What happens when you press the enter key at the end of a bulletin text
________ can contain stacked images, text, and other elements which collectively comprise a Photoshop file.
What is the output for the following line of code?
>>>int(2.8)
O 3
O '2.8
02
2.8
Answer:
2
Explanation:
The answer is 2 because the "int" drops any number after the decimal point, leaving 2
Answer:
2
Explanation:
I answered it on Edge and it's correct.
Use comparison operators to write a question that the database will understand. Which records are more than or the same as three thousand?
<=3000
<3000
>3000
>=3000
Answer:
D
Explanation:
≥ is the symbol for more or equal to but it is >= on computer
Answer:
>=3000
Explanation:
We are required to use the comparison operators, and they are like > , <, <=, >=, != We need to use more than or same: And that is >=3000And this is the required answer
anyone know how to answer questions
Answer:
yes
Explanation:
what are your questions though? when posting on here you should include the question you would want answered so someone can help you
When using [EmployeeID] as the unique identifier of the Employee table, [EmployeeID] is an example of which of the following?
a. Key attribute
b. Foreign key
c. Primary key
d. Composite key
Using [EmployeeID] as the unique identifier of the Employee table is an example of: c. Primary key.
What is a primary key?In database management system (DBMS), a primary key can be defined as a field whose value uniquely identifies each record in a table or relational database.
This ultimately implies that, [EmployeeID] is an example of a primary key because it serves as the unique identifier of the Employee table.
In conclusion, a primary key is simply used as a unique identifier of each record in a table or relational database in database management system (DBMS).
Read more on primary key here: https://brainly.com/question/8131854
Two support services supervisors disagree about a position description for a new help desk position. One said, “The position description should be written as general as possible so we can choose any applicant we want.” The other said, “The position description should be as specific as we can make it so applicants will know whether or not they meet our requirements.” With which supervisor do you agree? Explain why?
I aggree with the one that says "The position description should be as specific as we can make it so applicants will know whether or not they meet our requirements.”
Note that when the specific requirements about a position is made known, it makes the applicant to known if they are fit for that position or not
What is a position description?The term position description is also known as "PD" . This is known to be a fact or a statement that talks about the key duties, responsibilities, and role etc. of a position.
It helps to indicates the work to be carried out by the position and when it is specific, one can know if they can do the work or not.
Learn more about position description from
https://brainly.com/question/4677114
IM a bit confused on what this is asking for exactly.
Answer:
im not sure can you ask someone for help
Explanation:
write an assembly program that uses the output compare function of a timer to toggle an led every second
; Set up output compare function
movlw 0x3E
movwf TOCON
; Set up LED port as output
bcf TRISB, 0
; Set up timer
movlw 0xFF
movwf TMR1
movlw 0x60
movwf PR1
; Enable timer and output compare function
bsf T1CON, TMR1ON
bsf T1CON, T1OSCEN
; Main loop
loop:
; Wait for output compare event
btfss T1CON, OCF1
goto loop
; Toggle LED
bcf PORTB, 0
btfss PORTB, 0
bsf PORTB, 0
; Clear output compare flag
bcf T1CON, OCF1
; Repeat
goto loop
You can use the___
to copy data from Excel to Access.
Answer:
You can use the Import spreadsheet wizard program.
Explanation:
On the Office ribbon, select the External Data tab and click Excel. The "Get External Data - Excel Spreadsheet" wizard appears. In the File name field, browse to the Excel file. Select the "Import the source data into a new table in the current database" option and click OK.
Onsite Services for Ruggedized Notebooks are limited to CRU parts and Service Assembly
Parts.
True
False
Onsite Services for Ruggedized Notebooks are limited to CRU parts and Service Assembly is a false statement.
What are Onsite Services?In an On-Site Service, a Service Provider is one that carry out any kind of repair or exchange of a product at given location that is the location of the customer.
Onsite Services for Ruggedized Notebooks is not limited to CRU parts and Service Assembly as one can do any form of system repairs there most especially based on customer preference or what is wrong with the system.
Learn more about Onsite Services from
https://brainly.com/question/11218668
What are three ways digital identity is created and kept up? (open answer)
Answer:
Capture attributes as ID documents or biometric data
Explanation:
Examples of such attributes include biometrics, verified identification documents, and third-party verification procedures. To create a trusted digital ID, there are typically three steps: capturing verified attributes, verification of the documents, and digitization of the ID.
Great day :) toodles
what is the instruction phase of the central processing unit
Answer:
The instruction cycle (also known as the fetch–decode–execute cycle, or simply the fetch-execute cycle) is the cycle that the central processing unit (CPU) follows from boot-up until the computer has shut down in order to process instructions.
Write a program that asks the user to type 5 integers
and writes the average of the 5 integers. This
program can use only 2 variables.
Question #4
Dropdown
You are writing a program to ask the user for the coordinates of two points and then find the slope. Identify each step as input, process, or
output. Not all steps are listed.
#Ask the user for the x-coordinate of the first point.
#Calculate the slope
#Display the slope
Answer:
The y-intercept is going to fall by -2 but the x-intercept will run +5
Explanation:
Becuase the derivative of the equation causes this when plugged into the formula
Ask the user for the x-coordinate of the first point: Input.
Calculate the slope: Process.
Display the slope: Output.
Ask the user for the x-coordinate of the first point:
This step involves obtaining data from an external source, which is the user.
The program needs the x-coordinate of the first point to perform calculations.
The program doesn't have this information beforehand, so it relies on the user to provide it.
Hence, it falls under the category of input.
Calculate the slope:
This step involves performing computations and transformations on the provided input data.
The program takes the coordinates of two points, computes the differences in y-coordinates and x-coordinates, and then calculates the slope using these differences.
This involves mathematical operations and logic, which is processing the data to derive a meaningful result.
Therefore, it is categorized as a process.
Display the slope:
This step involves presenting the result of the calculations to the user. The program is sending information to an external destination, which is the user's screen.
The calculated slope is being made accessible to the user, providing them with the outcome of the computation.
Hence, it falls under the category of output.
To learn more on Programming click here:
https://brainly.com/question/33815139
#SPJ3
Why is determining the transitional cost critical in understanding the TCO
Answer:
" helps in understanding the indirect expenses, such as maintenance, support and license fee, that would add up during the lifecycle of the product."
Explanation:
The determination of the transitional cost is critical in understanding the TCO because it supports acknowledging the concept of indirect expenses in the system of closed compounds.
What is the Transitional cost?The transitional cost may be characterized as the cost between an activity and the activity that will execute next to it on a unary resource. It is reasonable costs and expenses incurred by the Back-Up Servicer in connection with a transfer of servicing.
According to the context of this question, you definitely need to look at the costs compared to your value metrics. The organization will be looking for the cost to change its own structure. The organization will be looking for these costs to be recuperated over time.
It includes the initial purchase price as well as any costs associated with operating the item, ongoing maintenance, training needed, and how long the item is expected to last before replacement is needed.
To learn more about the transitional costs, refer to the link:
https://brainly.com/question/13767005
#SPJ2
You work as an assistant in your school’s computer lab. A student asks you to help her install a program on her laptop using an installation disc she borrowed from a friend. You read the EULA and notice that it provides only a single-user license. What are the ethical and legal issues surrounding using a single-user license on more than one computer? What should you do?
The ethical and legal issues surrounding using a single-user license on more than one computer is that if caught, it can lead to termination of the software package that you are in.
The ethical implication is that one cannot be trusted, our integrity has have brought down to zero. The right thing to do is to explain to the student and if you can, get her another software.
What is single user License agreement?Single User License is a term that connote that there shall be only one person to use, receive and access a product or software and it cannot be shared with other individuals.
In Single user, the software is said to be licensed for a single user and not for Multi-user.
Learn more about User License from
https://brainly.com/question/13502276
Business Rules constraints falls into two categories:
Business-rules constraints fall into two categories: field constraints within tables, and. relationship constraints between tables.
Is it possible to have the present value of a future payment that is greater than the future payment (i.e. the present value is $1200, and the future payment is $1000)? Explain, using complete, grammatically-correct sentences.
Note that the present value always less than the future value and so Is it not possible to have the present value of a future payment that is greater than the future payment.
Can present value be greater than future cash flows?The present value is known to be often less than the future value this is due to the reason that money has interest-earning rate on top of it.
So therefore, that base on the fact that as long as interest rates are positive, then the present value of a sum of money will have to be less than its future value.
Learn more about present value from
https://brainly.com/question/20813161
Dalton completed a research project with Word Online. He would like to print and show it to a family member. Which ribbon tab does Dalton need to select to print a document with Word Online a review b file c home d view
The ribbon tab that Dalton needs to select to print a document with Word Online is: B. file.
What is Word Online?Word Online can be defined as a word processing software application that is designed and developed by Microsoft Inc., so as to enable its end users type, format and save text-based documents over the internet.
Generally, the print command is located in the file section of the ribbon tab in Word Online and as such Dalton needs to select it from there.
Read more on Word Online here: https://brainly.com/question/18272535
Create a Python console application following the requirements below to allow the entry of 6 bowlers' scores
for a bowling game. After that, the average, minimum and maximum scores are determined, and all results
displayed.
Average
a=[scores]
ans=0
max=max(a)
min=min(a)
for i in a:
ans+=i
ans=ans/len(a)
answer quickly!!!!! please answer as soon as you see this!
Which feature of a database displays data in a certain sequence, such as alphabetical order?
Chart
Filter
Search
Sort
(40 PTS) Be specific
Imagine that your computer came to life, grew some arms and legs, and wants to work as your faithful butler. It only understands the most basic commands, and its only desire is to make you delicious food.
You have a jar of peanut butter, a jar of grape jelly, a loaf of bread, and a knife. How would you explain to your computer the process of making a peanut butter and jelly sandwich? Write the commands below as precisely as possible. (Be sure to use definitions if you’re using functions to complete more than one action!
Answer:
Take a knife. Cut the bread. Open the jar of peanut butter and jelly. Scope of a big chunk of peanut butter and
Pat is asked to automate critical security functions like responding to detected threat patterns in an enterprise network. Which of the following should be done by Pat?
a. Use virtual desktop infrastructure
b. Use software-device visibility
c. Implement subnetting
d. Use a software-device network
The option to be done by Pat is to Use a software-device network.
What is Software-device networking?Software device networking is known to be a kind of technology approach to a network management.
It is one that helps to have a dynamic, programmatically efficient type of network configuration so that one can have a better network performance and monitoring.
Learn more about software-device network from
https://brainly.com/question/4171513
Suppose that you have a computer with a memory unit of 24 bits per word. In this computer, the assembly program’s instruction set consists of 198 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is storeSuppose that you have a computer with a memory unit of 24 bits per word. In this
computer, the assembly program’s instruction set consists of 198 different operations.
All instructions have an operation code part (opcode) and an address part (allowing for
only one address). Each instruction is stored in one word of memory.
d in one word of memory.
The number of bits that are needed for this operation code (opcode) is 8 bits.
Given the following data:
Number of operations = 198.Instruction size, I = 24 bits.What is binary encoding?Binary encoding can be defined as a standard technique that is designed and developed for converting data that are stored in plain text (source alphabets) to a form that is easily read or used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.
How to calculate the number of bits.The number of bits that are needed for this operation code (opcode) is given by this mathematical expression:
[tex]2^n > 198\\\\2^8 > 198\\\\256 > 198[/tex]
n = 8 bits.
Read more on binary encoding here: https://brainly.com/question/5381889
True or false: the HTTPs means that the information on a website has been fact-checked
True
False
Answer:
False
Explanation:
Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the absolute value of x, and the square root of (x * y to the power of z). Output all results with five digits after the decimal point, which can be achieved as follows: Put result to output with 5 decimal places Ex: If the input is: 5.0 2.5 1.5 the output is: 55.90170 579.32402 5.00000 6.64787
Answer:
i feel that python is the best language
Explanation:
Different the policies and protocols in the industry
Answer:
7ALWAYS KEEP FOCUS on brainly and I am have been a
Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. calcPyramidVolume() calls the given calcBaseArea() method in the calculation.
In JAVA
The method calcPyramidVolume is an illustration of the java methods; where the methods are executed when called or evoked
The main programThe program written in Java, where comments are used to explain each action is as follows:
//This defines the calcPyramidVolume method
public static double calcPyramidVolume(double baseLength,double baseWidth, double pyramidHeight) {
//This calculates the volume of the pyramid
double PyramidVolume = calcBaseArea(baseLength,baseWidth) * pyramidHeight;
//This returns the volume of the pyramid
return PyramidVolume;
}
Read more about java methods at:
https://brainly.com/question/19271625
Windows 8 allows ______________ to be personalized.
Internet Explorer settings
social media profiles
backgrounds and user environment colors
usernames and passwords
Answer:
backgrounds and user environment colors
Explanation:
Windows 8 allows it since Windows 8 makes it easy to customize the look and feel of the Desktop view. In this lesson, you'll learn how to access the Personalization pane, which allows you to customize the theme, background image, and color of your Desktop. You'll also learn how to adjust your font size and text display..