Have you ever written a program, saved a version, then later saved a different version and wish you could tell what changed

Answers

Answer 1

Answer:YES

Explanation:

Y

Answer 2
No I haven’t tbhhhhh

Related Questions

Online Book Merchants offers premium customers 1 free book with every purchase of 5 or more books and offers 2 free books with every purchase of 8 or more books. It offers regular customers 1 free book with every purchase of 7 or more books, and offers 2 free books with every purchase of 12 or more books.

Write a statement that assigns freeBooks the appropriate value based on the values of the bool variable isPremiumCustomer and the int variable nbooksPurchased. Assign 0 to freeBooks if no free books are offered. Assume the variables freeBooks, isPremiumCustomer, and nbooksPurchased are already declared.

In C++ please

Answers

fill in the blanks

we should our selves

Enter a formula in the selected cell to display the owner's draw percentage (cell B6).

Answers

The formula is an illustration of Excel formulas, and Excel formulas are used to operate on values in a cell or a range of cells

Formula in the selected cell to display the owner's draw percentage is =B6

How to write the formula?

From the question, the owner's draw percentage is in the cell B6.

To enter the formula, we simply enter the name of the cell (i.e. B6)

So, we have:

B6

Excel formulas begin with the equal to "=" sign,

So, we have:

= B6

Hence, the formula is = B6

Read more about Excel formulas at:

brainly.com/question/17566733

What position should you hand be on the steering wheel? yuyuyhj

Answers

Answer:

9 and 3

Explanation:

its the right way and njcs wdhiqgua wdiu posef

Each computer on a network is called a __________, and it can include many different systems, such as desktop and laptop computers, printers, routers, switches, and cell phones.

Answers

A host refers to each of the computer system connected to a network and it include the following different systems:

Desktop Laptop computersPrintersRoutersSwitchesCell phones

What is a host?

A host can be defined as an electronic computing and programmable device that can be used to transmit and receive data (packets) over the Internet, especially when it is connected to a network.

This ultimately implies that, each electronic computing and programmable device (computer) on a particular network is a host and it can include many different systems such as:

Desktop Laptop computersPrintersRoutersSwitchesCell phones

Read more on computers here: https://brainly.com/question/17402566

When proofreading, you should do all of the following except _____.


read aloud

ask someone else to look over the document

take the time to carefully look over your work

skim the document quickly

Answers

Answer:

Skim the document quickly

Explanation:

The purpose of proofreading is to catch any errors that may have been present when the work was first written.

All the options are usually done when proofreading, except for the last one.

Hope this helps :)

Which of the following does a secure website use to safeguard transmitted information

Answers

Answer:encryption

Explanation:

because you can hack encrypted things well not so easily

Encryption is a secure website used to safeguard transmitted information. The correct option is C.

What is encryption?

The process of converting information into a secret code that conceals its true meaning is known as encryption.

Cryptography is the study of information encryption and decryption. In the world of computers, ciphertext refers to encrypted data and plaintext to unencrypted data.

By converting the message's content into a code, encryption serves as a confidentiality tool. Integrity and authenticity are the goals of digital signatures.

They serve to confirm the message's source and show that the content hasn't been altered.

In the process of encryption, ordinary text, such as a text message or email, is scrambled into "cypher text," which is an unintelligible format. Secure websites utilise encryption to protect sent information.

Thus, the correct option is C.

For more details regarding encryption, visit:

https://brainly.com/question/17017885

#SPJ6

Your question seems incomplete, the missing options are:

A) A lock icon

B) The http protocol

C) Encryption

D) Digital certificate

When replacing a defective switch, what is a necessary characteristic of the new switch?
Select one:
a. Greater number of poles and throws than the original switch
O b. The same number of positions as the original switch
C. Identical cover plate as the original switch
O d. Greater current ratings than the original switch

Answers

Answer:

Socratic app

Explanation:

it will help you

Anyone watch anime what's y'all race

Answers

I'm starting to. Right now I'm watching Mob Psycho 100 and HxH.

I'm mixed.

Need help with Python coding...
2.14 LAB: Using math functions
Given three floating-point numbers x, y, and z, output the square root of x, the absolute value of (y minus z) , and the factorial of (the ceiling of z).

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('%0.2f %0.2f %0.2f' % (your_value1, your_value2, your_value3))

Ex: If the input is:

5.0
6.5
3.2
Then the output is:

2.24 3.30 24.00

Answers

Answer:

6.5

24.00

it think it's my answer

True or False. A range has an address called a range address.
True
False

Answers

Answer:

im not sure so i apoligize, but i think its true

Explanation:

It’s false
Hope that helps!

Which two tabs appear when a table is "active" in Microsoft Word?
Insert
Table Design
Home
Layout

Answers

Answer:

Layout and Table Design

Explanation:

what is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS. ​

Answers

Answer:

ARPANET: Advanced Research Projects Agency Network

BOOTP: Bootstrap Protocol

GSM: Global System for Mobiles

GUI: graphical user interface

EOM: Enterprise Output Management

EULA: end-user license agreement

CTSS: The Compatible Time Sharing System

Explanation:

BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.

GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.

ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.

BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.

GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.

EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.

EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.

CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.

Technician A says stepped resistors are made from one or more wire-wound resistors.
Technician B says a common application for this type of resistor is in a blower motor speed
control circuit. Who is correct?
Select one:
O a. Technician A
O b. Technician B
O C. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

Your answer is both A & B
I hoped this helped <33

. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree

Answers

The root node will contain the smallest element

A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced, new applications can be made available sooner, and the risk of human error is reduced. b. Ability to support more concurrent devices, minimal infrastructure changes, and lower latency. c. Lower latency, greater bandwidth, and ability to support more devices. d. Ability to support exciting new applications, greater bandwidth, and improved security

Answers

A 5G network will have the following advantages over a 4G network except that C. Lower latency, greater bandwidth, and ability to support more devices.

A 5G network simply means the 5th generation mobile network. It enables a new kind of network that is designed to connect everyone and devices.

The advantages of a 5G network over a 4G network include lower latency, greater bandwidth, and the ability to support more devices.

Read related link on:

https://brainly.com/question/25530245

In C#
Please as soon as possible ​

Answers

Answer:

I'm not hundred percent sure but I believe it is going up by 100 the scale each number for the total quantity

Explanation:

Software which fulfills the requirement of a particular company is known as ________ software.​

Answers

Answer:

Customized software

Explanation:

Software which fulfills the requirement of a particular company is known as Customized software.​

Please mark as brainliest

How do you create speaker note changes that show the slides, related notes and company logo on each page

Answers

Answer:

The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.

write a Assembly Language program that copies only unsigned numbers from Array1 to another Array2. The Array1 has both signed and unsigned numbers.
Array1 = { -4,-1,-2,-1,0,1,2,3,4 }

Answers

Unsigned numbers do not have preceeding positive or negative signs. Hence, the program written in python 3 copies unsigned values in the given array to another array thus :

array1 = {-4,-1,-2,-1,0,1,2,3,4 }

#assigns a set of values to array 1

array2 = set()

#initialize an empty array

for ele in array1 :

#loop through the values in array1

if ele >= 0 :

#since the signed values are negative, checks for values greater than or equal to 0

array2.add(ele)

#add to array 2

print(array2)

A sample run of the program is attached.

Learn more : https://brainly.com/question/25706522

What is data?........​

Answers

Answer:

[tex]\huge\bold\green{Data\ :- }[/tex]

In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. ... Raw data is a term used to describe data in its most basic digital format.

Cloud computing brings the ability to scale both technologically and business-wise using a pay-as-you-go paradigm, allowing the users to concentrate more resources and time on their ideas (Edlund & Livenson, 2011). Please write a technical report about the opportunities and challenges on adoption of cloud computing in a real or fictional business case.

Answers

The opportunities that can be gotten from the adoption of cloud computing include:

More resources will be available for data protection.More data security.More employment opportunities.

The challenges that can be gotten from the adoption of cloud computing include:

Separation failure.Data transfer bottlenecks.Public management interface issues.

It should be noted that cloud computing means the delivery of different services through the internet. Such resources include applications and tools such as data storage, databases, servers, etc.

Cloud computing is vital as it helps in enhancing data security and job opportunities. The challenges include data transfer bottlenecks, separation failure, etc.

Read related link on:

https://brainly.com/question/25532807

GameStop’s best Black Friday deals: games, accessories, and more
11/25/2021 7:00 PM EST

Answers

Answer:

what is the question or are you just spreading news

Explanation:

Duolingo is a widely used foreign language app, with 300 million users in 2018. While there is a free version of the app, a premium Duolingo subscription eliminates advertisements during language practice and offers new quizzes with the ability to save lessons for offline use. a. Identify each hurdle for users of the free version of the app.

Answers

The hurdle for users of the free version of the app is the subscription fee paid for the premium version of the app.

A lot of people do not pay and cannot afford the premium fee. Some people are not very sure at the initial stage of using the app.

People sometimes want use app for free for some time.

A Subscription is simply known to be paid so as to access content from an app or service for a set out period of time. For example,  subscription to Netflix on a monthly basis.

Learn more from

https://brainly.com/question/15301858

what is the meaning of keyboard?​

Answers

A panel of keys that operate a computer or typewriter.

Explanation:

keyboard is an input device that feeds the computer will data

Jayda started a corporation that creates software products for clients. Which statement correctly reflects Jayda’s position in the corporation?

Answers

Answer:

She is the Founder and Owner of the corporation. She would also most likely be the CEO if she hasn't hired anyone else.

Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system

Answers

Answer:

he various advantages that can be associated with a password generator software are as follows: Any arbitrary long password can be generated using the complete set of symbols and not just a subset (usually the subset which is easier to type on a key

Explanation:

Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what types of applications and tools

Answers

Answer:

Q10. Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what applications and tools? Answer:----------- Assessment tools, firewall applications Q11. Refer to the PCI DSS Self-Assessment

Explanation:

Write a function that takes a word less than 25 characters long and returns the letter that word starts with (in capital letters)

Answers

The  function that takes a word less than 25 characters long and returns the letter that word starts with in capital letters is as follows:

def first_letter(x):

   if len(x) < 25:

       for i in x:

           return x[0].upper()

   else:

      return "Your text should be less than 25 characters"

print(first_letter("brainly"))

The code is written in python.

We declared a function named first_letter with the parameter x.

If the length of the word is less than 25 characters, we loop through it and return the first letter in uppercase.

Else if the word is not less than 25 character we ask the user to input a word less than 25 characters.

Finally, we call the function with a print statement.

The bolded portion of the code are python keywords.

read more: https://brainly.com/question/14603294?referrer=searchResults

4. Let's continue with Amber. Once she began, she realized that she was short on
time so she simply skipped her opening slides. Feeling a bit frazzled, Amber began
reading from slide 7. Why do you think that this would not be Amber's best strategy?

Answers

Answer:

because she could miss important information

Answer:

I think that this would not be the best strategy as she could miss vital information in the opening which may not be a lot but packs a punch within how your presentation is gonna go so the audience can gouge you out and your style.

Explanation:

Because

Q1. What is animation?

Answers

Answer:

The act of animating, or giving life or spirit.

Explanation:

HOPE IT HELPS............
Other Questions
which type of restraint equipment works well in controlling the head movement of a large dog? Please helpppp me step my step all the wayyy Carla and Diane Bought identical suit cases at a different stores. Carlas suitcase originally cost $75 and was discounted 15% Daniels suitcase originally cost 85$ and was on sale for 20% off the original price which suitcase was a the better deal? What do we know ? List important facts ? What do we want to find out ?? Solve ??? Show ur work? Explain starts ur Asnwer and give details ? And justify your steps ? Whales have what seem like remnants of a pelvis and femur, as shown here. An x-ray image of a whale tail. The pelvis and femur bones are shown. What are these structures an example of? transitional structures analogous structures vestigial structures adapted structures. in which mission did the us first land a man on the moon? HELP IM TIMED!!!!!!!!!!Question 2(Multiple Choice Worth 5 points)(MC)STORIES OF USEFUL INVENTIONS, excerptBy S. E. Forman1911THE MATCHThere never was a time when the world was without fire, but there was a time when men did not know how to kindle fire; and after they learned how to kindle one, it was a long, long time before they learned how to kindle one easily. In these days we can kindle a fire without any trouble, because we can easily get a match; but we must remember that the match is one of the most wonderful things in the world, and that it took men thousands of years to learn how to make one. Let us learn the history of this familiar little object, the match.Fire was first given to man by nature itself. When a forest is set on fire by cinders from a neighboring volcano, or when a tree is set ablaze by a thunderbolt, we may say that nature strikes a match. In the early history of the world, nature had to kindle all the fires, for man by his own effort was unable to produce a spark. The first method, then, of getting fire for use was to light sticks of wood at a flame kindled by natureby a volcano, perhaps, or by a stroke of lightning. These firebrands were carried to the home and used in kindling the fires there. The fire secured in this way was carefully guarded and was kept burning as long as possible. But the flame, however faithfully watched, would sometimes be extinguished. A sudden gust of wind or a sudden shower would put it out. Then a new firebrand would have to be secured, and this often meant a long journey and a deal of trouble.In 1827, John Walker, a druggist in a small English town, tipped a splint with sulphur, chlorate of potash, and sulphid of antimony, and rubbed it on sandpaper, and it burst into flame. The druggist had discovered the first friction-chemical match, the kind we use to-day. It is called friction-chemical because it is made by mixing certain chemicals together and rubbing them. Although Walker's match did not require the bottle of acid, nevertheless it was not a good one. It could be lighted only by hard rubbing, and it sputtered and threw fire in all directions. In a few years, however, phosphorus was substituted on the tip for antimony, and the change worked wonders. The match could now be lighted with very little rubbing, and it was no longer necessary to have sandpaper upon which to rub it. It would ignite when rubbed on any dry surface, and there was no longer any sputtering. This was the phosphorus match, the match with which we are so familiar.What is the main idea of this text?A. Firebrands were hard to keep lit.B. Nature provided fire to early humans.C. The history of the match is interesting.D. The match made life easier for humans. Please lmk, thank you. Which conclusion can be drawn form this excerpt about what Roosevelt hopes to accomplish Help me asappp!!!Which two activities are practical applications of magnetism?A. Separating steel nails from aluminum nailsB. Using the North Star to find which way is southC. Hammering steel nails into wooden boardsD. Finding which way is north with a compass what is the right answer Which air masses are formed in regions where long, clear nights allow for strong radiational cooling of the surface Please Answer This, with A, B, C, or D. and explain why it is so i can try and understand it. :D personality consist of Six apples and three oranges cost $3.36. Two apples and five oranges cost $3.04. Find the cost of one apple and the cost of an orange.Answer and step-by-step explanation pls!! What is the answer to this question? ".Measure these angles.a)b) as liquid or gases heat up, they ___________. Then as they___________ they fall, thus As liquid or gases heat up, they driving the motion the of convection.A: Fall, HeatB: Bubble, Overflow C: Create Heat, Burn D: Rise, CoolHelp please its okay if not Math Essay Solve for g. make sure to show your work (16 divided 4)(3x7)=g Differentiate Howdoes telophase II differ fromtelophase I? Which detail in the excerpt identifies it as fantasy? Bilbo makes a speech. Bilbo keeps a ring in his pocket. Bilbo has a magical ring. Bilbo never returns to Hobbiton. Glucose break down during cellular respiration. O True O False yes