what is Microsoft word

Answers

Answer 1

Answer:

A software where you can document letters, essays or anything really.

Explanation:


Related Questions

Create union integer with members char c, short s, int i and long b. Write a program that inputs the values of type char, short, int, and long and stores the values in union variables of type union integer. Each union variable should be printed as a char, a short, an int and a long. D the values always print correctly? Also create pseodocode or flowchart.
Here is the feedback that I received when I originally turned this in:
I have the following concerns: You need to save your program file with a .c extension. You should declare your union above the main module and then utilize it from within this portion. You have declared the union and then created a function definition prior to entering the main() function.
Here is the original code provided by homework help: Thanks in advance
#include
union myUnion {
char c;
short s;
int i;
long l;
};
void print(myUnion u) {
printf("As a character: %c\n", u.c);
printf("As a short: %hd\n", u.s);
printf("As an int: %d\n", u.i);
printf("As a long: %ld\n\n", u.i);
}
int main() {
myUnion u;
printf("Please enter a character: ");
scanf("%c", &(u.c));
print(u);
printf("Please enter a short: ");
scanf("%hd", &(u.s));
print(u);
printf("Please enter an int: ");
scanf("%d", &(u.i));
print(u);
printf("Please enter a long: ");
scanf("%ld", &(u.l));
print(u);
return 0;

Answers

Answer:

The updated program in C is as follows:

#include <stdio.h>

union myUnion{ char c; short s; int i; long l; };

int main(){

   union myUnion inputs;

   printf("Character: ");    scanf("%c", &inputs.c);

   printf("Output: %c", inputs.c);

   printf("\nShort: ");    scanf("%hd", &inputs.s);

   printf("Short: %hd", inputs.s);

   printf("\nInteger: ");    scanf("%d", &inputs.i);

   printf("Output: %d", inputs.i);

   printf("\nLong: ");    scanf("%ld", &inputs.l);

   printf("Long: %ld", inputs.l);

   return 0;

   }

The pseudocode is as follows:

Function union myUnion {

character; short; int; long

}

main() {

myUnion inputs;

Input inputs.c;  Print inputs.c

Input inputs.s; Print inputs.s

Input inputs.i; Print inputs.i;

Input inputs.l; Print inputs.l

}

Explanation:

This defines the union function

union myUnion{ char c; short s; int i; long l; };

The main begins here

int main(){

This calls the union function to main

   union myUnion inputs;

This prompts and gets input for character variable

   printf("Character: ");    scanf("%c", &inputs.c);

This prints the character input

   printf("Output: %c", inputs.c);

This prompts and gets input for short variable

   printf("\nShort: ");    scanf("%hd", &inputs.s);

This prints the short input

   printf("Short: %hd", inputs.s);

This prompts and gets input for integer variable

   printf("\nInteger: ");    scanf("%d", &inputs.i);

This prints the integer input

   printf("Output: %d", inputs.i);

This prompts and gets input for long variable

   printf("\nLong: ");    scanf("%ld", &inputs.l);

This prints the long input

   printf("Long: %ld", inputs.l);

   return 0;

   }

Use the tables below to show the difference between the results of a natural join, an equijoin (with PROF_CODE = 2) and a full outer join. Provide the resulting table of each join

Answers

Answer:

Code:

CREATE TABLE student (

stu_code INTEGER PRIMARY KEY,

prof_code INTEGER

);

INSERT INTO student VALUES (100278,null);

INSERT INTO student VALUES (128569,2);

INSERT INTO student VALUES (512272,4);

INSERT INTO student VALUES (531235,2);

INSERT INTO student VALUES (531268,null);

INSERT INTO student VALUES (553427,1);

CREATE TABLE professor (

prof_code INTEGER PRIMARY KEY,

dept_code INTEGER

);

INSERT INTO professor VALUES (1,2);

INSERT INTO professor VALUES (2,6);

INSERT INTO professor VALUES (3,6);

INSERT INTO professor VALUES (4,4);

The SQL NATURAL JOIN is a type of EQUI JOIN and is structured in such a way that, columns with the same name of associated tables will appear once only. In our Example, Prof_code will appear only once and it will be matched in both the table;  

SELECT * FROM Student natural join Professor on student.prof_code=Professor.prof_code ;  

Stud_code   Prof_code  Dept_code

128569        2           6

512272        4           4

531235        2           6

553427        1           2

EQUI JOIN performs a JOIN against equality or matching column(s) values of the associated tables and an equal sign (=) is used as a comparison operator in the where clause to refer to equality. In our example, it will only show the result with prof_code=2 from the natural join result.

SELECT * FROM Student join Professor on student.prof_code=Professor.prof_code where student.prof_code=2;

Stud_code Prof_code Prof_code Dept_code

128569     2         2         6

531235     2         2         6

In SQL the FULL OUTER JOIN combines the results of both left and right outer joins and returns all (matched or unmatched) rows from the tables on both sides of the join clause.

SELECT * FROM professor full outer join student on professor.prof_code=student.prof_code ;

Stud_code Prof_code Prof_code Dept_code

100278                

128569    2          2         6

512272    4          4         4

531235    2          2         6

531268    

                    3         6

553427    1          1         2

Which of the following is true for creating a new file?

a. ifstream objects do not create a new file.
b. create a file with the same name as an existing file, you will be prompted to rename your new file.
c. files cannot be created using the fstream library
d. None

Answers

Answer:

create a file with the same name as an existing file ,you will be prompted to rename your new file

12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the AcademicGroups table.

Answers

Answer:index(E3:H12,1)

Explanation:

Answer: =INDEX(AcademicGroups,1,1)

Explanation:

Use the INDEX function (fx) button and you will be provided two different arguments to choose from.

Select the argument: array,row,num,column,num

In the Array section, click the up-arrow and then highlight the range A2:G12 (this is the AcademicsGroups table).

In the Row_num section, enter the number 1

In the Column_num section, enter the number 1

Press OK

Hopefully the logic behind this, after seeing it, makes sense.

is there similarities between plagiarism and software piracy? explain.​

Answers

PlagiarismPlagiarism means using someone else's ideas or words without crediting source.PiracyPiracy is unauthorized use, reproduction, or sharing of copyrighted material.

Which terms means device that converts one voltage to another ?

Answers

Answer:

I believe it is an adapter

Explanation:

An adapter or adaptor is a device that converts attributes of one electrical device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another.

5 Write full forms of the following: CPU b. MHz с. СВТ d. CAI e. ICU f. POS a. Write suitable technical term for the following statements. The continuously working capacity of computer without loos its speed and accuracy. b. The computer terminology, in which output is determined accord to the input The computer device used in hospitals that helps to main heartbeat of the patient. Opiemak The collection of eight bits or two Nibbles. C. I byte d. ng School Level Computer Science - 6​

Answers

Answer:

CPU = Central prossing Unit

You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available

Answers

Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

Explanation:

Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.

https://ref.surveyj.co/Oware111​

Answers

What is the link?

IS IT A HACKING LINK

I need someone to explain gor me python coding!

Answers

Answer:

Explanation:

Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems

give one advantage of saving file in the same folder

Answers

Answer:

it's easier to find

Explanation:

things are much more organized

So you don’t have to go through many files

In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a) user status. b) loyalty status. c) usage rate. d) demographics

Answers

Answer: demographics

Explanation:

Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.

The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.

It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.

(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term ergonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop​

Answers

Answer:

1.similarity:

they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

.a click is pressing and releasing the left mouse button onceright click is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selectiondouble click is pressing the left button twice in rapid successiondrag and drop is where by the user drags an icon or item from one location on the screen to another.

explain how data structures and algorithms are useful to the use of computer in data management

Answers

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in bytes, of the array:
newArray DWORD 10,20,30,40,50
a) arraysize=(S-newArray)
b) arraysize#(S-new,Array)/2
c) arraySize- (S-newArray)/4
d) arraySize- (S-arraySize)

Answers

Answer:

ArraySize = ($ - newArray)

Explanation:

Given

Array name: newArray

Type: DWORD

Required

The size of the array in bytes

The following formula is used to calculate the size of an array in assembly language.

Variable = ($-Array name)

So, we have:

ArraySize = ($ - newArray)

Where ArraySize is the variable that holds the size of newArray (in bytes)

Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message.

Answers

Answer:

Sample output:

Enter the number: 25

The square root of 25 is: 5

Enter the number: -25

The square root of 25 is: Nan

Explanation:

Here the code is given as follows,

Neymar machine that Run on electricity

Answers

"Neymar" = "name a"?

if so, well, there are many, like the little glowing box you use the type questions to the brainliest community, let it be a phone, a pc, or a molded Nintendo

if you meant Neymar indeed, I'm not sure if he runs on electricity, unless he is a soccer playing android somehow.

If every company is now a technology company, then what does this mean for every student attending a business college

Answers

Answer:

Explanation:

There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.

But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.

What is hacking? Why is hacking a concern for law enforcement?

Answers

Answer:

hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.

Hacking is having unauthorized access to data in a computer or a system. It's a huge concern because everything nowadays depends on the internet, and every device connected to the Internet is at risk

what is the role of media in our society, and how can we become responsible consumers producers of news and information in the digital age?​

Answers

1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...

3.Obtain permissions when posting videos or 4.images of others on your networks. ...

Scrub your accounts. ...

5.Password diligence. ...

Spread love, not hate.

Discuss the scaled index addressing mode and comments on the following instructions?

a) MOV BX, [CX+5*AX]
b) MOV [DX5*DI+30H], CX

Answers

Memory will also be accessible in Scaled index addressing mode using a 32-bit base & indexing register.The instruction's first parameter will be the base register, and the instruction's second parameter will be the index register. The index register is multiplied by a scaling factor before the program is fetched.

For option a:

The baseline register is [tex]\bold{BX}[/tex], while the index register is [tex]\bold{CX+5*AX}[/tex].

The multiplier for Accumulator [tex]\bold{AX }[/tex] will be 5.[tex]\bold{CX }[/tex] will be multiplied with this value.[tex]\bold{CX+5*AX}[/tex] will contain a memory address.The value at position [tex]\bold{CX+5*AX}[/tex] is accessed by [tex]\bold{[{CX+5*AX} ]}[/tex].The value retrieved from the address [tex][\bold{CX+5*AX}][/tex] is moved into Base register BX by the MOV instruction.

For option b:

Its index register is [tex]\bold{CX }[/tex], whereas the base register is [tex]\bold{DX5*DI+30H}[/tex].

[tex]\bold{CX}[/tex] has a number, that is copied to a computed place below.After multiplying [tex]\bold{DI}[/tex] by [tex]\bold{5, DX}[/tex] will be multiplied by this [tex]\bold{5*DI}[/tex].To the aforementioned multiplied value,[tex]\bold{ 30H}[/tex] will be added.[tex]\bold{[DX5*DI+30H]}[/tex] is a value located at location [tex]\bold{DX5*DI+30H}[/tex]. [tex]\bold{DX5*DI+30H }[/tex] is a memory address number.As a result, the value of [tex]\bold{CX}[/tex] will be copied to the [tex]\bold{ [DX5*DI+30H] }[/tex]location.

Learn more:

brainly.com/question/14319860

Which one is the result of the output given by a compute

Answers

Answer:

Images.

Sound.

Hardcopy

Answer:

it can be anything like sound or pictures

Explanation:

viết chương trình hoàn chỉnh các yêu cầu sau:
a. Định nghĩa hàm có tên là PSTG(), có hai tham số kiểu nguyên x và y hàm trả về giá trị phân số x/y ở dạng tối giản.
b. Gọi hàm đã định nghĩa ở trên trong hàm main () để in lên mà hình một phân số x/y ở dạng tối giản, với x và y được nhập từ bàn phím.

Answers

Explanation:

the perimeter of an aluminium sheet is 120 CM if its length is reduced by 10% and its breadth is increased by 20% the perimeter does not change find the measure of the length and the breadth of the sheet

Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.

Which network type is Marco using?


LAN


PAN


WAN


MAN

Answers

Answer:

PAN

Explanation:

For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.

What are the PAN  network type is Marco using?

The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).

A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.

Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.

Learn more about network type here:

https://brainly.com/question/29515062

#SPJ2

please i need helpWhen something is not in accordance with the rules or standards for right conduct or practice, it is called

copyright
global plagiarism
plagiarism
unethical

Answers

The answer is Unethical

The answer is:

D) unethical

So, I need to use an external mic for my phone, but the problem is that I need a "dual mic adapter". My dad gave me an "audio splitter" instead. Can I use the audio splitter instead in order to connect the external mic to my phone???​

Answers

But you can't use this device alone to connect two microphones to your USB C port and expect it to have usable volume. So the description is somewhat misleading ...

31. Explain what the program does. Write out the output 20 PRINT "Hellooo00000000000, world!" 30 PRINT "I'm learning about commands in BASIC." 40 PRINT 'This text is being printed via the PRINT commarrd. 2 209​

Answers

o_num = input ("Please enter the amount of \"o\": ")

zero_num = input ("Please enter the amount of zeros: ")

i = 0

while i < o_num and i < zero_num:

repeat_o = "Hell" + o_num

repeat_zero = repeat_o + zero_num

i+=1

print (repeat_zero)

slide transition can be defined as ____ of one slide after another​

Answers

Answer:

visual effect

Explanation:

A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.

(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.

Answers

Answer:

The answer is "True".

Explanation:

The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).There must always be the only primary key in such a relational database.This is a specific relational database field (or column combination) that identifies each table entry in a unique way.It utilized it to swiftly analyze the data within the table as a unique identifier.

In the right situations, the use of multi-threads can allow for application speedup. Provide a small code example that illustrates how threads can be used to arrive at an appropriate result. Identify if there is a point where too many threads might impact performance of the application. g

Answers

Answer:

Explanation:

Threads allow an applications to run faster because they allow various tasks to run at the same time instead of doing one at a time and having to wait for one to finish before starting the next task. However, if too many threads are running at the same time, or a thread has a very large task or requires another task to finish before finishing its own then this can drastically impact performance. Mainly because too many resources are being used at a single moment. The following code is a small example of how threads work in Python.

import threading

import time

def thread_function(name):

   print("Thread {name}: starting")

   time.sleep(2)

   print("Thread {name}: finishing")

thread1 = threading.Thread(target=thread_function, args=(1,))

thread1.start()

time.sleep(1)

thread2 = threading.Thread(target=thread_function, args=(2,))

thread2.start()

thread2.join()

Other Questions
Your driver license could be revoked if you are found guilty of: Group of answer choices operating a vehicle without required insurance discharging diesel fumes from the exhaust pipe operating a vehicle with a burned out headlight or tail light discharging a firearm from a vehicle Please Help!!!!!!!Janet is going to draw a marble from the bag shown below, replace it, and then draw another marble. What is theprobability that Janet will get a blue or yellow marble on the first draw and a pink on the second draw?(3 green, 4 yellow, 5 blue, 8 pink)7/509/5017/40 Please I need the answer ASAP!!!! What is the loan amount if the interest rate is 7.5% per year and the monthly interest payment is $1,250? Borland, Inc. issues 25-year semi-annual bonds that have a face value of $1,000 and a coupon rate of 7.5%. The current market price for the bonds is $950.00. If your required rate of return is 8.5%, what is the value of one of these bonds to you Write chemical equations for the reactions that occur when solutions of the following substances are mixed:a. HNO (nitrous acid) and CHNO (aq) ethanolamine, a base.b. HO+ and F- I need the answer to his question soon, please help! Consider the reaction: A(aq) + 2B (aq) === C (aq). Initially 1.00 mol A and 1.80 mol Bwere placed in a 5.00-liter container. The mole of B at equilibrium was determined tobe 1.00 mol. Calculate K value.0.0605.12517Ugh how does corruption impact on service delivery? If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was integrated? I need help with these questions [tex]\sqrt{x} +\sqrt{5} =\sqrt{12}[/tex] which are the newly created district s of Nepal? Please describe an effective leadership style if i pay 15300 interest capital on a loan for 25 years how much will i pay? If p (x) = x4 + 2x2 + 1 and q (x) = x4 2x2 + 1, find p (x) -q (x). What problems might occur if you give a president unlimited power, time, and money to fight an enemy? On February 15, Symth Co. determines that it cannot collect $500 owed by its customer, A. Winds. Symth records the loss using the direct write-off method. This entry to record the write-off on February 15 would include a: (Check all that apply.) Multiple select question. credit to Accounts Receivable - A. Winds. credit to Bad Debts Expense. debit to Accounts Receivable - A. Winds. credit to Sales. debit to Bad Debts Expense. debit to Sales. How are we best able to subject our ideas to the scrutiny of others?Answer: Only by opening ourselves to information, insights, and critique from a varietyof different peopleBy eliciting insights and information relevant to understanding issuesBy identifying, articulating, and applying reasoned responsive assessments ofissues, and take into account assumptions, facts, values, and perspectives ofothersEngaging in disagreement, questioning deliberatively, assessing the credibilityof information, and thinking critically Four spinners are spun. Spinner 1 has outcomes Spinner 2 has outcomes Spinner 3 has outcomes Spinner 4 has outcomes The outcomes for each spinner are equally likely. is the sum of the numbers that come up on the spinners. What is the expected value of