Answer:
it is Ctrl+R
Create a program that uses a separate module to calculate sales tax and total after tax.
Create a c++ program using console.h and console.cpp files that uses a separate module to calculate sales tax and total after tax.
Console
Sales Tax Calculator
ENTER ITEMS (ENTER 0 TO END)
Cost of item: 35.99
Cost of item: 27.50
Cost of item: 19.59
Cost of item: 0
Total: 83.08
Sales tax: 4.98
Total after tax: 88.06
Again? (y/n): y
ENTER ITEMS (ENTER 0 TO END)
Cost of item: 152.50
Cost of item: 59.80
Cost of item: 0
Total: 212.30
Sales tax: 12.74
Total after tax: 225.04
Again? (y/n): n
Answer:
I nor know this one oo abeg sorry
Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive
Answer:USB drive
Magnetic storage
Optical drive
Explanation:
hope this helps
Online retailers can and should encourage every customer to sign up for regular emails from the retailer. To avoid spam filters, retailers should Group of answer choices automatically send regular emails to all customers send emails to all customers except those who request to be taken off the email list provide a check box that is checked by default during the checkout process for customers to sign up for emails provide a check box that is unchecked by default during the checkout process for customers to sign up for emails ANS:DPTS:1
Answer:
Provide a check box that is checked by default during the checkout process for customers to sign up for emails
Explanation:
I've seen this used the most so I would go with this answer.
The way online retailers get you is by showing you a prechecked email subscription with an unchecked TOS agreement. Your attention is then focused on the TOS agreement and not the agreement for promotions sent to you via email.
What should you do if your engine stalls while you are driving?
A: Hold your steering wheel tightly(power steering is difficult)
B: Shift your transmission to neutral
C: Try to re-start; if unable, stop off road, using four-way flashers
D: All of the above
Answer:
D
Explanation:
All of the above should you do if your engine stalls while you are driving. Thus option D is correct.
What is driving?Driving, which includes operating and moving a vehicle in a controlled manner, includes using a car, scooter, truck, vehicle, or scooter. Drivers must abide by the local highway and traffic rules in order to be allowed to drive on city roads, which is contingent upon a number of requirements being completed.
In most situations, you'll lose auto steering whenever the engine shuts off, making it challenging to spin the wheel, as well as power brakes will shortly follow.
Although it takes significantly more pressure, you could still steer but instead, stop. Put the gearshift in neutral. If you can't restart, stop off the road and use your 4 blinkers. Therefore, option D is the correct option.
Learn more about driving, Here:
https://brainly.com/question/25351775
#SPJ2
A company has enlisted the help of TDojo Consulting Co. to assist them in designing an AWS disaster recovery solution for their on-premises bare metal servers and SQL databases. The implementation has to be robust, fast, and simple to use. It should also prevent any type of data loss from occurring. The company would like to keep track of the status of the migration. Which tool should the team adopt for the DR solution
Answer: CloudEndure Disaster Recovery
Explanation:
The tool that the team should adopt for the DR solution is the CloudEndure Disaster Recovery.
CloudEndure Disaster Recovery is the tool that helps in minimizing downtime and data loss through the provision of a fast and a reliable recovery of the servers into the AWS Cloud.
It also allows the user recover the environment from an unexpected infrastructure, data corruption, or malicious attacks.
30points!!!! Plz answer quickly
Select the correct answer.
What should be the ideal position of the image in a video if it is the main feature of the video?
A. bottom
B. right
C. left
D. center
Answer:
center
Explanation:
that is the focal point
Answer:
D
Explanation:
since it's the main feature of the video it would be best to put it on the center so that all focus is on it because if you put it in the corner or another position it won't be the main feature and definitely not the center of attraction.
I hope you understand.and sorry if it's wrong
BIOS has two jobs. One is to boot up, or start, the computer. What is the other? Maintain the computer’s software firewall. Ensure the fastest possible Internet speed. Provide the basic interface for the hardware. Perform regularly scheduled memory backups.
Answer:
Provide the basic interface for the hardware.
Explanation:
What is the name of the the world cell of the internet?
How you even don't know the basic information
it's disgusting.
Write a method named isNumericPalindrome that accepts an integer parameter named num. If num is a palindrome the method must return true. Otherwise the method must return false. You can assume as a precondition that num has exactly 5 digits (i.e. it is between 10000 and 99999.) For example, 12321 is a palindrome while 12231 isn't because it's the same number if reversed. public boolean isNumericPalindrome(int num)
Answer:
Explanation:
The following code is written in Java. It is a method that reverses the number that is passed as an argument and compares it to its original version. Then it finally returns the results of the comparison as a boolean (either True or False). Two test cases have been created and can be seen in the attached image below.
public static boolean isNumericPalindrome(int num) {
String numString = Integer.toString(num);
String reversed = "";
for (int i = numString.length()-1; i >= 0; i--) {
reversed += numString.charAt(i);
}
return numString.equals(reversed);
}
What is binary number system? Why is it used in computer system?
Answer:
Computers depend mainly on binary because it’s more time efficient for them to so.
Explanation:
It’s easier to identify 0 as “off” and 1 as “on”. As you may know, transistors are the fundamental blocks of microprocessors and ICs. The reasons this is the case is that these transistors form logic gates which can carry out basic logic operations. These logic gates are a huge step into making microprocessors/ICs/etc. And what do these logic gates depend on? They depend on binary.
Whoa whoa, wait a minute. Let’s first take a step back to know a thing or two about logic gates.
These logic gate can be constructed from transistors. They carry basic logic operations. You have one or more inputs “entering” the logic gate ——-> A certain operation is performed on them ——-> you get your output. The input is a voltage. This voltage it can be interpreted as an “on” or “off” according to the gate. Once again these offs and ons are 0s and 1s. For example the Inverter/NOT gate is a gate that simply takes an input and gives its inverse. For example:-
A low voltage/an “off” signal/ a “0” “enters” the NOT gate. ——-> A high voltage/an “on” signal/ a “1” is the result of the operation performed
(In the above example low voltage = “off” signal = 0, high voltage = “on” signal = 1)
As you can see, a 0 enters the NOT gate and a 1 comes out or vice versa. Now, if you were a logic gate, you’d prefer working with just 0s and 1s right? I would. This would be much easier to work with than a lot of different values.
It’s a herculean task to work with these though as a human. And fortunately, programming languages exist for giving the computer instructions to do in a “language” other than its own.
What is the name of the the world cell of the internet?
Answer:
mobile web is the the world cell of internet
Write an algorithm to convert lengh of your house from cm to meter
Answer:
cm = 1000;
meter = cm / 100.0;
kilometer = cm / 100000.0;
print("Length in meter = " ,
meter , "m");
print("Length in Kilometer = ",
kilometer , "km");
Explanation:
This is in Python, hope you enjoy!
The Web 2.0: A. is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services. B. is a computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol. C. is a reference that points to a whole document or to a specific element within a document. D. is a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange.
Answer: A. is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services.
Explanation:
Web 2.0 describes the changing trends regarding how World Wide Web technology is used which is used in enhancing creativity, increase collaboration, secure information sharing, as well as the improvement of the Web functionality.
Web 2.0 is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services. Web 2.0 enables groups of individuals to simultaneously work on a document.
Therefore, the correct option is A.
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You've configured the management interface with a username of admin and a password of password. What should you do to increase the security of this device
Answer:
Change the default administrative user name and password.Use an SSH client to access the router configuration.Explanation:
Remember, we are told the default username and password were simply, "admin" and "password". From a security perspective, both the password and username are weak choices. Hence, to increase the security of the notebook computer where the router configuration management interface is found, it is best you change the password.
Next, by using a Secure Shell Protocol (SSH) client to access the router configuration, the security is enhanced considering the fact the new Cisco router would connect several network segments in the organization.
what is historical development of computer
Answer:
Read below
Explanation:
It began with a 19th century English mathematics professor named Charles Babbage.
Answer:
the person on top is right
Explanation:
just took the test :)
Suppose you are given a sequence that is described by a formula, starting at index n=0. If you need to change the starting index to n=1, then you just need to replace n in the formula by n+...?
Answer:
[tex]n+1[/tex]
Explanation:
Given
[tex]n = 0[/tex] --- starting index
Required
Change the starting index to [tex]n = 1[/tex]
We have:
[tex]n = 0[/tex]
To change the starting index to k, we simply rewrite as:
[tex]n+k[/tex]
In this case; k=1; so, the starting index will be: [tex]n+1[/tex]
A local area network (LAN) is best described as a(n): Multiple Choice computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity. electronic library containing millions of items of data that can be reviewed, retrieved, and analyzed. method to offer specialized software, hardware, and data-handling techniques that improve effectiveness and reduce costs. system that allows computer users to meet and share ideas and information.
Answer:
computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity.
Explanation:
A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings. Some of the network devices or equipments used in a local area network (LAN) includes an access point, personal computers, a switch, a router, printer, etc.
Typically, a local area network (LAN) is best described as a computer system that connects computers of all sizes, workstations, terminals, and other devices such as switches, routers and access points (APs) within a limited proximity.
Someone knows a good compiler for iPad? It has to be an app
A is a distinctive characteristic of a virus or virus family.
Answer:
Assuming your talking about a computer virus(because your under the Computers and Technology section)
Also assuming you meant "What is a distinctive characteristic of a virus or virus family."
A computer virus is a software that was created with the intent of damaging a computer. Computer viruses can replicate them selves by modifying other software on the computer. Viruses such as file infectors can override the machine code of another application and inject its own malicious machine code to perform malicious acts. This is especially dangerous for the OS as the virus can override essential files.
Explanation:
represent the measuring unit ofcomputer un terms of fration of second
Duplicate Question: https://brainly.in/question/21737632
Does anyone know how to fix this computer issue I have?
Answer:
ctrl +Alt+ upper arrow^ it make to fit your desktop
what is the difference between b and br tag
Answer:
<b> tag is used to make the text bold. <br> tag is used to insert a line break into a text font.
Explanation:
The <b> tag in HTML is used to indicate the importance of the text. The text is written within <b> tag display in bold size. You can do that by using CSS also there is a similar tag <strong> tag that has a similar effect on content.
The <br> tag inserts a single line break. The <br> tag is useful for writing addresses or poems. The <br> tag is an empty tag which means that it has no end tag.
Assume X and Y are indepndent. Assume that X has mean 10 and standard deviation 8. Assume Y has mean 12 and standard deviation 6. What is the standard deviation of the variable Z = X + Y. a. 8 b. 6 c. 10 d. 12
Answer:
[tex]\sigma_z = 10[/tex]
Explanation:
Given
[tex]\bar x = 10[/tex]
[tex]\sigma_x = 8[/tex]
[tex]\bar y = 12[/tex]
[tex]\sigma_y = 6[/tex]
[tex]z = x + y[/tex]
Required
[tex]\sigma_z[/tex]
This is calculated as:
[tex]\sigma_z = \sqrt{Var(x) + Var(y)}[/tex]
Calculate [tex]Var(x)[/tex]
We have:
[tex]Var(x) = \sigma_x^2[/tex]
[tex]Var(x) = 8^2[/tex]
[tex]Var(x) = 64[/tex]
Calculate [tex]Var(y)[/tex]
We have:
[tex]Var(y) = \sigma_y^2[/tex]
[tex]Var(y) = 6^2[/tex]
[tex]Var(y) = 36[/tex]
So, we have:
[tex]\sigma_z = \sqrt{Var(x) + Var(y)}[/tex]
[tex]\sigma_z = \sqrt{64 + 36}[/tex]
[tex]\sigma_z = \sqrt{100}[/tex]
[tex]\sigma_z = 10[/tex]
explain the tearms alink and vlink
Answer:
The alink (active link) color appears while the mouse is clicking the link. The vlink (visited link) is the color of the link after the user has already visited it.
A driver that approaches a controlled intersection with a signal that is not working must:
You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? (Select TWO).
Answer:
more /var/log/auth.log
less /var/log/auth.log
Explanation:
The commands that can be used to view the content of the auth.log file page by page are:
more /var/log/auth.log
less /var/log/auth.log
Develop algorithm and flowchart;
1) To input two numbers and find
their average.
2) To calculate perimeter of a rectangle.
3) To print circumference of a circle.
4) To prepare a cup of coffee .
Answer:
Question 2
A flowchart is a pictorial representation of a sequence of instructions that are required to solve a problem.
Write the names and the symbols of the boxes for the given statements
Statement Name of the Box Symbol
To assign a number Process Box Process Box Flowchart Class 8 ICSE Computer Studies
To display the result Input / Output Box Input Output Box Flowchart Class 8 ICSE Computer Studies
To start the process Start Box Start Box Flowchart Class 8 ICSE Computer Studies
To decide whether a number is smaller than the other Decision Box Decision Box Flowchart Class 8 ICSE Computer Studies
Complete the following flowcharts
Question 1
A flowchart to check whether a triangle is possible or not.
Flowchart to check if triangle is possible. Class 8 ICSE Computer Studies.
Question 2
A flowchart to display the greater of the two numbers.
Flowchart to check greater of two numbers. Class 8 ICSE Computer Studies.
Write algorithms for the following
Question 1
To go for a class picnic
Answer
Step 1: Start
Step 2: Decide the picnic venue, date and time
Step 3: Decide the picnic activities
Step 4: Hire a vehicle to reach to the venue and comeback
Step 5: Goto to the picnic venue on the decided date
Step 6: Do the activities planned for the picnic
Step 7: Come back to school in the hired vehicle
Step 8: Stop
Question 2
To celebrate New Year
Answer
Step 1: Start
Step 2: Prepare a guest list for New Year party
Step 3: Decide the venue, food menu, games and fun activities for the party
Step 4: Invite the guests for the party
Step 5: On New Year eve, get ready and enjoy the party
Step 6: Stop
Question 3
To make tea/coffee
Answer
Step 1: Start
Step 2: Boil water in a saucepan
Step 3: Add tea to boiling water
Step 4: Add sugar to boiling water
Step 5: Add milk to boiling water
Step 6: Boil this water with all the ingredients for 2 mins
Step 7: Sieve the tea in a cup
Step 8: Stop
Question 4
To celebrate Teachers' Day
Answer
Step 1: Start
Step 2: Decide the activities for teachers' day like dance performances, plays, etc.
Step 3: Form groups of students and assign the decided activities from step 2 to each group.
Step 4: Decide the practice timings for each group.
Step 5: Each group to practice as per the timings decided in step 4.
Step 6: Invite the teachers to Teachers' Day celebrations.
Step 7: Perform the activities planned in step 2 on Teachers' Day
Step 8: Stop
Answer the following questions
Question 1
What is a flowchart? What are the features of a flowchart?
Answer
A flowchart is a pictorial representation of an algorithm. It uses boxes of different shapes to represent different types of instructions. These boxes are connected with arrow marks to indicate the flow of operations.
The features of a flowchart are:
It is an easy method of communication.
It is independent of a programming language.
It is the key to correct programming.
It helps to plan and design a new system.
It clearly indicates the task to be performed at each level.
Question 2
What is an algorithm? What are its characteristics?
Answer
An algorithm is defined as the sequence of instructions written in simple English that are required to get the desired results. It helps to develop the fundamental logic of a problem that leads to a solution.
Some characteristics of an algorithm are as follows:
Each step of an algorithm must be precisely defined.
An algorithm must contain blocks that will help to solve problems more efficiently and logically.
It should accept a set of inputs and produce a defined output.
It must be terminated after a finite number of steps.
It should be independent from a computer programming language.
It should develop a platform for writing programs.
Question 3
Define the following and draw their symbols:
Algorithm
Step 1: Start
Step 2: Accept the length of the two line segments as l1 and l2.
Step 3: If l1 and l2 are equal, then display 'Line Segments are equal'.
Step 4: If l1 and l2 are not equal, then display 'Line Segments are not equal'.
Step 5: Stop.
Algorithm
Step 1: Start
Step 2: Accept the age of the person.
Step 3: If age is greater than or equal to 18, then display 'You are eligible to vote'.
Step 4: If age is less than 18, then display 'You are not eligible to vote'.
Step 5: Stop.
Why is it important for a photographer to understand the relationship between color and light?
Answer: Different light can cast a different impact on the picture. If a photographer knows how the light will change the picture, he or she can click the picture he wants.
can you give me some hints
write about storage
(should be in easy words)
Answer:
Answer to the following question is as follows;
Explanation:
The process of storing digital information in a data storage media using computing technology is known as storage. Storage is a technique that allows a computer to keep data indefinitely or intermittently. Computer storage capacity and electronic data management are other terms for storage.
A specified group of banks get together and agree to use a blockchain for wholesale settlement of interbank transfers. This is most likely an example of a ........................ blockchain. Group of answer choices Permissionless Permissioned
Answer:
Permissioned
Explanation:
In this scenario, specified group of banks got together and joined forces by agreeing to use a blockchain for wholesale settlement of all interbank transfers. Thus, this is most likely an example of a permissioned blockchain.