Answer:
The answer to this question is given below in the explanation section.
Explanation:
The answer is the seek time.
The seek time is the time for the disk arm to move the heads to the cylinder containing the desired sector.
What is a backdoor?
A. A different sign-in page to log into a computer
B. An unrecognized entry into a computer or system
C. A fake version of software to access a computer system
D. An administrative login feature of computer software
B. Generally backdoors are logins/access to something without permission and without admins knowing.
Shana works for a company that makes industrial kitchen equipment that is sold to cafeterias and restaurants. She helps the company’s sales representatives create presentations for clients. They regularly use a custom PowerPoint template to craft their pitches. The sales reps have asked for a slide that will allow them to add a diagram showing the benefits of the equipment they sell.
What steps should Shana take to meet the needs of the company’s sales representatives?
Insert a slide for a diagram each time a sales rep needs to create a new presentation.
In the template’s Slide Master tab, use Master Layout to pick a placeholder for a diagram.
In the template’s Slide Master tab, select Insert Layout, name the layout, and insert a placeholder.
Save a brand-new presentation using the template, select Insert, and choose Charts from the Illustrations command group.
Answer:
Its C on edg
Explanation:
100%
Answer:
c
Explanation:
After modifying a numbered list in her presentation, Su notices the numbers and the text are too close to each other. She knows she can solve this issue by using the hanging indent marker. Unfortunately, the ruler is not visible in her PowerPoint workspace.
Which tab and command group should she use to access the ruler? (View, Show or Insert, Add-ins or Home, Paragraph)
After selecting the numbered list, in which direction should she drag the hanging indent marker to increase the space between the numbers and the text? (upward or downward or to the left or to the right)
Answer:
1. View, show
2. to the right
Explanation:
On edg
Answer:
1) View, Show
2) to the right
Explanation:
Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns their count (that is, how many there are) So if the input was:
hooligan sausage economy
ruin palatial
the function would return 5 because there are 5 strings there.
Answer:
The function written in C++
int str(string word) {
int count = 1;
for(int i =0; i<word.length();i++) {
if(word[i] == ' ') {
count++;
}
}
return count;
}
Explanation:
This line defines the function
int str(string word) {
This line initializes count to 1
int count = 1;
This line iterates through the input string
for(int i =0; i<word.length();i++) {
This line checks for blank space
if(word[i] == ' ') {
Variable count is incremented to indicate a word count
count++;
}
}
return count;
}
See attachment for full program
______ means locating a file among a set of file
Answer:
computer files
Explanation:
In this lab you are asked to declare two variables of type integer: userNum and x. The user should input should be stored using scanf statements. Then you are asked to divide the value for userNum by x three times(three different operations). Each time you do the division, assign the value to userNum overwriting the previous value and print it out using a print statement. Do this three times. In this case there is only one new line print statement at the end.
#include
int main(void) {
int x;
int userNum;
scanf("%d %d" , &userNum, &x);
userNum = (double)userNum / x;
printf("%d " , userNum);
userNum = (double)userNum / x;
printf("%d " , userNum);
userNum = (double)userNum / (double)x;
printf("%lf\n" , (double)userNum);
return 0;
}
my input is 100 2
my output is 50 25 12.000
8 months ago
Answer:
See Explanation
Explanation:
Your program is correct and it follows the correct sequence; however, the reason you keep getting integer result is because the question requires that you declare both variables as integer.
The only modification required in your program is to change change #include to #include <stdio.h> for the program to be free of error.
Which tool did Adnan use to modify the image?
rotation handle
left sizing handle
top sizing handle
corner sizing handle
Answer:
D
Explanation:
Answer:
corner sizing handle
Explanation:
Which filter allows you to impart a stamping or raising effect in an image?
A. Stylize filter
B. Noise filter
C. Sharpen filter
D. Blur filter
E. Texture filter
Answer:
A. Stylize filter
Explanation:
I took the test on edmentum your welcome.
Answer:
Is B because noisse feltrr✔️
If you are wanting to change programs, when do you need to make this request?
a.To change programs, you must contact your advisor or counselor and complete the change of program application during an open application window.
b.You can change at any time; just email your advisor regarding the change.
c.You can never change programs.
d.You do not need to notify anyone. You just need to start taking courses for the desired program.
Answer:
If your discussing colleges and degrees, you cant take courses your not autorized to take.
So if you have one major and wish to change to another then you need to discuss with a student advisor or counseler so they can make the changes. They will also discuss which classes are necessary for your program of choosing, making sure all your requirements are completed.
Explanation:
in a blank excel workbook go to insert tab on the ribbon, which of the following is Not vailable 1 smart art 2 coloumns ( not coloumn chart) 3 shapes 4 pictures
Answer:
hahahahahahahhahahThe rows that are not available in a blank excel workbook go to the insert tab on the ribbon. The correct option is D.
What are ribbons?Click the Ribbon Display Options icon in the document's upper right corner. The Minimize icon is to the left of it. To display the Ribbon with all tabs and all commands, select Show Tabs and Commands from the menu that appears.
Basic units known as cells are created by rows and columns in an Excel workbook. There are only a set number of rows and columns available for the workspace.
There are 1,048,576 rows in the workbook's excel worksheet. It cannot be inserted using the Insert tab on the ribbon. Images, tables, and shapes can be added by selecting the tab or option for the Insert tab.
Therefore, the correct option is D, Rows.
To learn more about rows, refer to the link:
https://brainly.com/question/29889229
#SPJ2
The question is incomplete. Your most probably complete question is given below:
Pictures
Table
Shapes
Rows
Write both an iterative and recursive solution for the factorial
problem.
Answer:
Explanation:
Recursive:
C++ program to find factorial of given number
#include <iostream>
using namespace std;
unsigned int factorial(unsigned int n)
{
if (n == 0)
return 1;
return n * factorial(n - 1);
}
// Driver code
int main()
{
int num = 5;
cout << "Factorial of "
<< num << " is " << factorial(num) << endl;
return 0;
Iterative:
// C++ program for factorial of a number
#include <iostream>
using namespace std;
unsigned int factorial(unsigned int n)
{
int res = 1, i;
for (i = 2; i <= n; i++)
res *= i;
return res;
}
// Driver code
int main()
{
int num = 5;
cout << "Factorial of "
<< num << " is "
<< factorial(num) << endl;
return 0;
}
Please help I upped the points and please don't answer if you don't have the answer..
3. Describe two of your long-term financial goals, and explain why these goals are important to you. List three steps that might help you accomplish this goal. (4-6 sentences. 2.0 points)
4. Describe and example of common financial resource, and example, and a debt. These can be examples from your own life or from other people you know or can imagine. (3-6 sentences. 3.0 points)
Answer:
3. Paying for my daughter to attend college and building a life outside of struggle. These goals must be accomplished by me finishing school, going onto college and maybe even starting my own business. I must set an appropriate example for my daughter to learn from someone who she believes in. Starting a family business to pass down to generations will be an excellent way to start financially planning now ahead of time.
4. Living in a family of mines, common financial resource is either government assisted or public security.An expense that I cannot escape now is the caring for of my daughter which will vary as she get older. Lastly a debt would be the over spending of credit cards with no money to pay it back as the interest rates climb.
Explanation:
The CPU is located on what part of the computer?
the motherboard
the system bus
the random access memory
the hard drive
Answer:
the motherboard
Explanation:
What is Naptha used for?
Answer:
Naphtha is used to dilute heavy crude oil to reduce its viscosity and enable/facilitate transport; undiluted heavy crude cannot normally be transported by pipeline, and may also be difficult to pump onto oil tankers. Other common dilutants include natural-gas condensate, and light crude.
Answer:
Naphtha is used for laundry soaps and clearing fluids
High Hopes^^
Barry-
What is the name of the file in which this
program is stored: public class myProgram
A. myProgram.class
B. myProgram.java
C. myProgram.jgrasp
D. myProgram.doc
Answer:
B
Explanation:
i’m an information technology student and as I remember we used this name
In Java code, the line that begins with/* and ends with*/ is known as?
Answer:
It is known as comment.
You are allowed to use up to 5 images from one artist or photographer without
violating Copyright laws
P5.30 Having a secure password is a very important practice, when much of our information is stored online. Write a program that validates a new password, following these rules: •The password must be at least 8 characters long. •The password must have at least one uppercase and one lowercase letter. •The password must have at least one digit. Write a program that asks for a password, then asks again to confirm it. If the passwords don’t match or the rules are not fulfilled, prompt again. Your program should include a function that checks whether a password is valid.
Answer:
def check_password(password):
is_short = False
has_uppercase = False
has_lowercase = False
has_digit = False
if len(password) < 8:
is_short = True
for p in password:
if p.isupper():
has_uppercase = True
if p.islower():
has_lowercase = True
if p.isdigit():
has_digit = True
if is_short == False and has_uppercase and has_uppercase and has_digit:
return True
else:
return False
while True:
password = input("Enter your password: ")
password2 = input("Enter your password again: ")
if password == password2 and check_password(password):
break
Explanation:
Create a function named check_password that takes one parameter, password
Inside the function:
Initialize the is_short, has_uppercase, has_lowercase, and has_digit as False. These variables will be used to check each situation
Check the length of the password using len() method. If it is smaller than 8, set is_short as True
Create a for loop that iterates through password. Check each character. If a character is uppercase, set the has_uppercase as True (use isupper() function). If a character is lowercase, set the has_lowercase as True (use islower() function). If a character is a digit, set the has_digit as True (use isdigit() function).
When the loop is done, check the value of is_short, has_uppercase, has_lowercase, and has_digit. If is_short is False and other values are True, return True. Otherwise, return False
Create an indefinite while loop, that asks the user to enter password twice. Check the entered passwords. If they are equal and the check_password function returns True, stop the loop. This implies that both passwords are same and password is valid.
Steven wrote an algorithm for his coding class that explains how he makes a cake. Which is the correct sequence of steps that he used?
Mix the ingredients, put into the oven, preheat the oven
Preheat the oven, mix the ingredients, put into oven
Preheat the oven, put into the oven, mix the ingredients
Put into the oven, mix the ingredients, preheat the oven
WILL GIVE ALOT OF POINTS "29" TOTAL
Answer:
Preheat the oven, mix the ingredients, put into oven.
Answer:
Preheat oven, mix the ingredients, put into oven
Explanation:
basically its B
:)
Which tasks can Kim complete using the Customize Ribbon dialog box? Check all that apply.
Rename existing ribbon tabs.
Rearrange ribbon commands.
Add a new main tab to the ribbon.
Add commands to existing groups.
Create new PowerPoint commands.
Add a new contextual tab to the ribbon.
Answer:
Its A, B, C, and F
Explanation:
On edg
Rename existing ribbon tabs, Rearrange ribbon commands, Add commands to existing groups and Add a new contextual tab to the ribbon.
What is PowerPoint presentation?A PowerPoint presentation is a type of visual aid that creates a slideshow of information that can be presented to an audience using Microsoft PowerPoint software.
It is typically made up of a series of slides that include text, images, charts, graphs, and other multimedia elements to convey information to the audience.
Kim can complete the following tasks by using the Customize Ribbon dialog box:
Existing ribbon tabs can be renamed.Rearrange the commands on the ribbon.To existing groups, add commands.To the ribbon, add a new contextual tab.Thus, Kim cannot use the Customize Ribbon dialog box to add new PowerPoint commands or a new main tab to the ribbon.
For more details regarding presentation ,visit:
https://brainly.com/question/14498361
#SPJ7
Which IEEE standards define Wi-Fi technology?
network standards
802.11 standards
111.82 standards
fidelity standards
Answer:
802.11 standards
the answer is:
b. 802.11 standards
Kim frequently saves her PowerPoint files in a different format. So, she decides to add a command for this action to the Quick Access Toolbar. Complete the steps to follow for this task.
1. Select a drop-down menu at the top of the screen.
2. Choose
from the Customize Quick Access Toolbar list.
3. A Quick Access Toolbar dialog box opens.
4. In the
section, select
.
5. Choose Save As Other Format.
6. Click the
button, and click OK.
Answer:
More Commands, Choose Commands from, All commands, Add
Explanation:
Correct on Edg
More Commands, Choose Commands from, All commands.
What is Commands?
One form of statement that tells someone what to do is a command. Additional sentence types include inquiries, exclamations, and declarations.
Usually, but not always, command phrases begin with an imperative (bossy) verb because they demand that the subject take an action.
Children should first learn about and be able to recognize the word classes noun, verb, adjective, and adverb before being taught commands. They can start working on instructions and the usage of imperative verbs after they are familiar with these.
Therefore, More Commands, Choose Commands from, All commands.
To learn more about Commands, refer to the link:
https://brainly.com/question/30319932
#SPJ3
Submit your design an informative computer safety brochure for a specific cybercrime that targets an audience of your choice.
Passivity can harm relationships because those who are passive
a. Have open relationships with others
b. Tend to store up hurt feelings, leading to resentment
C. Typically have excessive self-esteem
d. Are free from self doubt and worry
Answer:
B. Tend to store up hurt feelings, leading to resentment
Explanation:
May I have brainliest please? :)
Passivity can injure relationships because those who are passive that can tend to store up hurt impressions, leading to resentment.
What is the Passivity?passiveness or Passivity is defined as Only the feeling of repository visitors that pass before his paintings get down me more than this charlatan, and they may have a hunch that they are being duped, but they are unable to accept the information of their eyes.
Passivity can ruin relationships because passive people prefer to hold on to upset sentiments, which can develop to resentment.
Therefore, option b is correct.
Learn more about the Passivity, refer to:
https://brainly.com/question/20924905
#SPJ2
What output is produced by
this code?
System.out.print("Computing\nisInfun");
A. Computing is fun
B. Computing\nis\nfun
C.
Computing
is
fun
D. This code will not produce any output, it contains an error.
Answer:
The answer to this question is given below in the explanation section. the correct option is C.
Explanation:
This is Java code statement:
System.out.print("Computing\nisInfun");
The output of this code statement is
Computing
isInfun
However, it is noted that the C option is not written correctly, but it is guessed that it will match to option C.
This Java code statement first prints "Computing" and then on the next line it will print "isInfun" because after the word "Computing" there is a line terminator i.e. \n. when \n will appear, the compiler prints the remaining text in the statement on the next line.
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k. Assume that the medium does not reorder messages. Answer the following questions: What are the possible sets of sequence numbers inside the sender’s window at time t? Justify your answer. What are all possible values of the ACK field in all possible messages currently propagating back to the sender at time t? Justify your answer.
Answer:
Follows are the solution to this question:
Explanation:
In point a:
N = Size of window = 4
Sequence Number Set = 1,024
Case No. 1:
Presume the receiver is k, and all k-1 packets were known. A window for the sender would be within the range of [k, k+N-1] Numbers in order
Case No. 2:
If the sender's window occurs within the set of sequence numbers [k-N, k-1]. The sender's window would be in the context of the sequence numbers [k-N, k-1]. Consequently, its potential sets of sequence numbers within the transmitter window are in the range [k-N: k] at time t.
In point b:
In the area for an acknowledgment (ACK) would be [k-N, k-1], in which the sender sent less ACK to all k-N packets than the n-N-1 ACK. Therefore, in all communications, both possible values of the ACK field currently vary between k-N-1 and k-1.
RAM
Clear sel
19. Which computer memory is used for storing programs and data
currently being processed by the CPU?
Mass memory
RAM
O Neo-volatile memory
Answer:
The answer to this question is given below in the explanation section
Explanation:
The correct answer is RAM.
RAM is used for storing programs and data currently being processed by the CPU. So, the data in the RAM, can be easily accessible and processed by the CPU more fastly.
While Mass memory and neo volatile memory is not correct options. because these types of memory can stores a large amount of data but CPU fetch data from these memories into RAM. and, RAM can only be used by the CPU when performing operations.
What is the appropriate guidelines to create and manage files
Answer:
1. Do not copyright
2. Nothing illegal
3.Do not put personal info
Explanation:
The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should Jim try first to resolve the issue?
A. Downgrade the email software to an older, previous version
B. Buy a newer email program and migrate the office computers to that program
C. Switch from open source software to proprietary software
D. Check for and install patches or software updates
Answer:
A
Explanation:
Bluetooth's pan are also known as______.
Answer:
personal area network..??
Explanation: