Answer:
Win a iphone or you can get spectrum for $19.99 a month
Explanation:
Your welcome and you're free to ask me anything when you need me!
Hope this helps!
-Kristy
What is the term for the action of Brazil imposing tariffs on US imports in response to the imposed tariffs by the U.S. on Brazilian exports to the United States ?
A. Reclaiming
B. Retaliation
C.retribution
I think the answer is B.
5. What is intellectual property? (1 point)
Brainliest if correct
Answer:
intangible property that is the result of creativity, such as patents, copyrights, etc.
Please mark as brainliest
Answer:
A creative work of an invention, designs or names and images used in commerce.
All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display
Answer:
B. View
Explanation:
So you can eliminate "Locate" and "Display", since those do not exist on the Microsoft Word task bar.
Now you're left with File and View. File has everything to do with sharing and exporting your file, such as printing or saving it to your computer as a specific file.
With that being said, we're left with "B. View", which as you can see when you click it, presents many us with ways to view our document.
Good luck on your Microsoft Office/Word Certification!
(Find the number of uppercase letters in a string) Write a recursive function to return the number of uppercase letters in a string using the following function headers: def countUppercase(s): def countUppercaseHelper(s, high): Write a test program that prompts the user to enter a string and displays the number of uppercase letters in the string.
Make a Flow Chart From this C Programming Language Code
Answer:
1) Print message "Hello Everybody"
If you wish to print a simple message "Hello everybody" in a flowchart in c language, here is the example:
flowchart in c
2) Input 2 numbers from the user and print their sum
Imagine that you are a user who wishes to put in two numbers and want their sum to be printed. Here is a flowchart for structure in c which is required:
flowchart in c language
3) Input numbers from the user and check whether it is even or odd
If you wish to put in numbers and then check whether it is an even number or an odd one, the following flowchart of c language can significantly help.
flowchart for structure in c
4) Flowchart to find the sum of the first 50 natural numbers
Let’s first see how that will look in a flow chart, and then we see the same thing mapped to a C program. This shows you why it’s important to map out your algorithm to a flow chart before you start coding it.
flow charts in c,
The loop easily translates to a simple C for loop. In this program, we initialize the variable sum =0 and n=0. In the next step, we increment n by 1 and assign sum=sum+n. We check if n=50 and if not, increment n by 1. Else we just print the sum.
5) C Program to find the Factorial Value of a Number
Now let’s look at a bit more complex example. First, we’ll draw out the flow chart for the factorial n.
flowchart of if statement in c,
6) Control Algorithm for cooking toast in the toaster
Using a flowchart describe the control algorithm that a toaster might use to cook toast. There will be a start button the user pushes to activate the machine. There is another input that measures toast temperature. The desired temperature is preprogrammed into the machine. The output is a heater, which can be on or off. The toast is automatically lowered into the oven when the heat is applied and is ejected when the heat is turned off.
flowchart in c
7) Calculation of the average of two numbers
If we have to calculate the average of any two given numbers, the following flowchart for structure in c will be made.
flowchart in c language
Explanation:
mark me brainlist pls
What is information technology in relation to computers
Answer:
Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. ... The commercial use of IT encompasses both computer technology and telecommunications.
Answer:
Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
Explanation:
Hope this helps
business cards can be send to other outlook users as email attachments or........
Answer:
Hey man, here is the answerExplanation:
The easiest route is Forwarding the existing conversation to another person. The previous thread will be quoted in the new message.
The method in the question appears to be for preserving the top-down reading structure of the existing thread, of which there is no way I'm aware of. Often times, the aforementioned method of simply forwarding an email is enough to impart some context to the person.
Alternatively, one might view the entire thread, and create a PDF of it (possible from the Print dialog box on a Mac, or to save as a PDF in the File/Edit menus in certain windows applications), which they could then send in an email.
The hardware and software that must be implemented to support the applications that the primary activities use are a part of the ________ activities.\
what changes might you make to a circuit in order to slow the flow of electrical energy?
Answer: The resistor uses the energy of the electrons around the wire and slows down the flow of electrons.
Explanation:
Which item would a small business most likely used to meet its daily operational needs ?
Answer:
Commercial, ready-to-use software
Explanation:
How often do domain controllers download Group Policy settings?
Answer:
Domain controllers download Group Policy settings -every five minutes-
Explanation:
hope I helped
8. Assuming str(rate) is "7.25," what output would be produced by the following snippet:
print("The hourly parking rate is $." + str(rate))
O "The hourly parking rate is $7.25"
O "The hourly parking rate is $ 7.25"
O "The hourly parking rate is $." "7.25"
O The print comfwand would fail because the rate is an integer, not a string,
The output would be "The hourly parking rate is $7.25"
The question is an example of concatenation.
Concatenation is an operation in computer programming in which a string is added to another string with the binary operation, '+' or '*'.
So, 'Frank' + 'Peter' concatenates as 'FrankPeter' and 'a' *3 concatenates as 'aaa'.
Since str(rate) is "7.25," which is a string, and the snippet is print("The hourly parking rate is $." + str(rate)), str(rate) will concatenate and be added to the expression "The hourly parking rate is $."
So, the output would be "The hourly parking rate is $7.25"
Note that since there is no space at the end of the first string, the second string is added to the first string directly without any spacing between the '$' sign and the '7'.
So, the output would be "The hourly parking rate is $7.25"
Learn more about concatenation here:
https://brainly.com/question/17031234
A company purchases a flood insurance policy for its data center. What is its risk
management decision?
1) Mitigation
2) Acceptance
3) Avoidance
4) Transference
When a company purchases a flood insurance policy for its data center, the risk management decision it took is: 4) Transference.
Risk management can be defined as a process which involves identifying, evaluating, analyzing and controlling potential risks (threats) that are present in a business, which can serve as an obstacle to its capital, revenues and profits.
Basically, risk management decision typically involves prioritizing cause of action or potential threats, so as to avoid, mitigate or transfer the risk that are likely to arise from such business decisions.
The risks or threats that are faced by a business firm can be transferred to a third-party such as an insurance agency, especially to protect its assets and resources in the event of a natural disaster such as flood, fire, earthquake, etc.
In conclusion, transference is a risk management decision that occurs when a company purchases a flood insurance policy for its data center.
Read more on risk management here: https://brainly.com/question/13760012
The problem below uses the function get_numbers() to read a number of integers from the user. Three unfinished functions are defined, which should print only certain types of numbers that the user entered. Complete the unfinished functions, adding loops and branches where necessary. Match the output with the below sample:
Enter 5 integers:
0 5
1 99
2 -44
3 0
4 12
Numbers: 5 99 -44 0 12
Odd numbers: 5 99
Negative numbers: -44
Write code that assigns bigValue with the return value of calling the function GetBiggestValue passing number1 and number2 as arguments (in that order). Then, assign bigValue with the return value of calling GetBiggestValue passing bigValue and number3 as arguments (in that order).
Read the problem listed below. Formulate a Decomposition or Outline of the problem. Determine if you have seen this problem before and how it was solved. Start to write your Algorithm, making note of the inputs and outputs that will be required. Write your code, test and debug.
Problem:
Create a program in Python that will draw a series of triangles. The program needs to ask the user for the number of triangles to draw and the size of the triangle.
The inputs for this program need to look like the following:
Enter the number of triangles:
Enter the size of the triangles:
Using these two inputs, your program will then draw a series of triangles in the size the user wishes.
For example if the user enters 3 triangles with a size of 5, the following will be the output:
*
**
***
****
*
**
***
****
*
**
***
****
The easiest way to solve this problem is with two loops. One loop draws the triangles and the other repeats the drawing.
When testing your program make sure you test with different sizes and different numbers of triangles as this will be how your code will be run by Codio.
URL where the media can be found;
the description of the type of media used in the example;
an analysis of the media piece in relation to the best practices discussed in this lesson, which answers these questions:
Does the piece illustrate best practices?
Which are best represented?
What point do you feel the company
A certain microprocessor requires either 2, 4, 8, 12, or 16 machine cycles to perform various operations. Seventeen and one-half (17.5) percent of its instructions require 2 machine cycles, 12.5% require 4 machine cycles, 35% require 8 machine cycles, 20% require 12 machine cycles, and 15% require 16 machine cycles. What is the average number of machine cycles per instruction for this microprocessor
Write a program to test if an integer input from the keyboard is odd or even. Sample Run 1: Enter a Number: 78 Even Sample Run 2: Enter a Number: 17 Odd
Answer:
number = int(input("Enter a number: "))
if number % 2 == 0:
print("Even")
else:
print("Odd")
Explanation:
Currently taking python at school. On the last few lessons.
What cable is used to connect devices together on a network?
Answer:
Ethernet crossover cable
Explanation:
.
How many types of windows does Python use?
a.
four
b.
five
c.
one
d.
two
Question;
How many types of windows does python use?
Answer;
A.Four
Window does python use is Four
There are two kinds of emotions: positive and negative. True False
Answer:
False
Explanation:
There are many emotions the human brain can experience
Capstone Project part 11 quiz
What is the following code snippet checking? (1 point)
while response != "yes":
Othat response variable is not yet yes
O that response variable is yes
O if "yes" is indexed in an array for the variable "response"
O if the response variable is "no"
If you give all answers you will have an amazing Christmas!
Does technology always follow the science,yes or no explain why to choice
Answer:
NoExplanation:
because Technology does not always follow science but it may actually lead science in some instances. An example is weather forecasting.Again Mark me brainliest plz i really need itreflection image and design
Explanation:
It is the image and design
Explain network optimization challenges of internet providers.
Answer:
The internet was initially used to transfer data packets between users and data sources with a specific IP adress.Due to advancements,the internet is being used to share data among different small,resource constrained devices connected in billions to constitute the Internet of Thing (IoT).A large amount of data from these devices imposes overhead on the (IoT) network.Hence,it is required to provide solutions for various network related problems in (IoT) including routing,energy conservation,congestion,heterogeneity,scalability,reliability quality of service (QoS) and security to optimally make use of the available network.In this paper,a comprehensive survey on the network optimization in IoT is presented.
Many subject elements make for simple and streamlined looking images. true or false
Answer:
Explanation:
false. many elements means a complicated picture, not a simple one.
The statement "Many subject elements make for simple and streamlined-looking images" is absolutely false.
What do you mean by Subject element?The Subject element may be defined as the elements or components of the subject that are significantly responsible for constructing simple or complicated representations in the form of images.
It is a term or phrase that deals with the representation of fundamental topics on which a particular image relies. It significantly defines all the taxonomic attributes of the streamlined-looking images.
According to the context of this question, many subject elements will definitely lead to complicated and more streamlined images rather than simple ones.
Therefore, the statement "Many subject elements make for simple and streamlined-looking images" is absolutely false.
To learn more about Images elements, refer to the link:
https://brainly.com/question/26307469
#SPJ2
What sound customization option would you use in Scratch to simulate a sound happening in a large, empty room (like a theater)?
louder
reverse
echo
slower
Answer:
Louder
Explanation:
__________ can collect information about credit card numbers.
a) Spyware
b) Virus
c)Trojan Horse
d) Worm
Answer:
SpywareSpyware collects your personal information and passes it on to interested third parties without your knowledge or consent. Spyware is also known for installing Trojan viruses. Adware displays pop-up advertisements when you are online.Explanation:
Hope this helps !!Making data secure means keeping it secret
Answer:
Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.
what is computer hardware part
Answer:
Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.
Explanation:
Answer:
Computer hardware is the physical parts of a computer system that is visible.
The parts of computer hardware is Central processing unit, Monitor, Mouse, Keyboard, Computer data storage, Motherboard, Speakers and Mouse.
Hope that helps. x