Answer:
For 9GB of data the user would pay $82 monthly!
Explanation:
To start off, our end goal is 9GB. We have the equation 9 = ? We can add up to our solutions with 1GB, 3GB, and 10GB. We can immediately rule out 10GB, since 9GB ≠ 10GB. To cost the least amount of money we can add up 3GB and 1GB = 4GB + 5GB = 9GB!
So, our equation is 3GB + 1GB + 5GB = 9GB, now lets figure out the cost!
$28 + $12 + $42 = $82
For 9GB of data the user would pay $82 monthly!
Hope this Helps! :)
Have any questions? Ask below in the comments and I will try my best to answer.
-SGO
Define a class named person that contains two instance variables of type string that stores the first name and last name of a person and appropriate accessor and mutator methods. Also create a method named displayDetails that outputs the details of a person
Answer:
Answered below
Explanation:
//Program is written using Java programming language.
Class Person {
private string firstName;
private string lastName;
void set firstName(string a){
firstName = a;
}
string getFirstName(){
return firstName;
}
void setLastname( string b){
lastName = b;
}
string getLastName( ){
return lastName;
}
void displayDetails( ) {
System.out.print(firstName);
System.out.print (lastName);
}
}
//Test program
Class Main{
public static void main(String args [] ){
Person person = new Person( )
person.setFirstName("Karen")
System.out.print(person.getFirstName)
person.displayDetails()
}
}
Choose the type of collection created with each assignment statement
____ collection A = {5:2}
Options: tuple, dictionary, list
____ collection B = (5,2)
Options: tuple, dictionary, list
____ collection C = [5,2]
Options: tuple, dictionary, list
Answer:
dictionary
tuple
list
Explanation:
. Else-if is good selection statement that help us to solve problems in C++,mostly times same problem of same nature can also be solved via switch statement. Which one you prefer to use and why?
Answer:
Else-If statements
Explanation:
Personally, I prefer using Else-If statements for conditional statements since you can start with and If statement and add to it if necessary. Aside from this, Else-If statements also allow you to add more than one condition to be met by using tags such as and or and not. Switch statements are better in scenarios where you have a set of possible inputs or results and need a specific event to happen for each input/result, but this is not as common of a scenario so Else-If is usually my go-to conditional statement.
How many total beats are these tied notes worth, assuming a quarter note equals 1 beat?
A. One
B. Five
C. Three
Answer:
one i think
Explanation:
Text refers to:
A. all forms of printed media
B. any collections of words.
C. Printed, visual, and audio media.
D. written information only.
Answer:
B
Explanation:
which of the following is not a type of operating system software?
a) windows b) linux
c)Macintosh d) Communications and organization
Answer:
the answer is communication abd organization
The option that is not a type of operating system software is called; D: Communications and organization
What are the types of Computer operating system?An operating system is defined as a type of software that manages the hardware and software of a computer as well as provision of common services.
The most popular Operating Systems for computers are Windows, Linux, Macintosh. Whereas, the popular types of operating systems for phones are iOS, Android, and Windows.
Read more about Computer Operating System at; https://brainly.com/question/1763761
#SPJ9
a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?
Answer:
would it be term and tequnique?
Explanation:
oooooooo
The plugin that changes Jenkins to use green balls instead of blue for successful builds is ________.
Answer:
The answer is below
Explanation:
Jenkins is a server used by developers to to reliably build, test, and deploy their software. Jenkins has different plugins that can be used for this testing.
Jenkin green ball plugin changes jenkins to use green balls instead of blue for successful builds. This green ball plugin is used as an alternative for blue ball builds and it does not affect the output of the XML and JSON APIs.
Which is an example of a technology that has changed the safety of humans?
A) a bicycle
B) a window
C) a rope
D) a baseball bat
Answer:
B
Explanation:
because they have added more protection from breaking window to keep people safe such as if there were a lot of layers of city
What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources
Answer: Trojan horse
Explanation:
Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.
It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.
NEED HELP WILL MARK BRAINLIEST 25 POINTS FOR ANSWER
Which option is typically only used when utilizing self joins?
display name
alias
relationship
primary key
Answer:
relationship
Explanation:
Answer:
I agree the should be C)relationship
Explanation:
edg 2021
Review the advantages of database management systems in the Connolly textbook. Which two advantages do you think are the most important
Answer:
The two advantages of database management systems that are the most important are:
1. Data sharing: Database management systems enable data to be shared among users from different locations. It provides access to many users of the data, who can make specific data requests to meet their information needs.
2. Data consistency: Database management systems make it possible for all users to have the same data. It eliminates the problem of inconsistent data for decision making.
Explanation:
Basically, a Database Management System (DBMS) is defined as the software that enables end-users to create, read, update, delete, and access data in each database. Among the most notable advantages of Database Management System (DBMS) are improved data sharing and security, minimized data inconsistency, better data integration, improved data access, improved decision making, and increased end-user productivity.
Which of the following variable names follows the rules for naming variables?
A. snack $
B. favorite_snack
C. lunch time
D. 15 minute snack
Match the stages of the desktop publishing process with the corresponding actions.
(Design, Setup, Prepress, Printing, and Content)
enter text and images
create an initial outline or draft of the artwork
choose a specific document template with appropriate DTP software
perform the tasks to get the artwork ready for printing
choose either to print or publish the product online
Answer:
Enter text and images - Content
Create an initial outline or draft of the artwork - Design
Choose a specific document template with appropriate DTP software - Setup
Preform the tasks to get the artwork ready for printing - Prepress
Choose either to print or publish the product online - Printing
--------------
Explanation:
WHat is 100 digits of pi?
Answer:
3.1415926535 8979323846 2643383279 5028841971 6939937510 5820974944 5923078164 0628620899 8628034825 3421170679
Answer:
And now
AsapSCIENCE presents-
100 digits of π
3.14159, this is π
Followed by 2-6-5-3-5-8-9
Circumference over diameter
7-9, then 3-2-3
OMG! Can't you see?
8-4-6-2-6-4-3
And now we're on a spree
38 and 32, now we're blue
Oh, who knew?
7, 950 and then a two
88 and 41, so much fun
Now a run
9-7-1-6-9-3-9-9
Then 3-7, 51
Half way done!
0-5-8, now don't be late
2-0-9, where's the wine?
7-4, it's on the floor
Then 9-4-4-5-9
2-3-0, we gotta go
7-8, we can't wait
1-6-4-0-6-2-8
We're almost near the end, keep going
62, we're getting through
0-8-9-9, on time
8-6-2-8-0-3-4
There's only a few more!
8-2, then 5-3
42, 11, 7-0 and 67
We're done! Was that fun?
Learning random digits
So that you can brag to your friends
Explanation:
Can you sort by reading the string in reverse in python?
Explanation:
# Let our string is brainlycom
Main = "brainlycom"
# First we will print the original string.
print("The original string : " + str(Main))
#Now Reverse Sort a String
Reverse_Sort= ''.join(sorted(Main, reverse=True))
print("String after reverse sorting : " + str(Reverse_Sort))
After running the above code you will get the result:
The original string : brainlycom
String after reverse sorting : yronmlicba
The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
a. True
b. False
Answer:
The answer is "Option a"
Explanation:
The given question is incomplete, that's why its correct solution can be defined as follows:
The above-given question is the part of the Binary Autocomplete, in which this Autocomplete function would be a full word or sentence after just a few other letters were entered into the system. It approach improves text taking appropriate on smartphone devices of particular because every letter should not be written in such a single phrase.
What is the difference between a programming language and natural (every-day) language?
What is the output of the following program
#include
int toronto (int x)
{
int w;
if (x == 0) w = 1; else w = toronto (x-1);
return (w);
}
int main (void)
{
int a = 2;
printf ("%d", toronto (a));
return (0); }
a. 0
b. 1
c. 2
d. -1
e. none of these
Answer:
The output is 1
Explanation:
Analysing the flow of program (We start from the main method)
The main begins here
int main (void) {
This line declares a as integer and also initializes it to 2
int a = 2;
This line passes 2 to the function names toronto and also prints the result of the function
printf ("%d", toronto (a));
return (0); }
The toronto function begins here.
Note that the function receives 2 as its argument and this is saved in variable x
int toronto (int x) {
This declares w as integer
int w;
If x is 0, w equals 1
if (x == 0) w = 1;
If otherwise
else
This reduces x by 1 and performs a recursion
w = toronto (x-1);
return (w);
}
Because of the structure of the if condition in the toronto function, the function will be repeated until x is 0.
And when x = 0; w = 1
This returns w (i.e. 1) back to the main function where 1 is printed as the output
return (w);
Give an example of an occasion when you used logic to solve a problem
The ________ contains links to folders and files that Windows determines you access frequently or links that you have added.
Answer:
Quick access list
Explanation:
Normally in computers, quick access list is usually the first node in the navigation pane and it contains links to folders and files that you access frequently plus the ones that you add by yourself. Windows detects them.
Write a list comprehension statement to generate a list of all pairs of odd posi
Answer:
Print([(a,b) for a in range(10) for b in range(10) if (a < b and a%2 == 1 and b%2 == 1)])
Explanation:
Here, we declared a range of value for a and b using a for loop and the range function. The values are the first 10 numeric digits. The we used the if statement to establish our constraints;
In other to ensure that ;
Lower digit is written first ; (a < b) ;
Only odd numbers are considered,
a%2 == 1 ; b%2 == 1 (remainder when a and b are divided by 2 is 1.
Both a and b are declared as a tuple in other to obtain a pair of odd values.
Select all the correct answers. Which statement will print the output 10 + 20=30
a. System.out.println("10 + 20 =30" );
b. System.out.println(10 + 20 =30);
c. System.out.println(10 + 20 =""+ (10+20));
d. System.out.println("10 + 20" =10+20);
e. System.out.println(10 + 20 ="" +10 +20);
Answer:
a
Explanation:
b will print out a boolean, true, i think
c gives an error?? i think
d seems weird
e is weird too
anyway, b,c,d,e all have bad syntax
Answer:
a
Explanation:
A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by
O clicking on the View tab.
O saving a contact.
O creating an appointment.
O flagging an email.
A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.
What is a Variable Expense?Business expenses can be classified as either fixed (invariable) or variable. A fixed expense does not change based on a business’s other activities. Costs like rent and administrative salaries are fixed costs, which remain the same no matter how much a business is producing. Imagine a factory that produces pencils — the cost of renting the factory building will remain the same, month after month, no matter how many pencils the company actually produces.
Variable expense ratio expresses variable expenses as a proportion of a company's sales. To calculate the variable expense ratio, simply divide the company's total variable expenses by the company's total net sales. To express the result as a percentage, simply multiply it by 100.
Therefore, A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.
Learn more about variable expense on:
https://brainly.com/question/13097236
#SPJ5
NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which statement best describes a characteristic of a relational database?
It contains tables that are completely independent of one another.
It contains tables with fields that are associated with one another.
It is a feature that is primarily used to navigate databases.
It is a feature that is primarily used to add queries to tables.
The relational database has the characteristic feature of the adjoining of data with one another.
What is a relational database?The relational database is given as the interconnection of the data with the digital database management system.
The relational database is given with the characteristics of the adjoining of data tables and fields associated with one another. Thus, option B is correct.
Learn more about relational database, here:
https://brainly.com/question/13262352
#SPJ2
what type of device is a projector ?
a. input
b. memory
c. output
d. storage
Answer:
output
Explanation:
if I'm wrong sorryyy
Answer:
Output
Explanation:
:D
What are the three general methods for delivering content from a server to a client across a network
Answer:
Answered below.
Explanation:
The three general methods consist of unicasting, broadcasting and multicasting.
Casting implies the transfer of data from one computer (sender) to another (recipient).
Unicasting is the transfer of data from a single sender to a single recipient.
Broadcasting deals with the transfer of data from one sender to many recipients.
Multicasting defines the transfer of data from more than one sender to more than one recipients.
please help me
Match the technology with the appropriate task.
1. graphics software
2. word processor
3. CAD
4. laptop
5. GPS
Complete Question:
Match the technology with the appropriate task.
Column A
1. Graphics software
2. Word processor
3. CAD
4. Laptop
5. GPS
Column B
A. Create a company logo.
B. Get directions to a customer’s office.
C. Type a report.
D. Complete many types of tasks on a computer away from the office.
E. Design a building.
Answer:
1. A
2. C
3. E
4. D
5. B
Explanation:
1. Graphics software: it can be used to create a company logo. Some examples of software applications or programs are Adobe photoshop, Core-draw, illustrator etc.
2. Word processor: it is typically used for typing a text-based document. For instance, type a report. Some examples are notepad, Microsoft Word, etc.
3. CAD: design a building. CAD is an acronym for computer aided design used for designing the graphical representation of a building plan. An example is Auto-CAD.
4. Laptop: complete many types of tasks on a computer away from the office. A laptop is compact and movable, so it can be easily used in any location.
5. GPS: directions to a customer’s office. GPS is an acronym for global positioning system and it is typically used for locating points and directions of a place.
Answer:
1. A
2. C
3. E
4. D
5. B
WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES
Answer:
lectronic Health Record (EHR) Software. ...
Medical database software. ...
Medical research software. ...
Medical diagnosis software. ...
Medical imaging software. ...
E-prescribing software. ...
Telemedicine software. ...
Appointment scheduling (booking) software.
Question 57 Which type of application attack would include User denies performing an operation, attacker exploits an application without trace, and attacker covers her tracks
Answer:
Auditing and logging
Explanation:
Auditing and logging is a form of application threats and attacks that an application security is susceptible to. It involves a user denies performing an operation; attacker exploits an application without trace, and at the same time attacker covers his or her tracks.
To prevent this, an Auditing and logging countermeasure should be put in place of application security to guide against such aforelisted threats and attacks before its actual occurrence.
Therefore, in this case, the correct answer is "Auditing and logging."