Answer:
Memory.
Hard Drive or Solid State Drive.
Video card.
Motherboard.
Processor.
Power Supply.
Monitor.
Keyboard and Mouse.
Explanation:
True or False: F Layout is better for users who read left to right, but layout is better for users who read right to left.
Answer:
false
Explanation:
it depends on the user
Thirty percent of a magazine's subscribers are female. A random sample of 50 subscribers Answer the following questions using Excel: (using standart devision of 0.0648)
a. What is the probability that the proportion of females from this sample is at most 0.25
b. What is the probability that the proportion of females from this sample is between 0.22 and 0.28
c. What is the probability that the proportion of females from this sample is within 0.03 of the population proportion?
Based on the mean of the subscribers, the sample size, and the standard deviation, the probability of females being at most 0.25 is 0.2202.
The probability that they are between 0.22 and 0.28 is 0.2703.
The probability that they are within 0.03 of the population proportion is 0.3566.
What is the probability that they are at most 0.25?Using Excel, we shall assume that the distribution is normally distributed.
We can therefore use the NORM.DIST function:
=NORM.DIST(0.25,0.3,0.0648,TRUE)
= 0.2202
What is the probability that they are between 0.22 and 0.28?=NORM.DIST(0.28,0.3,0.0648,TRUE) - NORM.DIST(0.22,0.3,0.0648,TRUE)
= 0.2703
What is the probability that they are within 0.03 of the population proportion?X high = 0.30 + 0.03
= 0.33
X low = 0.30 - 0.03
= 0.27
= NORM.DIST(0.33,0.3,0.0648,TRUE) - NORM.DIST(0.27,0.3,0.0648,TRUE)
= 0.3566.
Find out more on probability at https://brainly.com/question/1846009.
What is the difference between conceptual architecture view and module architecture view?
Answer:
The conceptual architecture view provides a high-level map of how the system performs what it's meant to do, and the module architecture view demonstrates how the software's major parts are translated to modules and subsystems.
Explanation:
How to add up multiple user inputs for example: If i ask the user How many numbers do you want to add? they say 5 then i out put Enter 5 numbers: how can i get it to add up those 5 numbers that were input.In JAVA
Answer:
import java.util.Scanner;
class Main {
public static void main(String[] args) {
Scanner scanner = new Scanner(System.in);
System.out.println("How many numbers do you want to add?");
int numberOfNumbers = scanner.nextInt();
int arrayNumbers[] = new int[numberOfNumbers];
System.out.println("Enter " + numberOfNumbers + " numbers:\n");
for(int i = 0; i < numberOfNumbers; i++){
int addToArray = scanner.nextInt();
arrayNumbers[i] = addToArray;
}
int sum = 0;
for(int j = 0; j < arrayNumbers.length; j++){
sum+=arrayNumbers[j];
}
System.out.println("Sum: " + sum);
}
}
Explanation:
A program checks to see if the input is valid using
numbers
operators
logic
output
Use the knowledge in computational language in python program checks to see if the input is output.
How to define input in Python?In Python, we do this using the input() function, which is literally 'input' in English. The input() function receives as a parameter a string that will be shown as an aid to the user, usually informing him what kind of data the program is expecting to receive.
So in an easier way we have that the code is:
def isNumber(x):
if type(x) == int:
return True
else:
return False
input1 = 122
input2 = '122'
if isNumber(input1):
print("Integer")
else:
print("String")
if isNumber(input2):
print("Integer")
else:
print("String")
See more about python at brainly.com/question/18502436
Suppose that you have a computer with a memory unit of 24 bits per word. In this
computer, the assembly program’s instruction set consists of 198 different operations.
All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
1. How many bits are needed for the opcode?
2. How many bits are left for the address part of the instruction?
3. How many additional instructions could be added to this instruction set without
exceeding the assigned number of bits? Discuss and show your calculations.
4. What is the largest unsigned binary number that the address can hold?
Answer:
a ) The amount of bits required for the opcode
8 bits
2^8= 256
256>198
We get the next lower number, which is 2^7 = 128 bits, because it is greater than 198. As a result, the operation code necessitates 8 bits.
b) The number of bits reserved for the instruction's address.
16 bits
24-8 = 16
c)
65536
2^16 = 65536
Maximum number = 65535
2^15 = 32768-1
= 32767
Explanation:
a. The insert, Delete, and Format options are present in the
group on the Home tab.
Answer:
False
Explanation:
They are on the keyboard.
how bridges are built over water
write a C++ program to print name, age, class, school
Answer:
#include <iostream>
using namespace std;
int main()
{
string name;
string age;
string Nameclass;
string school;
cout<<"What is your name?\n";
cin>>name;
cout<<"What is your age?\n";
cin>>age;
cout<<"What is your class?\n";
cin>>Nameclass;
cout<<"What is your school?\n";
cin>>school;
cout<<"Name: " + name;
cout<<"\nAge: " + age;
cout<<"\nClass: " + Nameclass;
cout<<"\nSchool: " + school;
return 0;
}
Explanation:
Discussion 5
Kris Allen runs a pet daycare center. She needs to keep track of contact information for her customers, their animals, the services provided (such as walking and grooming), and the staff who are assigned to care for them. She also must send out invoices for payment each month. What features of spreadsheets and/or database software might she use to facilitate her business?
The features of spreadsheets and/or database software that she can use to facilitate her business are;
Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions. Data filtering Accounting.Analytics, etc.Why does business use database software?Businesses can known to use database software to make a good and well manage data output. They also use it to work with their data.
Note that in almost all kinds of businesses, there is the use database software just to keep a track of contacts, addresses, payrolls and other kind of functions to is linked to business and customers.
Learn more about database software from
https://brainly.com/question/1022352
Psuedo code and flow charts
Answer:
pseudo is an informal high level description of the operating principle of an algorithm while a flow chart is a diagrammatic representation that illustrates a solution model to a given problem.
Does anyone know how to get past this part in Lego Harry Potter it’s the one right after Dobby in year 2? I’m so stuck!!!
thats a nice game. i dont know how to play it. how are you doing?
Write an application that reads the file created by the WriteCustomerList application and displays the records. Save the file as DisplaySavedCustomerList.java.
Answer:
hi
Explanation:
the difference between tool bar and status bar
Answer:
A toolbar offers easier access to tasks typically conducted within the application whereas in the status bar it is displayed at the lower side of the web browser screens and other application windows.
Explanation:
Write a C# program to Trim the Given String.
Write a C# program to Convert Upper case to Lower Case.
In C# programming
Answer:
Step by step explanation:
For optimum computer performance, what features and or characteristics should a
computer possess to efficiently copy any material from an external device?
A computer should be compactible and possess a good cache memory size, so as to efficiently copy any material from an external device.
What is a computer?A computer refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.
For optimum computer performance, some of the features and or characteristics that a computer should possess, so as to efficiently copy any material from an external device (hard-disk drive) are:
CompatibilityCache memory size.The computer should have a USB 3.0 port.Read more on computer here: brainly.com/question/959479
Draw a rectangle, give its perimeter and Area
Ask the user for a length and width of a rectangle.
Draw the rectangle
find and show the perimeter
find and show the Area
I am assuming this is in python, so I will use comments to explain each step
l=int(input('What is the length of the rectangle')
w=int(input('What is the width of the rectangle')
#here use whatever graphics code required to draw the rectangle
#will probably be similar to rect=Rectangle(l,w)
print('Perimeter is' +(2*l+2*w))
print('Area is' +(l*w))
What rules should we have about cell phone
the classroom/school?.
THIS IS AN 5 PARAGRAPH ESSAY HELP ME
Introduction: There are many rules schools should follow when it comes to cell phone use during school hours. Technology can be very distracting and durning school is when kids need to pay attention. Most people see cell phone rules un fair or bad, however it's not like that. The school just wants what's best for the students and so they can learn, which will ultimately help them on later in life.
Body paragraphs (wont write the rest of the paragraphs but heres some ideas) Only using the phone when needed like if it's an emergency, phones have to stay on silent to not disrupt others, during free period you can choose whether to be on your phone
then you write your conclusion based on what you wrote
Most of the Info you would need:
-If we don't allow cellphones many school issues would be solved.
-There is a mistake if they use cellphone, but its a great mistake if they misuse.
- Phones in classes just defeat the point of going to school- for learning.
- There are benefits, yes, but there is no doubt that the privilege will be abused.
-Cell phones are only good for distracting the students from the education that they are at school to obtain.
- we think it is one of the best ways to get distracted during class to use your cellphone.
-Cell phones create massive and on going classroom management issues for teachers.
-There is no need for allowing students to use mobile phones in schools. Ultimately they are not using mobiles for the calling purpose. Thus it is a perfect no from our side.
Please have a good day <3
Given the string “supercalifragilisticexpialidocious”.
1. What is the length of the string i.e. write the script to find the length? (2 points)
2. Find the sub-string of first 5 positions and the other sub-string with last 5 positions. (4 points)
3. Find how many times “i” occurs in this word in python
The string and the three instructions is an illustration of the python strings
The length of the stringThe following instruction calculates the length of the string using the Python script:
len("supercalifragilisticexpialidocious")
The returned value of the above instruction is: 34
The substringsThe following instruction calculates the sub-string of first 5 positions and the other sub-string with last 5 positions
myStr[:5]+myStr[-5:]
The returned string of the above instruction is: "supercious"
The number of occurrence of iThe following instruction calculates the occurrences of i in the string
"supercalifragilisticexpialidocious".count("i")
The returned value of the above instruction is: 7
Read more about python strings at:
https://brainly.com/question/13795586
The ages of ELEVEN(11) students on Environmental Awareness Camp are:
12 9 11 7 10 10 9 9 8 9 11
Find the mean and standard deviation
A. Mean = 9.545; Standard deviation = 1.440
B. Mean = 9.545; Standard deviation = 2.073
C. Mean = 10.5; Standard deviation = 1.440
D. Mean = 10.5; Standard deviation = 2.073
Answer:
Gonna be smart. This took me a long time.
Explanation:
Result Standard Deviation, σ: 1.3726971700492
Count, N: 11
Sum, Σx: 105
Mean, μ: 9.5454545454545
Variance, σ2: 1.8842975206612
Steps
σ2 = Σ(xi - μ)2
N= (12 - 9.5454545454545)2 + ... + (11 - 9.5454545454545)2
11
=
20.727272727273
11
= 1.8842975206612
σ = √1.8842975206612
= 1.3726971700492
In simple words. A.
There are 5 participants in a Symmetric Key system and they all wish to communicate with each other in a secure fashion using Symmetric Keys without compromising security. What's the minimum number of Symmetric Keys needed for this scenario keeping in mind that each pair of participants uses a different key
Answer:
10 keys.
Explanation:
There are 5*4/2 = 10 pairs in a group of 5. You need that many keys.
Every member of the group will have 4 keys.
If you draw 5 dots on a piece of paper and connect each one with a line, you'll be drawing 10 lines. Each line needs a key.
do you think film is a great media in exposing information?
Answer:I think film is a great media in exposing information
Explanation:Films are great for exposing information for many reasons. Films are long, which increases the chance the watcher will remember, also it makes the watcher more involved and more interactive
Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?
Answer:
Explanation:
some distros like ubuntu do not even allow su to switch to root. furthermore the su to root is dangerous because the user becomes the all-powerful administrative account, so no warnings are issued if the application team user tries to do something system-breaking.
You ran your email by a few colleagues, and they think it is perfect for your audience – professional, technical, and informative. Your email is ready to send out, so you schedule it for 8AM the next day to reach customers’ inboxes as they start their day. How should you include the email addresses?
You should include in the email addresses by CC all recipients.
What does it mean to CC recipients?The CC abbreviation is a term that stands for “carbon copy.”
The CC recipients is known to get or receive also the same copy of the email and any kinds of other “Reply All” responses that one can see in the thread. Note that all recipients of the email will also see who has been given the CC' message.
See options below
-CC all recipients.
-BCC all recipients
Learn more about email from
https://brainly.com/question/14236855
does anyone know what blue holler is if so, what are the new tracks?
Answer:
No
Explanation:
No I don't know about it sorry
Complete the sentence.
For self-driving cars, both the programmers of the software and governments who regulate them must adhere to
intellectual property laws
ethical principles
noncompete agreements
- to safeguard that the software that controls the car is capable of making life-or-death
Answer:
[ C ] governments who regulate the car industry
[ D ] the programmers who create the software that control the car
Proof:
Governments who regulate the car industry, the programmers who create the software that control the car are the complete sentence.
What is car industry?Car industry is the place where the manufacturing of the cars and automobile parts are placed. Car industry do manufacturing work for the selling purpose. The company may be directly or indirectly engage in the selling industry.
Thus, sentences are completed.
For more details about car industry, click here:
https://brainly.com/question/1139792
#SPJ2
Take any software or Application that you have recently purchased, this can be a video game or any other application helping you to complete you educational objectives or professional purposes. Go through about the copyright, license policies [you will find this information on the leaflet or on the packaging] and answer the following questions]
Can you make copies? What does the license agreement say about the number of copies you can make? Explain in detail [ 2Marks]
Does it specify penalties for making unauthorized copies if yes give the brief detail on that?
[1 Mark]
Do you consider the license agreement to be clearly stated? Reasonable? Explain with two reasons. [ 2 Marks]
A good product should have copyright protection which prevents others from using the product without permission.
Some products specify the penalties which are given to a person who makes unauthorized copies of their product and this is done to clearly educate to avoid ignorance claims.
A good product should have clear lettering which are legible and can be easily read, and should also have reasonable copyright protection.
What is Copyright?This refers to the licensing which is done for a product and is also legally backed which prevents a person from illegally using or redistributing the work of a creator without their explicit consent.
Read more about copyright infringement here:
https://brainly.com/question/1078532
Select the correct answer.
What should every HTML document begin with?
A. the element
B.the declaration
C. the element
D.the element
Answer:
B
Explanation:
Every HTML document must begin with a declaration of what the document is going to be about.
Which layer abstracts away the need for any other layers to care about what hardware is in use?
Answer:
data link layer
Explanation:
you answer is data link layer
Should new technology be created if there is a chance it will be misused?
Answer:
yes
Explanation:
sometime great things can happen out of terrible things.
Answer:
No, because if there is a chance that it will be misused, then it should not be created. Also, we are not told exactly how it may be misused - it could have catastrophic impacts, and cause harm.
Explanation: