The value method is similar to the apply() method except that the argument values are placed in a comma-separated list of values instead of an array.
What is this method about?
The values() method is known to be a method that acts by returning a new array iterator object that has or is made up of the values for all the index in the array.
Note that the value method is very much like the apply() method except that the argument values are placed in a comma-separated list of values instead of an array.
Learn more about Array from
https://brainly.com/question/24275089
By buying in bulk, Deborah managed to have 6,000 CDs manufactured for $9,000. What was the cost per unit for manufacturing?
Answer: It would be $1.50 per unit
Explanation
Flowcharting is another tool that programmers use to design programs?
A. True
B. False
Answer:
True
Explanation:
Flowcharts are diagrams that are used to represent a program's steps or process.
Eric just signed up for his first college class after being out of school for nearly a
decade. He goes to the bookstore the week before class starts to get his book, and
he's surprised to learn that he only needs an access card. How will Eric be
accessing the course material for his college class?
The way Eric can access the course material for his college class is to use the LMS also known as course management system (CMS)
What are course material?Course Materials are known to be the courses, documentation, educational materials needed for a specific course.
Conclusively, The LMS is the known to be the background into which instructors often input course content and when Eric access it, he can be able to get the course content.
Learn more about course material from
https://brainly.com/question/4371674
When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET
When performing forensics on an Apple computer, the operating system are you the most likely to encounter is iOS.
What is operating system forensics?A Operating System Forensics is known to be a method used for the retrieving of any useful information from the Operating System (OS) of the computer or any kind of mobile device.
Note that the reasons for collecting this information is so as to get all the empirical evidence against any kind of perpetrator.
Learn more about operating system from
https://brainly.com/question/1763761
Please help me on this it’s due now
The answer is both A and B because logistics is the overall process of how things are equipped, stored and taken to their final destination.
List and describe in detail any four power management tools that were developed by atleast two manufacturers to prevent and/or reduce the damage of processors from theprocess of overclocking
Some power management tools to reduce damage to processors by the overclocking process are:
CPU TwakerMSI AfterburnerIntel Extreme Tuning UtilityAMD Ryzen MasterWhat is overclocking?It is a technique that allows you to increase the power and performance of various computer hardware. That is, this process increases the energy of the components and forces the pc to run at a higher frequency than determined by the manufacturer.
Therefore, there are several power management models and manufacturers to reduce and prevent physical damage to pc components.
Find out more about overclocking here:
https://brainly.com/question/15593241
HELP PLEASEE!!
True or False. The POP is a bank of switches that allows many users to connect to the ISP at the same time.
Answer:
yes it is true. the pop is a bank of switches that allows many users to connect to the ISP at the same time.
A class researching the world’s population would like to include a graph that shows historical changes. They have information from several online media resources.
Which options should they choose during their evaluation process? Check all that apply.
a teacher’s aide who creates world population materials for a class
a professor who publishes world population research in a journal
a United Nations report that analyzes trends in the world’s population
a nonprofit that tracks how the world’s population affects policy decisions
a local news program that evaluates why some countries are overpopulated
A professor who publishes world population research in a journal
Answer:
b,c,d
Explanation: i took the test and bc im awsome
In the Linux boot process, the master boot record (MBR) loads a(n) __________ program, such as GRUB or LILO
Answer:
Boot loader
Explanation:
This is a small program that is stored within the MBR or the GUID partition table that is used to help load in an operating system into the memory
In a typical information security program, what is the primary responsibility of information (data) owner
The typical responsibility of the information that an owner is to determine the level of sensitivity or classification level.
What is an information security program?The information security program is a set of activities, projects, and initiatives that help an organization IT framework and help the organization meet all the business goals leading to corresponding to the benchmarks. The main duty of the data owner is to determine the level of sensitivity of the data.
Find out more information about information security.
brainly.com/question/25226643
Sonya wants to add a hyperlink to her new e-mail message. Her computer screen is shown.
Which tab should Sonya click in order to find the Hyperlink option?
Insert
File
Options
Review
which country do you live in?
I live in the USA
Hope this helps!
Answer:
Ghana
Explanation:
because I'm an African
Which sentence contains an error?
(Not about technology but about journalism. Answer fast please. Thank you)
Answer:
The correct answer is A
Explanation:
All the rest of them make sense but letter A so your correct answer is A
Good Luck
How can you open a link in a new tab/browser window?.
Answer:
Press the + at the top of your brower, or New Tab button.Copy-paste it into the top of the browser, the main search bar.[tex]Steps~also~in~pictures~below.[/tex]
When did time begin?
Did we invent math or did we discover it?
Where does a thought go when it's forgotten?
Do we have free will or is everything predestined?
Is there life after death?
Is it really possible to experience anything objectively?
What are dreams?
What is the goal of humanity?
I love Rakshya please accpect ma propoese
User inserts 10 numbers. Write a program that will show if there are more positive or negative numbers among the entered numbers.
Here is a basic program that I wrote. This will check how many positive/negative numbers are in the table and then prints the amount..
Using Python
# list of numbers
list1 = [10, -21, 4, -45, 66, -93, 1]
pos_count, neg_count = 0, 0
# iterating each number in list
for num in list1:
# checking condition
if num >= 0:
pos_count += 1
else:
neg_count += 1
print("Positive numbers: ", pos_count)
print("Negative numbers: ", neg_count)
One way to insert a page break is to choose page break from the Insert tab.
true or false
What are enterprise messaging solutions most often used by business teams
for?
A. Cataloging and printing shipping labels for product deliveries
B. Sorting through and deleting a large number of company emails
C. Working on projects and communicating with each other to stay
updated
D. Distributing and tracking the use of computers in the workspace
Answer:
C. Working on projects and communicating with each other to stay updated
Explanation:
Working on projects and communicating with each other to stay
updated. Therefore, the correct answer is option C.
An corporate Messaging System (EMS) is a system that allows "program-to-program" messaging across corporate applications and systems.
Company messaging is typically used to integrate several company systems. It is a software interface that allows one programme to send loosely connected asynchronous data (messages) and store it in a message queue until the receiving programme can process it.
Typically, enterprise messaging falls under two categories:
Enterprise Messaging is classified into two types: promotional and transactional.
Bulk SMS messages are used to market a company's products and services. Bulk uploads, templates, phonebooks, scheduling messages, viewing delivery reports, and importing text and excel files are all common capabilities.Transactional SMSs: The SMS is typically sent by the sender's name (brand name) and is available 24 hours a day, seven days a week.Advantages of deploying an EMS:
Secure Messaging - The secure transmission of critical information and files to smartphones or feature phones.Notifications, reminders, and alerts are delivered globally.Two-way interactive SMS is commonly used for appointment confirmation, business process automation, surveys, and voting campaigns.Campaign Control/Management - Marketing programmes can be readily managed and measured in terms of performance.Delivery Assurance - Access to detailed message delivery can be gained.Customer preferences can be used to create customised messaging programmes using intelligent analytics and reporting.Therefore, the correct answer is option C.
Learn more about the enterprise messaging solutions here:
https://brainly.com/question/32271386.
#SPJ3
83\2+58+3^3+95*2/10
it's computer pls help
Answer:
145.5
Explanation:
I was unsure what you needed done, but if it was a math equation then that is your answer :)
Hope this helped <3 Brainliest please? :)
Which method of funding higher education accrues interest until it is paid back?
A. Scholarships
B. Grants
C. Work-study programs
D. Loans
Answer:
D. Loans
Explanation:
This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average
Answer:
d average
Explanation:
The average is the ratio of the sum of the observation to the total number of observations. Then the correct option is D.
What is average?Average is simply defined as the mean of the given set of numbers. The mean is considered as one of the measures of central tendencies in statistics. The average is said to be an arithmetic mean.
The average is given as
[tex]\rm Average = \dfrac{Sum\ of\ the\ observation}{Total\ number\ of \ observations}[/tex]
This is an example of the average formula.
More about the average link is given below.
https://brainly.com/question/521501
Why might a computer calculate a long list of numbers better than a human?
A. Computers can replicate human tasks.
B. Computers can think creatively.
C. Computers must rest every few hours.
D. Computers calculate numbers very quickly.
Answer: Computers calculate numbers very quickly.
Explanation:
While most of the possible options are accurate, D appears to be your best option. Computers can calculate long, sophisticated numbers in a few seconds while it will (usually) take humans longer.
In flowcharts, the parallelogram shape is used to indicate either an input or output statement.
A. True
B. False
Answer:
True
Explanation:
A parallelogram represents data in a flowchart. Data is either input a process requires or an output that the process hands off to the next step.
How are data organized and manipulated in a database?
Answer:
What is Data Manipulation? Data manipulation refers to the process of adjusting data to make it organised and easier to read. These commands tell the database where to select data from and what to do with it.
Explanation:
While talking to a new client, the client asked you why access control is mostly used in enterprise networks rather than home networks. How should you reply
The way a person should reply the client is that An enterprise network will have more sensitive and confidential information.
What are sensitive and confidential information?Sensitive and confidential information are known to be any kind of information that a person or any business organization do not want to disclosed such as trade secrets.
Note that telling or convincing a client that An enterprise network will have more sensitive and confidential information will help them make the right choice.
See options below
How should you reply?
The devices required for access control can only be afforded an enterprise
An enterprise network will have more sensitive and confidential information
Access controls can only be configured by security admins
Enterprises attract more business when using access control.
Learn more about client from
https://brainly.com/question/25385643
A _____ is a grid that displays fields as columns and records as rows.
Answer: it is a datasheet because data is like a a place to keep things in and you can organise that in many different way's
Isabela wants to edit a presentation for her science class. she is in the main view of the powerpoint application. how can she access her presentation? go to the backstage view, and click options. click the file tab, and click the open option. click the quick access toolbar, and click the open option. type in the name of the file in the search field, and click open.
The Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.
What is power point presentation?Power point presentation is a softwere which display the data with the help of collection of slides.
Isabela wants to edit a presentation for her science class. She is in the main view of the powerpoint application.
Form the main view to access her presentation, Isabela need to follow the following steps-
Click the file tab which is at the main menu.Now she need to click the open option, which appers under the file tab.Thus, the Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.
Learn more about the power point presentation here;
https://brainly.com/question/24653274
Answer: It’s B, Click the File tab, and click the open option
Explanation:
just got it right on edge
Please help me on this it’s due now
I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.
Definition:
Logistics Manager: person in charge of overseeing the purchasing
and distribution of products in a supply chain
Material Handlers: responsible for storing, moving, and handling
hazardous or non-hazardous materials
Inventory Managers: oversee the inventory levels of businesses
Hope that helps!
A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network
Answer:
server or supercomputer
Explanation:
which changes the angle of a picture skew or select or find
Answer:
This article discusses about some very basic and generalized techniques for detecting image skew. Definitely there are much advanced algorithms to detect skew, but those will not be covered in this article.
Explanation: