how many optical disc of 720mb storage capacity are needed to store 20gb storage of hard disc​

Answers

Answer 1
The answer would be 700 because you would just subtract the amount u need it’s very simple because of the storage amount

Related Questions

Question 6 of 20:
Select the best answer for the question.
6. Harassment is a/an
O A. single
O B. repeated
O C. unsuccessful
O D. successful
attempt to harm a person.

Answers

Harassment is a repeated attempt to harm a person. Thus, the correct option for this question is B.

What is Harassment?

Harassment may be defined as derogatory actions or words that may significantly have a disrespectful nature with the intention to harm the feelings, emotions, and behaviors of others.

According to the question, harassment is not a single attempt, it may force numerous times in order to affect the native feelings and emotions of others. But the ultimate effect of this depends on personal understanding and dedication. If an individual is well-determined, the attempt made is unsuccessful.

Therefore, harassment is a repeated attempt to harm a person. Thus, the correct option for this question is B.

To learn more about Harassment, refer to the link:

https://brainly.com/question/12830365

#SPJ1

User asks you to develop a program that calculates and then prints interest earned on a bank
balance. Program should print interest earned for the same balance when interest is accumulated
annually, semiannually and quarterly.
Interest earned yearly-balance * rate /100
Interest earned semiannually balance*rate/2/100
Interest earned quarterly= balance*rate/4/100
for annual
for semi annual
for quarterly
00 is Current (1) times resistance (R)

Answers

The program that calculates and then prints interest earned on a bank balance is given below:

The Program

#include <bits/stdc++.h>

using namespace std;

int main()

{

   double principle = 10000, rate = 5, time = 2;

   /* Calculate compound interest */

   double A = principle * (pow((1 + rate / 100), time));

     double CI = A- principle;

   cout << "Compound interest is " << CI;

   return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

What is the difference between the output of these two statements?


print("email")
print(email)

A: One statement prints the word "email" in quotes, the other prints the word email without quotes

B: One statement prints the word email, the other prints the value of a variable named email

C: One statement prints out the word email, the other gets input and stores it in a variable named email

D: There is no difference, both statements print the word email

Answers

Answer:

B: One statement prints the word email, the other prints the value of a variable named email

Explanation:

This is because if you add quotation marks, it will be counted as a text output.

If there are no quotes, it would assume that it is a variable.

How many bits is needed to distinctly address 226KB in a byte addressable Memory?

Answers

To distinctly address 226kb in a byte addressable memory, one would need 8 bits.

What is an addressable memory?

Word addressing in computer architecture implies that addresses of memory on a computer authenticate words of memory.

In contrast to byte addressing, where addresses authenticate bytes, it is commonly employed.

What is the calculation justifying the above answer?

Given:

2⁸ = 256

and 226 < 256

Hence, we need 8 bit.

Learn more about addressable memory:
https://brainly.com/question/19635226
#SPJ1

PBL projects are graded using what it tells you what you are doing very well and where you may need improvements

Answers

Answer: a rubric

Explanation:

A rubric is a scoring tool that explicitly describes the instructor's performance expectations for an assignment or piece of work

Which of the following is a reasonable capacity for a modern thumb drive? 10MB, 80Mb, 128GB, 8000Tb. Do an Internet search and think carefully about what these values mean. To get any credit you must provide a reason for your answer.

Answers

Answer:The reasonable capacity for a modern thumb drive is 128 GB.

Explanation:

# Your task is to modify the previous examples code to
# print out all the even numbers from 1 to N where N is
# an int from the user

Answers

Answer:

n = int(input('N: '))

for i in range(1, n + 1):

   if i % 2 == 0:

       print(i)

............................

Answers

Honestly yeah. .-- .... .- -

Answer:

................. kinda?

Explanation:

why computer is now considered a commodity.

Answers

Answer:

Computers are considered commodities because they are relatively easy to produce and there is a lot of competition in the market. This means that prices are relatively low and there is not a lot of differentiation between products.

Explanation:

Hope this helps!

Write a program that reads a monetary amount in dollars and cents (such as 37.84) and computes the equivalent in bills and coins, using the largest denominations possible.

Use a Scanner object to read in a double value for the monetary amount
Convert the total monetary amount to an integer representing the total number of cents (there are 100 cents in a dollar)
US monetary denominations
ten dollar bill = 1000 cents
five dollar bill = 500 cents
one dollar bill = 100 cents
quarter coin = 25 cents
dime coin = 10 cents
nickel coin = 5 cents
penny coin = 1 cent
Use integer division (/) and modulus (%) to calculate each denomination and the cents left over
Hint: You will need to successively divide the remaining cents by the number of cents in the denomination, starting with the ten dollar bills.
tens = remainingCents / 1000; // Divide the total cents by the number of cents in $10
remainingCents = remainingCents % 1000; //Remainder of division by 1000 is what is left after $10 bills taken out
When user input appears as shown in Figure 1, your program should produce output as shown in Figure 2.

Figure 1: (input)

37.84
Figure 2: (output)

$37.84 is equivalent to the following:
3 ten dollar bills
1 five dollar bills
2 one dollar bills
3 quarters
0 dimes
1 nickels
4 pennies


import java.util.Scanner;

public class MoneyConversion
{
// This program reads a monetary amount and computes the equivalent in bills and coins
public static void main (String[] args)
{
double total;
int tens, fives, ones, quarters, dimes, nickels;
int remainingCents;

Scanner scnr = new Scanner(System.in);

// Read in the monetary amount
total = scnr.nextDouble();

// Add the remaining code to finish out the program

}
}

Answers

Using the knowledge of computational language in python we can write the code as program that reads a monetary amount in dollars and cents (such as 37.84) and computes the equivalent in bills and coins, using the largest denominations possible.

Writting the code:

import java.util.Scanner;

public class Money {

public static void main(String[] args) {

double amount; // This displays user's amount

int one, five, ten;

int penny, nickel, dime, quarter;

// Create a Scanner object to read input.

Scanner kb = new Scanner(System.in);

// Get the user's amount

System.out.print("What is the amount? ");

amount = kb.nextDouble();

// Calculations

ten = (int) (amount / 10);

amount = amount % 10;

five = (int) (amount / 5);

amount = amount % 5;

one = (int) (amount / 1);

amount = amount % 1;

quarter = (int) (amount / .25);

amount = amount % .25;

dime = (int) (amount / .10);

amount = amount % .10;

nickel = (int) (amount / .05);

amount = amount % .05;

penny = (int) (amount / .01);

amount = amount % .01;

// Display the results

//println adds a new line by default

System.out.println(ten + " tens.");

System.out.println(five + " fives.");

System.out.println(one + " ones.");

System.out.println(quarter + " quarters.");

System.out.println(dime + " dimes.");

System.out.println(nickel + " nickels.");

System.out.println(penny + " pennies.");

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Students might earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree with an emphasis in digital communications in order to become a

Answers

Answer: Digital Communications Specialist

Explanation:

Took The Test Myself

Students might earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree with an emphasis in digital communications, in order to become a: Digital Communications Specialist.

What is a bachelor's degree?

A bachelor's degree can be defined as an academic degree that is formally awarded by a tertiary institution (university or college) to a student after the successful completion of his or her high school, and it usually takes about 4 or 5 years to complete a bachelor's degree.

What is a master's degree?

A master's degree can be defined as an academic degree that is formally awarded by a tertiary institution (university or college) to a student after the successful completion of his or her bachelor's degree programme.

In conclusion, students are required to earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree in digital communications, in order to become a Digital Communications Specialist.

Read more on Digital Communications Specialist here: https://brainly.com/question/27746922

#SPJ1

If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.

If the site tells you what your password was, that means the site is storing your password rather than just a hash of it. This means that anyone who gains access to the site’s password database has access to all the passwords. If the site sends you a temporary password, there is a good chance it is not storing actual passwords, which is the correct approach from a security perspective.

Answers

I believe the first one is better but in regards to the two cases in terms of vulnerability of the website owner, one can say that when the owner to  the site is breached into, a lot of people's account will be breached into also and personal information stolen.

Why the above idea?

If a person is said to click forgot password button on a site, the  email that is said to have their old password will be sent a new Passwords from the website in question.

But this is one that is not often secure based on the fact that the system admins and programmers  will be seeing the  password.

On the  other hand, let say  the site sends a new password without carrying out any kind of proper validation and whoever that has asked  for the new password, the new password may fall into the hands of those who it is being sent to and this may be an intruder therefore, it is one that is also risking website owners and users as well.

Hence, I believe the first one is better but in regards to the two cases in terms of vulnerability of the website owner, one can say that when the owner to  the site is breached into, a lot of people's account will be breached into also and personal information stolen.

Learn more about System hack from

https://brainly.com/question/23294592
#SPJ1

import java.util.Scanner;

public class MoneyConversion
{
// This program reads a monetary amount and computes the equivalent in bills and coins
public static void main (String[] args)
{
double total;
int tens, fives, ones, quarters, dimes, nickels;
int remainingCents;

Scanner scnr = new Scanner(System.in);

// Read in the monetary amount
total = scnr.nextDouble();

// Add the remaining code to finish out the program

}
}

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that write a function cascade that takes a positive integer and prints a cascade of this integer

Writting the code:

import java.util.*;

public class ChangeTendered {

   public static void main(String[] args){

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter the purchase price: ");

       double price = scan.nextDouble();

       System.out.println("Enter the amount payed: ");

       double ammountPayed = scan.nextDouble();

       double changeDue = ammountPayed - price;

       int dollars = (int)changeDue;

       System.out.println("Return"+ dollars+ "Dollars");

       scan.close();

   }

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

Question 6 of 10 What are three reasons teachers might choose to use Zoom to teach and communicate with students remotely? A. It is easy for teachers to see when students indicate they have a question. B. It has a screen-share feature that allows teachers to share their screen and whiteboard. C. It has a waiting room that allows teachers to send their students to a time-out area for misbehavior. D. It includes the ability to display the video feeds of all students in a session.​

Answers

Answer:

D

Explanation:

so the teacher can see everything they do and would not need to text their parents and moody of them are at home

Now let's build a calorie counter. The NHS recommends that
an adult male takes on board 2,500 calories per-day and an
adult woman takes on 2,000 calories per-day. Build your
program in python for a woman or a man.

Answers

The building of a program in python for a calorie intake per day by a woman or a man is represented as follows:

print("Your calorie counter")

calories = int(input("How many calories have you eaten today? "))

s=2000-calories

print("You can eat", s, "calories today")

What is Python programming?

Python programming may be characterized as a kind of high-level computer programming language that is often utilized in order to construct websites and software, automate tasks, and conduct data analysis.

There are various factors and characteristics of python programming. Each program is built based on specific attributes. They are strings (text), numbers (for integers), lists (flexible sequences), tuples, and dictionaries. The most important components are expression, statements, comments, conclusion, etc.

Therefore, the python programming for a calorie intake per day by a woman or a man is mentioned above.

To learn more about Python programming, refer to the link:

https://brainly.com/question/26497128

#SPJ1

Which property is used to identify the origin of an igneous rock ?

Answers

it should be crystal size
Crystal Size

Explanation:

In Java, System is a:

Answers

Answer:

In Java, System is a:

one of the core classes

what cloud computing storage

Answers

Answer:

It's where data is stored on the internet via the cloud servers. This allows for access of your data pretty much anywhere you have internet depending which service you stored your data on.

Examples:
Dropbox
Amazon Web Services (AWS)
iCloud
Mega.nz

A(n) _______ _______ is a collective term for all the ways you interact with a software program.

Answers

Answer:

The user interface is a collective term for all the ways you interact with a software program. You can interact with a software program using a keyboard, a mouse, a touch screen, or a voice-activated assistant.

Explanation:

Hope this helps!

When a copyright for work has expired the work is then said to be in the

Answers

Answer:

Public Domain

Explanation:

Came to me in a dream

Answer:

Public Domain. This means that the work is no longer under copyright protection and can be used by anyone.

Explanation:

Hope this helps!

Please write in Python

Answers

A program that returns the price, delta and vega for European and American options is given below:

The Program

import jax.numpy as np

from jax.scipy.stats import norm

from jax import grad

class EuropeanCall:

   def call_price(

       self, asset_price, asset_volatility, strike_price,

       time_to_expiration, risk_free_rate

           ):

     

The complete code can be found in the attached file.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Two examples of a relation and their candidate key.

Answers

The two examples of relation and their candidate key are as follows:

STUD_NO in STUDENT relation.FAMIL_EARN in ECoNOMIC relation.

What is the Candidate key?

The candidate key may be defined as a particular kind of field in a relational database that can significantly recognize each unique record independently of any other data.

The candidate key remarkably illustrates the minimal set of ascribes that can uniquely identify given characteristics of the data. More than one candidate key takes place to represent a given set of data and information on the basis of some attributes.

Therefore, the two examples of relation and their candidate key are well described above.

To learn more about Candidate key, refer to the link:

https://brainly.com/question/13437797

#SPJ1

Cleo is working in Excel and encounters a word that she would like Excel to ignore permanently for all workbooks. Which of the following options should she select?

Ignore Once
Ignore All
Add to Dictionary
AutoCorrect

ANSWER IS C Add to Dictionary

Answers

Answer:

ignore all

Explanation:

The answer is ignore all not add to dictionary

Answer:

C

Explanation:

its C dont listen to anyone else i got you

Assume that you are the owner of a small bicycle sales and repair shop serving hundreds of customers in your area. Identify the kinds of customer information you would like your firm's Customer Relationship Management (CRM) system to capture. How migh
this information be used to provide better service or increase revenue? Identify where or how you might capture this data.

Answers

Answer:

Bicycle shops specialize in the selling of bicycles. Depending on the shop, they may also buy, special order, rent, or repair bicycles as additional services. The retail space of the shop usually dictates the size of the inventory.

CRM-Customer Relationship Management:

The CRM is the process of integrating the functions of sales of the product, marketing, and services provided in an organization.

The objective of CRM is to help sales associates to plan the relationship development activities required to maintain and expand business.

What are some options you can set when adding a border? Check all that apply.
O line type
O border margins
O row height
Ocolumn width
Oline weight
O where to apply the border

Answers

I think it’s the column width :)

The automation paradox states: “The more automated machines are, the less we rely on our own skills.” But instead of relying less on automation to improve our skills, we rely even more on automation.” Elaborate further on the skills we would lose as automation is implemented.

Answers

The skills we would lose as automation is implemented are:

Communication Skills. Social Skills. Critical ThinkingThe use of Imagination and Reflection.

What takes place if automation takes over?

The Automation can lead to lost of jobs, as well as reduction in wages.

Note that Workers who are able to  work with machines are said to be the ones that will be more productive than those who cannot use them.

Note that  automation tends to lower both the costs as well as the prices of goods and services, and thus they makes consumers to be able to feel richer as well as loss of some skills for workers.

Therefore, The skills we would lose as automation is implemented are:

Communication Skills. Social Skills. Critical ThinkingThe use of Imagination and Reflection.

Learn more about automation from

https://brainly.com/question/11211656

#SPJ1

Answer: Automation will elimate problem solving skills and communication skills.

Explanation: With the inability to solve problems we lose the skill of using our imaginationa and allowing our brain cells to grow. When you figure out and solve a problem your brain gains more knowledge and you are exercising your brain cells, if you don't use them you will lose them and your inability to make decisions well because there is now AI doing it for you. Also communication one being writing if we no longer have to write with pen and paper we lose the ability to communicate properly in writing our grammer becomes poor and handwriting will no longer be a skill because you never use it.

Write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator). Your program should then divide the numerator by the denominator. Lastly, your program will add the quotient and the remainder together.

Answers

function divide(num, den, rem) { //Numerator, Denomenator, Remainder

 rem = Math.abs(num) % Math.abs(den)

 return rem

}

console.log(divide(13, 5)) // logs '3'

Math.abs() is a function to make the integer a positive integer so that negative integers cant be divided

'rem' gets the remainder

(Geometry: area of a triangle)
Write a C++ program that prompts the user to enter three points (x1, y1), (x2, y2), (x3, y3) of a triangle and displays its area.
The formula for computing the area of a triangle is:
s = (side1 + side2 + side3) / 2
area = square root of s(s - side1)(s - side2)(s - side3)

Sample Run:
Enter three points for a triangle: 1.5 -3.4 4.6 5 9.5 -3.4
The area of the triangle is 33.6

Answers

A C++ program that prompts the user to enter three points (x1, y1), (x2, y2), (x3, y3) of a triangle and displays its area is given below:

The C++ Code

//include headers

#include <bits/stdc++.h>

using namespace std;

//main function

int main() {

//variables to store coordinates

float x1,x2,y1,y2,x3,y3;

cout<<"Please Enter the coordinate of first point (x1,y1): ";

// reading coordinate of first point

cin>>x1>>y1;

cout<<"Please Enter the coordinate of second point (x2,y2): ";

// reading coordinate of second point

cin>>x2>>y2;

cout<<"Please Enter the coordinate of third point (x3,y3): ";

// reading coordinate of third point

cin>>x3>>y3;

//calculating area of the triangle

float area=abs((x1*(y2-y3)+x2*(y3-y1)+x3*(y1-y2))/2);

cout<<"area of the triangle:"<<area<<endl;

return 0;

}

Read more about C++ program here:

https://brainly.com/question/20339175
#SPJ1


Which of the following types of networks can be used to connect different office
locations of one large company?
Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Network (MAN)
Controlled Area Network (CAN)

Answers

The option that is a types of networks can be used to connect different office locations of one large company is option b: Wide Area Network (WAN).

What do you mean when you say "WAN" (wide area network)?

A wide area network, or WAN for short, is a sizable information network unconnected to a particular region. Through a WAN provider, WANs can make it easier for devices all around the world to communicate, share information, and do much more.

It is a telecommunications network that covers a substantial geographic area is referred to as a wide area network. Leasing telecommunications circuits is a common way to set up wide area networks.

Therefore, The option that is a types of networks can be used to connect different office locations of one large company is option b: Wide Area Network (WAN).

Learn more about Wide Area Network (WAN) from

https://brainly.com/question/14959814
#SPJ1

Question 15 (1 point)
Saved
Carla is taking a trip to a cabin to write and she's looking for a typewriter that
doesn't need electricity or any other kind of power. What would be the BEST option
for her?
a tablet
a manual typewriter
an electric typewriter
an IBM typewriter

Answers

Since Carla looking for a typewriter that doesn't need electricity or any other kind of power, the best option would be: B. a manual typewriter.

What is an electrical circuit?

An electrical circuit can be defined as an interconnection of different electrical components, in order to create a pathway for the flow of electric current (electrons) due to a driving voltage.

The components of an electrical circuit.

Generally, an electrical circuit comprises the following electrical components:

ResistorsCapacitorsBatteriesTransistorsSwitchesWiresFuse

Generally speaking, a manual typewriter is a mechanical device that is designed and developed to enable an end user to type, especially without the use of electricity or any other kind of power.

Read more on an manual typewriter here: https://brainly.com/question/2939803

#SPJ1

Other Questions
prove that every positive integer can be written as a finite sum of distinct integral powers of the golden ratio. Please help me its due today which term best describes the number of solutions that will maximize the function below given the constraints listed? (assume that and .) 3x 2y a. one optimal solution c. unbounded b. alternate optimal solutions d. infeasible please select the best answer from the choices provided a b c d If a = 3, then 5a = 15. If a = 112, then a3. A cost that requires a future outlay of cash and is relevant for decision making, is a(n):_________ a) out-of-pocket cost. b) opportunity cost. c) operating cost. d) uncontrollable cost. e) sunk cost. hylacosmilus is a marsupial, and Smilodon is a mammal. Thylacosmilus and Smilodon both have saber teeth, but they do not share an ancestor that had saber teeth. What are saber teeth for these organisms? Karen worked her 40 regular hours last week, plus 6 hours at the time-and-a-half rate. Her gross pay was $650. What was her hourly rate? The table shows the proportional relationship between a hedgehog'sweight loss and the number of days of hibernation. How much weight doesthe hedgehog lose during 120 days of hibernation?Explain how you know that the relationship between the hedgehog's weightloss and the number of days of hibernation is proportional.The hedgehogs total change in weight over 120 days is ____ ounces.weight loss of hedgehogdays: change in weight: 12 -0.36 21 -0.63 71 -2.13 96 -2.88 Is heroism a component of human nature that we all share? directions: Craft an essay to address the prompt, Use at least 5 paragraphs (each paragraph is at least 4 sentences long). F(x)= mx+b m>0 b Which questions best demonstrates how to objectively evaluate an essay for interesting and unique presentation? Select two options The eeoc resolved 90,558 cases in 2018. settlements for victims in the private sector, state and local government, and federal workplaces, amounted to how much money? equal amounts of a pure substance undergo the following changes. which process would you predict release the greatest amount of energy A mountain climber camped at an elevation of 18,492 feet. The following day the climber descended 2,516 feet to another campsite. Write a numerical expression you can evaluate to find the elevation of the second campsite. Then find the elevation. 1. The elevation is -15,976 feet2. The elevation is 15,976 feet3. A good expression would be -18,492 + 2,5164. The elevation is 21,008 feet5. The elevation is -21,008 feet6. A good expression would be 18,492 + 2,5167. A good expression would be 18,492 + -2,5168. A good expression would be -18,492 + -2,516 s(t)= t^2 + 4t+ 2 when t=6 How can you measure the way one variable changes in relation to another? David is in charge of buying materials for a clothing manufacturer. He has a list of suppliers and uses a multiattribute matrix to conduct _____ to evaluate those suppliers. Small businesses create more than 50 percent of all private u.s. gross domestic product (gdp). true/ false Using the data in the last two columns, calculate the mean ACTH concentration 30 minutes post-waking for the surprise protocol and compare to your answer for Question 3. What do your results suggest about a person's physiological response immediately after waking? When teaching a client about restrictions for tranylcypromine, the nurse will tell the client to avoid which food?