Answer:
there is an app that can tell you everything
Explanation:
just go to Microsoft and go to details or something like that and copy and paste
The paragraph for Microsoft Windows features is written in explanation part.
What is Microsoft Windows?Windows is a combination of a few restrictive graphical working framework families created and showcased by Microsoft.
Microsoft Windows (likewise alluded to as Windows or Win) is a graphical working framework created and distributed by Microsoft. It gives a method for putting away records, run programming, mess around, watch recordings, and interface with the Internet. Microsoft Windows was first presented with form 1.0 on November 10, 1983
Microsoft Windows Features on Demand is a component that permits framework managers to add or eliminate jobs and elements in Windows 8 and Windows Server 2012, and later variants of the client and server working framework to change the document size of those working frameworks.
Learn more about Microsoft Windows.
https://brainly.com/question/2312568
#SPJ2
Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should determine if the string begins with an uppercase letter and ends with a punctuation mark. The method should return true if the string meets the criteria; otherwise it should return false .
Answer:
The method in Python is as follows:
def checkStr(strng):
if strng[0].isupper() and strng[-1] == "?":
return True
else:
return False
Explanation:
This defines the method
def checkStr(strng):
This checks if the first character i upper and if the last is "??
if strng[0].isupper() and strng[-1] == "?":
If the condition is true, the function returns true
return True
Else, it returns false
else:
return False
Modify a list Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph' ["Sam', 'Ann', 'Joe'l 1 user_input = input() 2 short names = user input.split() 3 short_names - short_names.pop(0) 6 print (short_names) based
Answer:
The modified program is as follows:
user_input = input()
short_names = list(user_input.split(" "))
short_names.pop(0)
short_names[-1] = "Joe"
print(short_names)
Explanation:
This gets the user input
user_input = input()
This converts input to list
short_names = list(user_input.split(" "))
This removes the first item of the list
short_names.pop(0)
This updates the last item to "Joe"
short_names[-1] = "Joe"
This prints the updated list
print(short_names)
Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.
Answer:
128 KB
Explanation:
Given data :
The block size = 512 bytes
Block pointer size = 2 bytes
In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.
Therefore, the maximum number of block pointer in 1 block :
[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]
[tex]$=\frac{512}{2}$[/tex]
= 256
Thus, a block can hold maximum 256 pointers.
It is given the level of indexing is one. So,
Maximum size of the file = maximum number of block pointers in 1 file x block size
= 256 x 512
[tex]$=2^8 \times 2^9$[/tex]
[tex]$=2^{8+9}$[/tex]
[tex]$=2^{17}$[/tex]
[tex]$=2^7 \times 2^{10}$[/tex]
[tex]$=128 \times 2^{10}$[/tex]
= 128 KB (∵ 1 KB = [tex]2^{10} \ B[/tex] )
Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.
A method named 'withdraw' in the CheckingAccount class throws a custom exception named 'OverdrawnException'. You want to scan in the value of the withdrawal amount from a file, and you need to make sure that the scanner is closed whether the withdrawal is successful or not. Fill in the blank to complete the code below to do that.
Scamner sconfiLe -muil: try t scanFile new Scanner(myFile); myAccount.withdrow(scanFile.nextDouble)); System.out.println(oe.getMessageC); if (scanFile! null) catch (OverdrawnException oe) f th all of
scanFile.close ():
}
}
Solution :
Scanner scanFile = null;
try {
scanFile = new Scanner(myFile);
myAccount.withdraw(scanFile.nextDouble());
} catch (OverdrawnException oe){
System.out.println(oe.getMessage());
} finally {
if (scanFile != null){
scanFile.close();
}
}
What are the steps in finding the average height? Plz help ty :>
(Problem-solving questions
Use the problem-solving steps to develop an algorithm to solve the following problem
...Calculating the average height of all the children in your class)
Answer:
to calculate average, first add all the figures. Then divide by the amount of figures there are
Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is
not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?
O Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.
IM TAKING TEST ANSWER PLS
Answer:
Option A
Explanation:
In case if Robyn is unable to find the frequently used command, then Robyn can use the back stage view to check for the command as the orientation setting allows to access more settings
Hence, option A is correct
Modity your program Modify the program to include two-character .com names, where the second character can be a letter or a number, e.g., a2.com. Hint: Add a second while loop nested in the outer loop, but following the first inner loop, that iterates through the numbers 0-9 2 Program to print all 2-letter domain names Run 3 Note that ord) and chr) convert between text and ASCII/ Uni 4 ord (.a.) is 97, ord('b') IS 98, and so on. chr(99) is 'c", et Running done. domain Two-letter a. com ?? . com ac.com ad. com ae.com ai. com ag.com names: 6 print'Two-letter domain names:" 8 letter1 'a' 9 letter2 10 while letter! < 'z': # Outer loop letter2a" while letter2 <- "z': # Inner loop 12 13 14 print('%s %s.com" % (letteri, letter2)) letter2chr(ord (letter2) 1) 15 letterl chr(ord(letter1) + 1) 16 17 h.com ai.com j com ak.com Feedback?
Answer:
The addition to the program is as follows: digit = 0
while digit <= 9:
print('%s%d.com' % (letter1, digit))
digit+=1
Explanation:
This initializes digit to 0
digit = 0
This loop is repeated from 0 to 9 (inclusive)
while digit <= 9:
This prints the domain (letter and digit)
print('%s%d.com' % (letter1, digit))
This increases the digit by 1 for another domain
digit+=1
See attachment for complete program
Sensors send out ............ signals
Answer:
mhmm................... ok
Given the declaration: char a[] = "Hello"; char *p = a, *q; what operations are valid syntactically? Select all that apply. Group of answer choices q = &&a[0]; q = &&a; *q = *(&a[0]); q = &(*p);
Answer:
The valid operations are:
*q = *(&a[0]); and q = &(*p);
Explanation:
Given
The above declarations
Required
The valid operations
*q = *(&a[0]); and q = &(*p); are valid assignment operations.
However, q = &&a[0]; q = &&a; are invalid because:
The assignment operations intend to implicitly cast the char array a to pointer q. C++ does not allow such operation.
Hence, *q = *(&a[0]); and q = &(*p); are valid
Another way to know the valid operations is to run the program and look out for the syntax errors thrown by the C++ compiler
QUESTION 8
A weakness of PHP is that it only supports one database, MySQL.
True
False
QUESTION 9
All variable names in PHP are case-insensitive.
O True
False
QUESTION 10
An HTML form that is part of the PHP script that processes it is known as self-adhesive?
True
False
Answer:
question 8 is true
Explanation:
PHP is a server-side scripting language for creating dynamic web pages. ... The PHP programming language receives that request, makes a call to the MySQL database, obtains the requested information from the database, and then presents the requested information to your visitors through their web browsers.
tools used to type text on Ms paint
How laggy is you're game cause I even lag in offline games this is just a random question.
Answer: its bad
Explanation:
Answer:
Lagging in offline games suggests there is something wrong with the computer, not the internet. There are various speed tests you can use to determine the speed of your internet! One being https://www.speedtest.net/ which is a more well known and trusted site. Depending on how old your computer is or if it is a laptop not build for games can influence your gameplay experience greatly.
five technology tools and their uses
Answer:
Electronic boards
Videoconferencing ability
Search engines
Cloud services
Computing softwares
Explanation:
Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :
The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.
Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.
Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.
Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.
Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.
Carla is assigning tasks to others and she needs to ensure that she is aware of their progress. Which option should
she choose?
O Send status report when I complete an assigned task
O Completed task color
O Set Quick Click flag
O Keep my task list updated with copies of tasks
Answer: Send status report when I complete an assigned task
Explanation:
In order to be aware of their progress, the option to choose is the "Send status report when I complete an assigned task".
To do this click on options on the tools menu, then click on task options. Then, after the keep updated copies of the assigned tasks on my task list has been selected in the check box, one will then select "Send status reports when the assigned tasks are completed".
You issue a transmission from your workstation to the following socket on your LAN: 10.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using
Answer:
POP
Explanation:
The application layer protocol that is been used here is POP, given that you issued a transmission to the socket on you LAN: 10.1.145:110. and you use a standard port designation
Reason:
110 ( port number ) represents a POP3 process that is always used in a TCP/IP network , and the socket address started with an IP address as well. hence we can say that the application layer protocol is POP
In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers
Answer:
Centralized Processing
Explanation:
Centralized processing was developed to process all of the data in a single computer, and since the first computers were stand-alone with all input and output devices in the same room, only the largest organizations could afford to use centralized processing.
Physical safeguards, also called logical safeguards, and are applied in the hardware and software of information systems.
a. True
b. False
Answer:
False
Explanation:
They are not applied in the hardware and software of information systems.
2. 5s is a Chinese principle adapted for use in the workplace.
True or False
Answer:
A. true
Explanation:
because 5s is the.................
What happens to a message when it is deleted?
It goes to a deleted items area.
It goes to a restored items area.
It is removed permanently.
It is archived with older messages.ppens to a message when it is deleted?
Answer:
it goes to the deleted items area
Explanation:
but it also depends on where you deleted it on
Answer: The answer would A
how can you explain that algorithm and flowchart are problem solving tools?
Answer:
Algorithm and flowchart are the powerful tools for learning programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way. Algorithm and flowcharts helps to clarify all the steps for solving the problem.
Does anyone know what type of Chromebook this is?
Answer: Its............ A Chromebook type of Chromebook...??
Explanation:
Ion know I aint a geek, geezer -_- (Thats a lie)
Exam Lesson Name: Introduction to Design Technology
Exam number. 700796RR
> Exam Guidelines
Exam Instructions
Question 8 of 20 :
Select the best answer for the question
8. Cycling through the design process to create several models that incrementally improve a solution is called what?
O A. Six Sigma
B. Success criteria
C. Just-in-time production
D. Iterative design
Mark for review (Will be highlighted on the review page)
Type here to search
O
Bi
S
Answer:
D. Iterative design
Explanation:
An iterative design can be defined as a cyclic process which typically involves prototyping, testing, evaluating or analyzing and refining of a product, so as to continually improve the product.
In an iterative design process, the following steps are adopted;
1. A prototype of the product is first created and tested by the manufacturer.
2. The product is then evaluated to check for any defect or flaw.
3. The defect or flaw is fixed through a refining process.
4. The previous steps are repeated incrementally until an improved version of the product is created.
Hence, cycling through the design process to create several models that incrementally improve a solution is called iterative design.
Answer:
Iterative Design
Explanation:
A. It seeks to figure what it defective
B. It reaffirms if all requirements are met to solve a problem
C. It's main goal was to avoid excess products that might not end up making sales in the near future
D. Making several revision on problems to take out an efficient solution
D makes the most sense here.
why stress testing is needed?
Answer:
To be able to test a product if it can withstand what it is supposed to before being released to the public for saftey reasons.
Answer:
Stress testing involves testing beyond normal operational capacity, often to a breaking point, to observe the results. Reasons can include:
Helps to determine breaking points or safe usage limits Helps to confirm mathematical model is accurate enough in predicting breaking points or safe usage limits Helps to confirm intended specifications are being met Helps to determine modes of failure (how exactly a system fails) Helps to test stable operation of a part or system outside standard usage Helps to determine the stability of the software.Stress testing, in general, should put computer hardware under exaggerated levels of stress to ensure stability when used in a normal environment.
loa (speaker) thuộc nhóm thiết bị nào ?
Answer:
this say's "Which device group?" hope i helpped
Wi-fi refers to a network that is based on the ____ standard
Answer:
Wi-fi refers to a network that is based on the 802.11 standard.
Answer:
It is based on the 802.11 standard
Explanation:
An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.
An electronic [tex]\sf\purple{spreadsheet}[/tex] is an application you use to perform numeric calculations and to analyze and present numeric data.
[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]
An electronic spreadsheet is an application you use to perform numeric calculations and to analyze and present numeric data.
What is electronic spreadsheet?You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.
Microsoft Excel, Sheets, and Apple Numbers are a few examples of electronic spreadsheets.
Text, number, logical, and error data are the four categories of data. Each type can be used for a variety of tasks, so knowing which to use and when to use it is crucial.
You might also keep in mind that while exporting data into a spreadsheet, some data types might change.
You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.
Thus, the answer is electronic spreadsheet.
For more details regarding spreadsheet, visit:
https://brainly.com/question/8284022
#SPJ6
Write a Java method that prints a list of characters using the following header:public static void printChars (char ch1, char ch2, int numPerLine)This method prints chars between ch1 and ch2 (inclusive); the number of chars per-line is specified by int variable numPerLine. Then write and test Java programs that printa) characters from 1 to Z (uppercase), ten chars per line; b) all lowercase letters followed by all uppercase letters, 13 per line (Hint: you may want to call the method printChars twice in this second part)Consecutive characters on the same line should be separated by exactly one space.
Answer:
The method and the test cases is as follows:
import java.util.*;
public class Main{
public static void printChars (char [tex]ch1[/tex], char [tex]ch2[/tex], int [tex]numPerLine[/tex]){
int count = 0;
for(char ch = ch1; ch<=ch2; ch++){
System.out.print(ch+" ");
count++;
if(count == numPerLine){
System.out.println();
count = 0; } }
System.out.println(); }
public static void main(String[] args) {
printChars('1','Z',10);
printChars('a','z',13);
printChars('A','Z',13);
}}
Explanation:
See attachment for complete source file where comments are used as explanation
Interpersonal skills during discussion with the boss
Answer:
Interpersonal skills are used to communicate with people. Such skills can be individually and in groups measured. Some interpersonal abilities include verbal communication, nonverbal communication, listening ability, ability to decide, etc. Facilitators and observers, therefore, monitor if participants have unqualified abilities.
Explanation:
— thinking about your boss's communication can be sufficient to cause anxiety and stress. You can nevertheless be confident and effective in communication with a little preparation and practice.
1. Write down all the topics you want to talk to and communicate before you talk to your boss.
2) Make sure you know what your boss wants or needs.
3) Rehearse in privacy what your boss is going to say.
4) Use qualifying words like "maybe" or "maybe" instead of absolute words, like "always," "everyone," "every time" or "never." 4) When you talk to your boss. Absolute speech can increase the defense and resistance of a person.
5) Make "I" statements, like "You" statements, like "you did not give me guidance," in the place of "You."
6) If you're emotional, avoid going to your boss. Give yourself time to refresh your thoughts and calm.
7) Talk to your boss before problems get hot and emotional involvement if possible.
8) Be a listener active. Learn what your boss says and really listen. Ask your boss to repeat or clarify an issue if you missed or were unaware.
9) Try to repeat and rephrase your boss's points to show that you listen to him and understand him or her during a convergence.
10) Practice a fine linguistic body. Look at your boss, lean in, and avoid fidgeting.
11) Be confident, not aggressive.
12) Maintain an open mind and compromise open.
13) Avoid spreading or gossiping about your boss's rumors.
14) Have good behavior.
15) Make sure you give love and recognition to your boss when it should.
16) Contact your boss regularly for a convenient relationship to develop and maintain.
If the code for JAVA is LCXC, what is the code for BASIC?
Answer:
DCUKE
Explanation:
Given that,
Code for JAVA = LCXC
To find,
Code for BASIC = ?
As we observe the pattern,
In "JAVA", every letter moved two-letter forward in their alphabetical order or we can say that every third alphabet of the given letter is used to make the code:
J + 2 = L
A + 2 = C
V + 2 = X
A + 2 = C
Similarly,
B + 2 = D
A + 2 = C
S + 2 = U
I + 2 = K
C + 2 = E
Thus, DCUKE is the code for BASIC.
The code for BASIC given the code for JAVA is; DCUKE
We are given the code for JAVA as LCXC
From that code for "JAVA", we see that every letter is moved forward two letters in their alphabetical order. This means
J = L because L comes after J and KA = C because C comes after A and BV = X because X comes after V and UA = C because C comes after A and BSimilarly for BASIC;
B = D because D comes after B and CA = C because C comes after A and BS = U because U comes after S and TI = K because K comes after I and JC = E because E comes after C and DThus, finally the code for BASIC is DCUKE
Read more about JAVA at; https://brainly.com/question/18554491
Explain briefly the FIREWALLS
Answer:
Think of a firewall as your own personal security guard. The firewall will block unapproved websites from talking to your computer and will stop your computer from talking to unapproved/unnecessary websites. Hope this helps!
Explanation: