Answer:
It's a
Explanation:
rotate object while holding the shift key. what does it do?
Answer:
It rotates it 45 degrees in a direction
Whenever you communicate online, remember a. to delete anything you don't want to keep b. everything you put online is available forever c. to always share your personal information d. all of the above Please select the best answer from the choices provided Ο Α OB о с OD
Answer:
B
Explanation:
i just took the test
Answer:
B
Explanation:
me brain say soo
What does "idle" mean in google slides?
In Go. ogle Slides, "idle" refers to a state where the user is inactive or not interacting with the presentation.
What is go. ogle slides?When a user remains idle for a certain period of time, Go. ogle Slides may automatically transition into a screensaver-like mode, where the presentation is paused or displayed in a reduced activity state.
This feature helps conserve system resources and prevents the screen from being static for extended periods.
To resume normal functionality, the user can simply interact with the presentation again.
Learn more about go. ogle slides at:
https://brainly.com/question/19250114
#SPJ6
Supply Chain strategy often optimizes supply chain networks for "average" performance. Explain why this is or is not the right approach? Edit View Insert Format Tools Table 12pt Paragraph BIU AQV T²V : When locating facilities in a network, the transportation economies about the potential facility location should be considered. What does this mean with respect to where the facility is located and how the network is configured? Edit View Insert Format Tools Table 12pt Paragraph ✓ B I U AV 2V T²V ⠀
Supply Chain strategy is essential in every organization that involves the planning and management of all activities involved in sourcing, procurement, conversion, and logistics. In doing so, the goal is to optimize supply chain networks for average performance.
It is the right approach to optimize supply chain networks for "average" performance because it helps the company attain its objectives and improve its performance. It makes the planning and management of activities in sourcing, procurement, conversion, and logistics more efficient by making use of resources at an optimal level. Also, this approach allows the company to maintain the right balance between supply and demand by producing enough products to meet the customers' demands. By doing so, the company reduces costs, increases efficiency, and enhances customer satisfaction. However, sometimes, optimizing supply chain networks for "average" performance may not be the right approach. This is because customers' preferences are not average. Also, different customers have different needs. Thus, optimizing the supply chain for an average performance level may result in dissatisfied customers who may opt to seek services from the competitors. Thus, it is essential to ensure that the optimization strategy considers the customers' needs and preferences, and a balance is achieved. In conclusion, optimizing the supply chain for average performance is the right approach in most cases. However, this approach should consider the customers' needs and preferences to achieve a balance between supply and demand. Therefore, when locating facilities in a network, transportation economies about the potential facility location should be considered. This means that the facility should be located in an area that is easily accessible to transportation. Additionally, the network should be configured in such a way that the facility is linked to other facilities in the supply chain network to allow for efficient transportation.
To learn more about Supply Chain strategy, visit:
https://brainly.com/question/27670727
#SPJ11
The working of the computer on the input according to the program is called_______.
Answer:
input program
Explanation:
What is a border line
Answer:
a border line is what separates to places from one another like if i were to go to mexico i would have to cross the border
Explanation:
Depends on context.
- Could be a line marking a border
- Barely acceptable; borderline
Example:
She was a borderline candidate.
This means that she barely made it as a candidate role.
Daniel would like to send a letter to more than one hundred people. He should type each letter separately.
False
True
plz hurry i need it now
Application software can include:
a. word processors
b. spreadsheets
c. keyboards
d. presentation software
A virus does not harm the ________ of a computer
Answer:
Hardware part
Explanation:
The hardware part of computer is not harmed by virus.
I hope this will be helpful for you
Answer: Hardware part
mention and explain the basic ideas of electricity
Answer:
electricity is the flow of electrical charges which is made of protons or electrons as a secondary energy source we get it from other sources.
Mac or PC (Need more opinions!)
Just pick which one do you like and why. I need it for my research paper, please.
Answer:
PC because pc you can download anything without too much trouble and the Mac cost a lot and you will have a hard time with it.
Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.
Answer:
Centralized management of printing activities, allowing administrators to manage all print devices using a network.
Explanation:
The advantages of centrally managed commercial printers are:
Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profilePedestrians have ______.
A. to get out of your way when you’re driving
B. no right to use the Highway Transportation System
C. a right to use the Highway Transport System
D. to be on the sidewalk or crosswalk at all times
Answer:
c
Explanation:
I think c is correct answer if I answer wrong
Pedestrians have a right to use the Highway Transport System. Hence, option C is correct.
What is Highway Transport System?A system of highways used for the movement of cars. Type of transit, means of transportation, or transportation system. A structure that houses the equipment necessary for transporting people or goods.
A transportation system can be defined as the combination of factors and how they interact to produce the need for travel within a given area and the delivery of transportation services to satisfy this need. This concept is inclusive and flexible enough to be applied in various contexts.
For instance, people are transported to airports and ship docks using buses and cars. Transportation systems are a part of the larger technological, social, and environmental systems in our world.
Thus, option C is correct.
For more details about Highway Transport System, click here:
https://brainly.com/question/1071443
#SPJ2
Information must be encoded and ___ in order to be retrieved later
Information must be encoded and stored in order to be retrieved later.
When information is encoded, it is transformed into a structured format that can be easily stored in a database, file, or other storage system. Encoding information allows it to be organized in a consistent manner so that it can be easily accessed and understood later.
Storing information refers to the process of physically saving the encoded information in a way that it can be retrieved and used at a later time. The method of storage can vary, ranging from simple text files to complex database management systems, depending on the size and complexity of the information.
Learn more about information: https://brainly.com/question/13629038
#SPJ4
devices that add computer-generated information on top of the real world that a user sees offer a(n) experience
Devices that add computer-generated information on top of the real world that a user sees offer a(n) augmented reality experience.
What is information technology, and what are some examples?The study of or use of computers and telecommunications for data archiving, retrieval, transmission, or sending is known as information technology, or IT. Although computers and their networks are sometimes referred to as "IT," the phrase also refers to other information dissemination technologies, such as television and cellphones.
Why is it called information technology?In its most basic form, the term IT (Information Technology) refers to every activity that involves computers. IT, or information technology, is the term used to describe the use of technology in a company to process data, coordinate operations, and solve business problems.
To know more about information visit-
https://brainly.com/question/29244533
#SPJ4
write a function largest() that takes in no parameters. the function should prompt the user to enter a number until they enter 0, at which point it should return the largest number they input (including 0). you can assume that the user will only input non-negative integers.
def largest(): result = 0 n = 1 while n != 0: is a function largest() that takes in no parameters.
What are JavaScript's parameter guidelines?The definitions of JavaScript functions do not list the data types of the parameters. JavaScript functions don't type-check the parameters provided to them. The quantity of arguments passed into JavaScript functions is not checked.
Can I use a function's call without any parameters?By entering the function's name in parenthesis (), we can call it. The current date will be printed when we call this function. Please take note that this output may vary for you. The day on which the function was called will appear in the output.
To know more about parameters visit :-
https://brainly.com/question/14190804
#SPJ4
Absolute cell adressing
When copying a formula from one cell to another in Excel, an absolute reference is a cell reference where the column and row coordinates remain constant.
What is excel?Users of Microsoft Excel may format, arrange, and compute data in a spreadsheet.
Data analysts and other users can make information easier to view as data is added or changed by organising data using software like Excel.
Cell references come in two flavours: absolute and relative. When copied and filled into other cells, relative and absolute references behave in different ways.
A formula's relative references are altered when it is copied to another cell. Contrarily, regardless of where they are duplicated, absolute references hold true.
When a specific cell reference needs to be constant, an absolute cell reference can be used. Formulas, charts, functions, and other instructions frequently use references to cells in their syntax.
Thus, this can be concluded regarding absolute cell addressing.
For more details regarding absolute cell addressing, visit:
https://brainly.com/question/30443246
#SPJ1
Python help!
Input a grade level (Freshman, Sophomore, Junior, or Senior) and print the corresponding grade number [9-12]. If it is not one of those grade levels, print Not in High School.
Hint: Since this lesson uses else-if statements, remember to use at least one else-if statement in your answer to receive full credit
Sample Run 1
What year of high school are you in? Freshman
Sample Output 1
You are in grade: 9
Sample Run 2
What year of high school are you in?
Kindergarten
Sample Output 2
Not in High School
Answer:
print("What year of high school are you in?")
grade = input()
grade = grade.lower()
if grade == "freshman":
print("You are in grade: 9")
elif grade == "sophomore":
print("You are in grade: 10")
elif grade == "junior":
print("You are in grade: 11")
elif grade == "senior":
print("You are in grade: 12")
else:
print("Not in high school")
Explanation:
The first line prints the question. "grade = input()" stores the answer the user will type in the terminal into the variable 'grade'.
grade.lower():
The third line lowercases the entire string ("FreshMan" would turn to "freshman"). Python is case-sensitive.
Then, test the string to see if it matches freshman, sophomore, junior, or senior. If the input string matches print the statement inside the if block. The last statement is the else. It prints if nothing else matches.
Some binary files can include a magic number. this mechanism is used by __________.
Answer:
Parsers to identify the file format.
The OS to determine the file format.
Explanation:
The answer I gave is my best guess. The base of this question doesn't make sense because magic numbers can be used by several different things, so there is a broad range of answers for this. But Typically magic numbers are used to identify a file's validity or it's format
unit Z Discussion Topic I Subscribe opic 1: Wireless Networking his week you study wireless networking. Do
you think this standard will become he de facto method for business? How about for transporting internet
traffic? Returnto the Unit 2 Discussion Instructions Rubrics 15pt_SBIT_integrated_discussion_rubric
Wireless networking has become an important method for businesses and is widely used in various industries. While it offers flexibility and convenience, it may not completely replace wired networks in all cases. However, it is an essential technology for transporting internet traffic, especially for mobile devices and remote areas.
Wireless networking is a method of connecting devices and transferring data without the need for physical cables. It relies on radio waves to transmit signals between devices.
As for whether wireless networking will become the de facto method for business, it is already widely used in many industries. Wireless networks provide flexibility and convenience, allowing employees to connect to the network from anywhere within the coverage area.
This can increase productivity and collaboration within a business. However, there are certain considerations to take into account, such as the security and reliability of wireless networks. While wireless networking is becoming increasingly popular in business settings, it may not completely replace wired networks in all cases.
In terms of transporting internet traffic, wireless networking plays a significant role. It allows users to access the internet without the need for wired connections. For example, mobile devices such as smartphones and tablets rely on wireless networks to connect to the internet.
To learn more about wireless networking
https://brainly.com/question/21286395
#SPJ11
Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome
Using the knowledge of computational language in JAVA it is possible to write a code that input N numbers from the user in a Single Dimensional Array .
Writting the code:class GFG {
// Function to reverse a number n
static int reverse(int n)
{
int d = 0, s = 0;
while (n > 0) {
d = n % 10;
s = s * 10 + d;
n = n / 10;
}
return s;
}
// Function to check if a number n is
// palindrome
static boolean isPalin(int n)
{
// If n is equal to the reverse of n
// it is a palindrome
return n == reverse(n);
}
// Function to calculate sum of all array
// elements which are palindrome
static int sumOfArray(int[] arr, int n)
{
int s = 0;
for (int i = 0; i < n; i++) {
if ((arr[i] > 10) && isPalin(arr[i])) {
// summation of all palindrome numbers
// present in array
s += arr[i];
}
}
return s;
}
// Driver Code
public static void main(String[] args)
{
int n = 6;
int[] arr = { 12, 313, 11, 44, 9, 1 };
System.out.println(sumOfArray(arr, n));
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.
Answer: B
Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.
subscribe to twomad or you are cringe for the rest of your life kid
Answer:
What if I don't want to?..........
What is the Multiple Source Test? (1 point) checking to make sure that information can be found in more than one place a fact checking software that tests information found on the Internet an amendment that states that all information must be in multiple locations a test that provides more than one answer possibility 2. Which of the following is a true statement? (1 point)
Answer:
there is no following options
Explanation:
Answer: The correct answer is checking to make sure that information can be found in more than one place
Explanation: Sources are defined as locations where information is stored and accessible. When researching and validating information on the Internet (or in print), it is common practice to test multiple sources to corroborate the same details (aka Multiple Source Testing).
how many different values can be represented using 4 bits?
16 different values can be represented using 4 bits. In digital electronics and computer science, a bit is a basic unit of information that can have two values, typically represented as 0 or 1.
The number of different values that can be represented using a certain number of bits is determined by 2 raised to the power of the number of bits. Bits are used to store and process data in computers and other digital devices, and they are the building blocks of all digital information. For example, the text of this message, the images and videos you see on your screen, and the music you listen to are all represented by a series of bits. They are also used in digital communications, such as data transmission over a network or the internet, where data is sent as a series of ones and zeroes.
In the case of 4 bits, the number of different values that can be represented is 2 raised to the power of 4, which is equal to:
2 x 2 x 2 x 2 = 16.
Therefore, 4 bits can represent 16 different values, ranging from 0 to 15 in decimal form.
Learn more about bit value, here https://brainly.com/question/14805132
#SPJ4
On the basis of the following data taken from the adjusted trial balance columns of the worksheet for the year ended December 31 for Painting the Perfect Picture, journalize the four closing entries in the proper order.
Account Debit Credit
Cash 27,000
Accounts Receivable 67,000
Supplies 7,000
Equipment 200,000
Accumulated Depreciation 70,000
Accounts Payable 37,000
Capital 200,250
Withdrawals 25,000
Fees Earned 100,000
Salary Expense 27,000
Rent Expense 17,500
Depreciation Expense 20,000
Supplies Expense 12,500
Miscellaneous Expense 4,250
Total 407,250 407,250
To journalize the four closing entries for Painting the Perfect Picture, we need to identify the relevant accounts that need to be closed at the end of the accounting period.
The closing entries aim to transfer the balances of temporary accounts (such as revenue, expense, and withdrawals) to the retained earnings account.
The proper order for the closing entries is as follows:
1. Close revenue accounts: Debit Fees Earned and credit Income Summary for the total amount of revenue earned during the period.
2. Close expense accounts: Debit Income Summary and credit each individual expense account (Salary Expense, Rent Expense, Depreciation Expense, Supplies Expense, and Miscellaneous Expense) for their respective amounts.
3. Close Income Summary account: Debit Income Summary for the total amount of expenses and credit Capital for the same amount.
4. Close withdrawals: Debit Capital and credit Withdrawals for the amount of withdrawals made during the period.
These closing entries effectively reset the temporary accounts to zero and transfer their balances to the appropriate permanent accounts.
Learn more about closing entries here:
https://brainly.com/question/5734485
#SPJ11
What is the key sequence to copy the first 4 lines and paste it at the end of the file?
Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.
What comes first in the copy and paste process for a slide?Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.
What comes first in the copying process of a segment?The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.
To know more about copy visit:-
https://brainly.com/question/24297734
#SPJ4
abin, an attacker intending to access the critical assets and computing devices of an organization, impersonated sally, a system administrator. abin masquerades as sally and gathers critical information from computing devices of the target organization. identify the type of insider threat demonstrated in the above scenario.
The type of insider threat demonstrated in the scenario is impersonation.
Abin, the attacker, impersonated Sally, a system administrator, to gain access to critical assets and computing devices of the organization. Impersonation is a common tactic used by insider threats, where the attacker pretends to be someone else to gain access to restricted information or systems. In this case, Abin was able to gather critical information by masquerading as Sally, which could have serious consequences for the organization. Impersonation attacks can be difficult to detect and prevent, as the attacker may have access to legitimate credentials or be able to create convincing fake identities. To mitigate the risk of insider threats like impersonation, organizations should implement strong access controls, such as multi-factor authentication and regular audits of user access privileges. It is also important to educate employees on the risks of social engineering tactics and the importance of not sharing passwords or credentials with anyone.
In summary, the type of insider threat demonstrated in the scenario is impersonation, which highlights the need for robust security measures to protect against this type of attack. Organizations must remain vigilant and take proactive steps to mitigate the risks of insider threats to their critical assets and computing devices.
Learn more about information here: https://brainly.com/question/31370803
#SPJ11
CODE THIS IN PYTHON PLEASE I NEED HELP BADLY
Ninety-Nine is a two-player card game played with a deck of 40-cards. The cards are labeled 0 – 9. To start, each player gets 3 cards and the remaining cards are placed face
down on the table (the pile). In an actual game, the point total is set to zero but for this program, an initial point total will be given. Cards are played in the order they are added to a player’s hand. Each player in turn puts down a card and changes the point total according to the point value of his card and then selects a card from the top of the pile. Each card adds its face value in points (e.g. a 5 is worth five points) to the point total except for certain cards that have special values or meanings:
1. A 9 is a pass (and does not change point total)
2. A 4 subtracts 10 points from the total
3. A 0 adds either 1 or 11 to the point total. The 11 is played first as long as it does not put
the point total over 99.
If a player plays a card that puts the total over 99, that player loses the game.
GET THE USER TO INPUT THE CARDS AND TOTAL POINT VALUE.
INPUT:
An input line will contain 11 integers. The first integer gives the initial point total. The next 3 integers will represent the 3 cards dealt to the player. The remaining integers will be, in order, the card picked by the player and the card played by the dealer.
OUTPUT:
Print the point total when the game ends and who won (player or dealer).
SAMPLE INPUT OUTPUT
87, 5, 8, 9, 7, 4, 6, 3, 9, 0, 2 101,dealer
78, 2, 4, 8, 3, 8, 5, 0, 6, 9, 8 100,dealer
95, 9, 0, 9, 0, 1, 0, 1, 0, 2, 5 100, player
65, 0, 8, 0, 7, 0, 6, 0, 5, 1, 4 105, dealer
Manual Sample run:
87, 5, 8, 9, 7, 4, 6, 3, 9, 0, 2
P P P P D P D P D P
Total = 87
Players turn 5 Total 92
Dealers turn 4 Total 82
Players turn 8 Total 90
Dealers turn 3 total 93
Players turn 9 pass total 93
Dealers turn 0 Total 94
Players turn 7 Total 101
Total 101, Dealer is the winner as the card value exceeded when player was dealing the card
numbers = input("Enter your numbers: (comma separated) ")
lst = numbers.split(",")
num_lst = ([])
for i in lst:
num_lst.append(int(i))
total = num_lst[0]
num_lst.pop(0)
player_hand = ([num_lst[0], num_lst[1], num_lst[2]])
num_lst.pop(0)
num_lst.pop(0)
num_lst.pop(0)
dealer_hand = ([])
for w in num_lst:
if num_lst.index(w) % 2 == 0:
player_hand.append(w)
else:
dealer_hand.append(w)
is_player = True
zero_count = 0
while True:
if is_player:
if player_hand[0] == 9:
total += 0
elif player_hand[0] == 4:
total -= 10
elif player_hand[0] == 0:
if total + 11 < 100 and zero_count == 0:
total += 1
else:
total += 1
else:
total += player_hand[0]
player_hand.pop(0)
if total > 99:
print("Total: {}. The dealer is the winner as the card value exceeded when the player was dealing the card.".format(total))
break
is_player = False
elif not is_player:
if dealer_hand[0] == 9:
total += 0
elif dealer_hand[0] == 4:
total -= 10
elif dealer_hand[0] == 0:
if total + 11 < 100 and zero_count == 0:
total += 1
else:
total += 1
else:
total += dealer_hand[0]
dealer_hand.pop(0)
if total > 99:
print("Total: {}. The player is the winner as the card value exceeded when the dealer was dealing the card.".format(total))
break
is_player = True
I hope this helps!
Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a business card format. Which option should she choose?
Small Booklet style
Medium Booklet style
Memo style
Card style
Answer:
D
Explanation:
did the quiz
Answer:
D: card style
Explanation:
just took the unit test on edge and made a 100%