTotal wage of the week

Answers

Answer:

Written in Python

name = input("Name: ")

wageHours = int(input("Hours: "))

regPay = float(input("Wages: "))

if wageHours >= 60:

->total = (wageHours - 60) * 2 * regPay + 20 * 1.5 * regPay + regPay * 40

else:

->total = wageHours * regPay

print(name)

print(wageHours)

print(regPay)

print(total)

Explanation:

The program is self-explanatory.

However,

On line 4, the program checks if wageHours is greater than 60.

If yes, the corresponding wage is calculated.

On line 6, if workHours is not up to 60, the total wages is calculated by multiplying workHours by regPay, since there's no provision for how to calculate total wages for hours less than 60

The required details is printed afterwards

Note that -> represents indentation

Edit the formula in cell D2 so the references to cell C2 will update when the formula is copied, and the reference to cell B9 will remain constant. Use AutoFill to copy the formula to cells

Answers

=C2*B9  will update when the formula is copied, and the reference to cell B9 will remain constant .

About cell in excel
A cell in Excel is a single box that stores data. It is the basic unit of a worksheet, and can contain either a numeric or text value. Cells are organized into columns and rows, and can contain formulas, references, functions, and other types of data. Cells can be merged and formatted to create a visual representation of data. Cells can be linked to other cells and worksheets, allowing information to be shared and manipulated.  Microsoft Excel enables everyone to format and  organize and calculate data in a spreadsheet.

To know more Cell in excel
https://brainly.com/question/1380185
#SPJ4

true/false. Once you identify your critical assets, you must determine which ones are at the most risk of being attacked by authorized insiders and how these assets should be protected and monitored.

Answers

It's accurate After identifying your important assets, you must decide which ones pose the greatest threat from insider attacks and how these assets should be data security and monitored .

What are the three guiding principles of data security?

We must take the CIA trinity into account when talking about data and information. Confidentiality, integrity, and availability are the three fundamental parts of the information security architecture known as the CIA triad. Each element stands for one of information security's core goals.

What fundamental safeguards are required to keep information systems safe?

Information security's fundamental principles are confidentiality, integrity, and availability. A minimum of one of these principles must be implemented in every component of the information security program.

To know more about data security  visit :-

https://brainly.com/question/1232895

#SPJ4

Computer knowledge is relevant in almost every are of life today. With a
view point of a learning institute, justify these statement.

Answers

Answer:

mainly helps to get educate in computer knoeledge

Explanation:

The effective use of digital learning tools in classrooms can increase student engagement, help teachers improve their lesson plans, and facilitate personalized learning. It also helps students build essential 21st-century skills.

One advantage of the Second generation of programming language is that it is machine dependent. True or False

Answers

Answer:

I THINK FALSE

Explanation:

In terms of customer service issues, which of the following is the least likely reason for using a robust CRM?
A CRM can optimize the information shared among departments, resulting in better management of existing accounts.
A CRM can enable members of pertinent departments to have access to all the relevant information, enabling them to answer queries and resolve problems quickly and easily.
A CRM can provide a company's marketing department with information needed to identify and target new customers.
A CRM can provide a more rapid response to queries and concerns by forwarding the query to the right department.

Answers

In terms of customer service issues, the least likely reason for using a robust CRM is: A CRM can provide a company's marketing department with information needed to identify and target new customers.

What is CRM?Customer Relationship Management (CRM) is a software system that streamlines a company's customer interactions by consolidating customer data from different sources into one location. As a result, you can easily communicate with customers, manage leads, and monitor deals.What is customer service?Customer service is a set of activities intended to assist customers with technical or commercial issues, product or service details, and general enquiries. It is the responsibility of a company to provide satisfactory customer service to its consumers. As a result, customer service is one of the most critical aspects of a business that ensures customer satisfaction and retention.

learn more about CRM here:

https://brainly.com/question/13100608

#SPJ11

How do I code strings in java

Answers

Answer: Below

Explanation:

Prescribe variable as string, and anything assigned to it will be a string.
Example:
String java_string;
java_string = "Hello world";

What Should be the first step when troubleshooting

Answers

The first step in troubleshooting is to identify and define the problem. This involves gathering information about the issue, understanding its symptoms, and determining its scope and impact.

By clearly defining the problem, you can focus your troubleshooting efforts and develop an effective plan to resolve it.

To begin, gather as much information as possible about the problem. This may involve talking to the person experiencing the issue, observing the behavior firsthand, or reviewing any error messages or logs associated with the problem. Ask questions to clarify the symptoms, when they started, and any recent changes or events that may be related.Next, analyze the gathered information to gain a better understanding of the problem. Look for patterns, commonalities, or any specific conditions that trigger the issue. This analysis will help you narrow down the potential causes and determine the appropriate troubleshooting steps to take.

By accurately identifying and defining the problem, you lay a solid foundation for the troubleshooting process, enabling you to effectively address the root cause and find a resolution.

For more questions on troubleshooting

https://brainly.com/question/29736842

#SPJ8

Other Questions
Find the equation to the line below!!! Help! Can you help me I need to send this to my teacher like TODAY help me please asap please Chun has a restaurant bill of $74.40. About how much money should he leave for a 15% tip? $5.00 $20.00 $16.00 $11.00 What do you use to write on la piza O el bolgrafo la pluma 5 x 9 = 45 times as many is How was technology involved in the movie jungle book?? alex was imprisoned for four years for arson. on the day he was taken into custody, he had to go through a degradation ceremony in which he was asked to strip, was searched by the prison guards, and was asked to wear the inmate uniform. over time, the prison guards encouraged him to conform to institutional norms through a system of rewards and punishment. by the time alex's prison sentence was over, he was rehabilitated. this scenario exemplifies . C. Read the lines given below and answer the question that follow. 1. Margie had hoped he wouldn't know how to put it together again.a. Who does 'he' refer to in the above lines?b. what was he trying to put together? why?c. why was margie hoping that he wouldn't know how to put it together again? i need help with math At January 1, 2021, Caf Med leased restaurant equipment from Crescent Corporation under a nine-year lease agreement. The lease agreement specifies annual payments of $32,000 beginning January 1, 2021, the beginning of the lease, and at each December 31 thereafter through 2028. The equipment was acquired recently by Crescent at a cost of $243,000 (its fair value) and was expected to have a useful life of 13 years with no salvage value at the end of its life. (Because the lease term is only 9 years, the asset does have an expected residual value at the end of the lease term of $73,596.) Crescent seeks a 9% return on its lease investments. By this arrangement, the lease is deemed to be an operating lease.Required:a. What will be the effects of the lease on Crescent's (lessor's) earnings for the first year (ignore taxes)?b. What will be the balances in the balance sheet accounts related to the lease at the end of the first year for Crescent (ignore taxes)? A cartoon of a spaceship being pulled into a black hole. Which details from this image help you answer the question, "What might happen to a spaceship approaching a black hole?"a stretching of the spaceshipthe color of the black holethe feature of the enginesthe colors of the spaceship 2Which is the equation of a line that has a slope of 3 and passes through point(-3,-1)?21o -+1O y=-3x+1O y=-x+3O y=-x-1=O y=-x-3 What statement best describes what a circle graph shows?A. Data as proportions of a wholeB. A frequency distributionC. The average of a data set D. The relationship between two variables if a company needs a storage solution that has the fastest recording and retrieval time along with high storage capacity, what storage solution should the company use? Do you believe that Thomas Jefferson positively or negatively affected the United States?Please explain in your own words why you think what you think. Leave your response with at least THREE main details to support your opinion. under the good samaritan law, you can not be held liable for trying to help someone at a traffic collision if you helped in good faith. What two action modes are critical for service professionals to initiate and/or respond in? a. FF, FT b. FF,IM c. FT, FF d. FT, QS e. FF/QS which office at lsu health shreveport manages conflicts of interest per the chancellors memorandium-23? Why is 0.9 x 0.9 > 0.9?