The output is 21 because c is incremented by 3 until it surpasses 10 and the value of c is added to sum each time the loop runs.
I hope this helps!
list the steps to identify address or link window on a phone
Answer: this is how
Explanation: if you are on your phone and a link pops up if it is blue then it is able to be clicked but if it is not blue you can simply copy and paste the link into your web browser.
Introduction To Micro-Technology
Computer Science Assignment/Project
Course Title: Micro-Soft Excel
AD
BG
LE
Sal
Ady
175
30
59
88
117
146
175
204
233
262
291
320
ID
001
002
003
004
005
006
007
008
009
010
Namc
Sanita Cully
Saah Kpakar
Rudolph Gayflor
Francis Yoryor
Adolphus Naigar
Moses Gay gay
Philip Kuoper
Simon Momno
David Brown
John Yankar
CJ
Hr.
Work
178
180
145
160
185
150
182
186
190
120
DM
IIr.
Rate
8
6
S
4
7
9
10
12
14
15
EP
Reg.
Pay
300
350
325
250
275
340
345
FS GV
Over Gross
Time Pay
115 450
100 500
75 475
50 485
40 425
30 430
35 435
20 375
25 490
80 585
HY JC
Inc. SS
Tax Tax
10.20 20.04
11.75 21.00
12.30 21.06
15.05 22.00
22.08
10.00 23.00
15.75 23.10
17.22 24.00
20.05 24.12
20.00 26.00
17.05
181
141
161
186
151
183
187
191
121
200
TI
380
400
1. Direction: List the Relative, Absolute and Mixed Cell References of the following figures
in the above table:
i. 180
ii. 25
ili 175
iv. 183
V 6
2. State the meanings of the three types of cell references.
3. Assume that you were asked to find Average, Total Number of Students, Maximum,
Minimum and Product. What are the terms used in finding the above within the database?
4. Looking at the cell reference of Status will respect to commission; build a cell reference
stating that if sales which is B7, Less than 800, the rate is 2% below is 1% and state if it
is true or false.
5. Slate the steps of Deleting and Inserting Row.
Answer:
i need more
Explanation:
i need more
Freya has queued up some transactions to email to customers and others to print. What steps should she take to select all the sales transactions to email
Considering the situation described above, the steps Freya should take to select all the sales transactions to email is "Filter the sales transaction list using Delivery Method set to Email, and then click the checkbox to the left of the table header row."
The Process of Filter to batch print or emailThis process follows the steps below:
From the Delivery method dropdown menu, select Send later or Print later, then Apply.Select the checkboxes for the transactions to email or print. Select the checkbox at the top of the list to mark all.Hence, in this case, it is concluded that there is a process to follow QuickBooks to carry out Filter to batch print or email.
Learn more about QuickBooks use here: https://brainly.com/question/25592743
Since Ethernet and IP are both unreliable protocols how do we establish a reliable connection between two host computers using these two protocols?
To establish a reliable connection, we rely on additional protocols such as TCP (Transmission Control Protocol) over IP. TCP provides error-checking, retransmission of lost packets, and flow control mechanisms to ensure reliable data transmission between host computers over Ethernet and IP.
By incorporating TCP over IP, we add reliability features such as error detection, retransmission, and flow control to overcome the inherent unreliability of Ethernet and IP protocols, ensuring a reliable connection between the two host computers.
For more such question on TCP
https://brainly.com/question/14280351
#SPJ8
Kyla has composed a draft of her term paper using Microsoft Word. She now wants to revise the paper. Which tool can she use to store the
document with a different name and makes changes in the new document?
O A. Download
OB. Save As
O C. Save
OD. Export
A tool which Kyla can use to store the document with a different name and makes changes in the new document is: B. Save As.
What is a document?A document simply refers to a computer resource that is designed and developed to enable end users to easily store data as a single unit on a computer storage device.
Generally speaking, all computer documents can be identified by a title (name), date modified, size, and type such as the following;
SystemTextAudioImageVideoWhat is the Save as command?A Save as command can be defined as a type of command associated with the file menu of a software application or document and it causes a copy of the current file to be created and stored to a different location, file name, and/or file type.
In this context, we can reasonably infer and logically deduce that Kyla should save the document by using the "Save as" command.
Read more on Save as command here: https://brainly.com/question/16852455
#SPJ1
What is the difference between packaged and tailored software
Answer:
Packaged software is a collection of programs that perform similar functions or have similar features to meet various goals and objectives. e.g Microsoft Office While tailored software is software specially developed for some specific organisation or other user. e.g Amazon, Netflix.
which of the following digital communicatio media does not require a connection to the internet
Answer:
SMS
Explanation:
9. They are normally made of huge steel towers.
a. Transmission Lines
c. Distribution Substation
b. Transmission Substation
d. Distribution Lines
10. Voltage reduction is done through a attached through pole,
a. Transmission Transformer c. Distribution Substation . . b.DistributionTransfont
d. Disttid tihines
Answer:
9. a (Transmission Lines )
10.a (Transmission Transformer)
The thing that are normally made of huge steel towers is a. Transmission Lines, option A is correct.
Voltage reduction is done through a attached through pole, a. Transmission Transformer, option A is correct.
What is Voltage reduction?Voltage reduction has emerged as another tool utilities can use to lower demand, usually without the customer's knowledge. Yet, only the load's resistive part reacts to the drop in voltage by lowering aggregate demand.
Several electric utilities regularly use voltage reduction as a tool for energy conservation and as a way to lower system peak demand during emergency situations or, in some cases, during daily peak load periods.
Learn more about Voltage reduction at;
https://brainly.com/question/28164474
#SPJ3
Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.
Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.
Writting the code:Assume the variable s is a String
and index is an int
an if-else statement that assigns 100 to index
if the value of s would come between "mortgage" and "mortuary" in the dictionary
Otherwise, assign 0 to index
is
if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)
{
index = 100;
}
else
{
index = 0;
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
a. Draw the hierarchy chart and then plan the logic for a program needed by Hometown Bank. The program determines a monthly checking account fee. Input includes an account balance and the number of times the account was overdrawn. The output is the fee, which is 1 percent of the balance minus 5 dollars for each time the account was overdrawn. Use three modules. The main program declares global variables and calls housekeeping, detail, and end-of-job modules. The housekeeping module prompts for and accepts a balances. The detail module prompts for and accepts the number of overdrafts, computes the fee, and displays the result. The end-of-job module displays the message Thanks for using this program.
b. Revise the banking program so that it runs continuously for any number of accounts. The detail loop executes continuously while the balance entered is not negative; in addition to calculating the fee, it prompts the user for and gets the balance for the next account. The end-of-job module executes after a number less than 0 is entered for the account balance.
Hierarchy chart and pseudocode required
The Hierarchy Chart for the program needed by Hometown Bank is given below:
Main Program
|
-------------
| |
Housekeeping module Detail module
| |
Prompts for balance Computes fee
and accepts input and displays result
|
-----------------
| |
End-of-job module Detail loop (while balance >= 0)
|
Displays message "Thanks for using this program"
Pseudocode for Main Program:Declare global variables
Call Housekeeping module
Call Detail module
Call End-of-job module
Pseudocode for Housekeeping Module:
Prompt for balance
Accept input for balance
Pseudocode for Detail Module:
Detail loop:
while (balance >= 0)
Prompt for number of overdrafts
Accept input for number of overdrafts
Compute fee: 1 percent of balance - 5 dollars * number of overdrafts
Display result
Prompt for balance
Accept input for balance
Pseudocode for End-of-job Module:
Display message "Thanks for using this program"
Read more about pseudocode here:
https://brainly.com/question/24953880
#SPJ1
Write a method largestDivisor that takes an integer argument and returns the largest positive integer which is less than the argument that divides the argument. (For example, 10 is the largest divisor of 20.) You may assume that the argument is positive. If the argument is 1, return 0 to indicate that there is no such divisor.
Answer:
import java.io.*;
public class Main {
public static void main(String[] args) {
int target = 20;
System.out.println(largestDivisor(target));
}
public static int largestDivisor(int value) {
int max = Integer.MIN_VALUE;
for (int i = 1; i < value; i++) {
if (value % i == 0) {
if (i > max) {
max = i;
}
}
}
if (max != Integer.MIN_VALUE) {
return max;
} else {
return 0;
}
}
}
Explanation:
Initialize a variable with the number for which you want to find the largest divisor.
In my case, I used target to denote the value.
I then created a method called largestDivisor that takes that value and evaluates it.
Since we want to find the largest divisor and not the smallest divisor, I created a variable called "max". Remember, if you want to find the maximum of an evaluation, use the minimum. If you want to find the minimum use the maximum.
We are using integers, so I used the Integer.MIN_VALUE constant which initializes the max variable as -2^31 (for the case of the minimum, it would be 2^31).
I then iterated over the length of the value (i < value), where it checks two conditions:
First: checks if the value is divisible by the value in i.
Secondly: checks if the value in i (which by then denotes the value that the number is divisible by) is greater than the maximum.
If so, assign the max variable to i.
Then, I check if we were able to find if the value was divisible by our verification, by adding a conditional statement that checks if the max is different from the minimum. If it is, that means it was able to find a value that was able to divide the target number.
If not, return 0, as the problem states.
1. Why is data the most important asset an organization possesses? What other assets in the organization require protection?
2. What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms?
Here are the key points:
Why data is important:
- Data contains the intellectual capital and knowledge of an organization. It includes information about customers, business processes, operations, finances, etc. This data drives decision making and performance.
- Loss of data can significantly impact an organization's ability to operate effectively and achieve its goals. It can also damage reputation and trust.
Other assets to protect:
- Intellectual property like patents, trademarks, copyrights
- Physical assets like facilities, equipment, inventory
- Human capital like employees and their knowledge/skills
Types of malware:
- Viruses - Self-replicating programs that attach to other programs and spread when those programs are executed. They can corrupt or delete data.
- Worms - Self-replicating programs that spread over networks and consume network bandwidth. They do not require host programs to replicate.
- Trojan horses - Malware that masquerades as legitimate programs. They do not replicate like viruses/worms but once activated, can give an attacker access and control of the infected system.
Relationship between worms, viruses and Trojans:
- Worms and viruses differ in their replication techniques. Worms spread on their own while viruses need host programs.
- Trojan horses do not replicate like viruses or worms. They simply provide unauthorized access to a system. However, they are sometimes used to deliver viruses or worms upon execution.
mpressed files have the
A. .exe
C. .sit
Save Answer
file extension.
B. .arc
D. .zip
Answer: D. .zip
Explanation:
How is a cryptocurrency exchange different from a cryptocurrency
wallet?
A There is no difference since all wallets are hosted on exchanges.
B Exchanges are only used to make transactions, not to store cryptocurrency.
C Exchanges are offline whereas wallets are always connected to the internet.
D An exchange controls your keys but you control your cryptocurrency.
Exchanges are only used to make transactions, not to store cryptocurrency. Option B
What is Cryptocurrency exchanges versus cryptocurrency wallets?
Cryptocurrency exchanges are platforms that allow users to trade various cryptocurrencies for other digital assets or fiat currency. While some exchanges may offer temporary storage solutions, their primary function is to facilitate transactions between users.
On the other hand, cryptocurrency wallets are designed to store, send, and receive cryptocurrencies securely. Wallets can be hardware-based, software-based, or even paper-based, and they help users manage their private keys, which are essential for accessing and controlling their cryptocurrency holdings.
Find more exercises related to Cryptocurrency exchanges;
https://brainly.com/question/30071191
#SPJ1
Assume the declarations of Exercises 10 and 13. Write C++ statements that do the following. (2, 3, 6, 7, 8) Submit your answer to dropbox.
a. Store the following information in newEmployee:
b. In the array employees, initialize each performanceRating to 0.
c. Copy the information of the 20th component of the array employees into newEmployee.
d. Update the salary of the 50th employee in the array employees by adding 5735.87 to its previous value.
a. newEmployee.name = "Jane Doe";
newEmployee.title = "Accountant";
newEmployee.salary = 4500.75;
b. for (int i = 0; i < maxEmployees; i++)
employees[i].performanceRating = 0;
c. newEmployee = employees[19];
d. employees[49].salary += 5735.87;
What is array ?
An array is a data structure that stores a collection of items of the same type. Each item in an array is identified by an index number. Arrays are commonly used in programming for storing lists of related items, such as the contents of a shopping cart or the results of a database query. Arrays in Python are powerful data structures that can store and manipulate large amounts of data with relative ease.
To know more about array
https://brainly.com/question/13107940
#SPJ1
Which of the following sorting algorithms could be implemented on a doubly-linked list WITHOUT making the asymptotic worst-case complexity even worse? You must perform the sorting in-place, you CANNOT just copy to an array and then use the normal algorithm
I. Bubble sort
Il. Selection sort
IlI. Insertion sort
IV. Quicksort
V. Heapsort
A. I, II, and IlIl only
B. IV and V only
C. I and II only
D. Iand Il only
E. All except V
Answer:
C. I and II only
Explanation:
Doubly-linked list is used for sorting algorithms. To sort doubly-linked lists first sort the nodes current and nodes index then compare the data of current and index node. Bubble sort and Selection sort can be used for algorithm sorting without asymptotic complexity. Bubble sort can be created when adjacent nodes are in ascending order.
The use of World Wide Web technology and web design that aims to facilitate creativity, information sharing, and, most notably, collaboration among users. These concepts have led to the development and evolution of web-based communities and _____________ services, such as social-networking sites, wikis, blogs and _________.
Answer:
1. Hosted services
2. Folksonomies
Explanation:
Prior to the invention of Web 2.0, Web 1.0 was in existence. Web 2.0 is a new age technology and system of communication that allows its users to create content on their own and interact more freely with each other. Before this time, user participation in topics posted online was limited. But today web 2.0 enables such participation with the invention of blogs, and social media sites.
Creativity is seen in the fact that people are more prone to express themselves through writing, animations, videos, and other forms of communication. Information on new and trending stories are shared through these channels. Ideas are also exchanged by participants.
daily spamton day 1: small spamton
Answer:
small spamton
Explanation:
small spamton
Answer:
Small Spamton very precious
Explanation:
Is it possible to compare 2 pre-packaged versions in cpi?
Yes, it is possible to compare two pre-packaged versions in the Consumer Price Index (CPI), but it can be challenging due to certain limitations of the index.
The CPI is designed to measure changes in the overall price level of a basket of goods and services consumed by households.
It focuses on broad categories and representative items within those categories, rather than specific versions of products.
When it comes to pre-packaged versions of products, there can be variations in size, quality, branding, and other attributes that may affect their prices differently.
These variations make direct comparisons complex within the framework of the CPI.
To compare two specific pre-packaged versions within the CPI, it would require detailed data on their specific characteristics and how they align with the representative item in the CPI basket.
This level of granularity may not be readily available in the public domain or within the CPI methodology.
For more questions on Consumer Price Index
https://brainly.com/question/8416975
#SPJ8
: "I have a customer who is very taciturn."
The client typically communicates in a reserved or silent manner
B. He won't speak with you.
Why are some customers taciturn?People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.
The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.
Learn more about taciturn people here:
https://brainly.com/question/30094511
#SPJ1
states that processing power for computers would double every two years
Answer:
Moore's Law
Explanation:
Rectangular box formed when each column meet
Answer:
If this is a true or false I guess my answer is true?
Explanation:
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
All of the following is true about MS Online/OneDrive apps,
EXCEPT (NOT):
Select one:
O a. Cloud-based apps
Ob.
c.
C.
d.
Watered down version of MS Word, MS Excel, and
MS PowerPoint
Cost the end user money to use
Allows user to keep files on OneDrive or download
to local drive
All of the following is true about MS Online/OneDrive apps except (not): C. cost the end user money to use.
What is OneDrive?OneDrive can be defined as a cloud-based storage service and software application synchronization service that is designed and developed by Microsoft, and it was launched by Microsoft on the 7th of August, 2007.
Additionally, OneDrive typically offers to all of its registered customers (Microsoft users) a free amount of storage space (at least 5 gigabytes) that can be used to store various types of documents, share files, and synchronize files across different mobile platforms and other computer-based platforms such as:
WindowsMacOSX-box 360In conclusion, both MS Online and OneDrive applications are largely free and as such, they do not cost an end user money to use them.
Read more on OneDrive here: https://brainly.com/question/16033855
#SPJ1
Referring to narrative section 6.4.1.1. "Orders Database" in your course's case narrative you will:
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entit
Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIC
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of
your last name.
Student Last Name
A-E
F-J
K-O
P-T
U-Z
1.2. Your ERD must include the following items:
All entities must be shown with their appropriate attributes and attribute values (variable type and
length where applicable)
All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
intersection tables
●
.
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
.
The following is a description of the entities and relationships in the ERD -
CustomersProductOrdersOrder Details How is this so?Customers is a standard entity that stores information about customers, such as their name, address,and phone number.Products is a standard entity that stores information about products, such as their name, description, and price.Orders is an intersection entity that stores information about orders, such as the customer who placed the order,the products that were ordered, andthe quantity of each product that was ordered.Order Details is an intersection entity that stores information about the details of each order,such as the order date, the shipping address, and the payment method.The relationships between the entities are as follows -
A Customer can place Orders.An Order can contain Products.A Product can be included inOrders.The primary keys and foreign keys are as follows -
The primary key for Customers is the Customer ID.The primary key for Products is the Product ID.The primary key for Orders is the Order ID.The foreign key for Orders is the Customer ID.The foreign key for Orders is theProduct ID.The foreign key for Order Details is the Order ID.The foreign key for Order Details is the Product IDLearn more about ERD at:
https://brainly.com/question/30391958
#SPJ1
Please help its due on May 7th and the code has to be in python.
We can use a list to store the sensor objects, and we can sort the list by room number, room description, or sensor number. However, accessing a sensor by its room number would require iterating through the entire list.
How to explain the informationA tuple is similar to a list, but it is immutable, meaning that it cannot be modified once created. We could use a tuple to store each sensor object, but sorting the tuple would require creating a new sorted tuple. Accessing a sensor by its room number would also require iterating through the entire tuple.
A set is an unordered collection of unique items, and it can be modified. We could use a set to store the sensor objects, but sorting the set is not possible. Accessing a sensor by its room number would also require iterating through the entire set.
Learn more about sensor on
https://brainly.com/question/29569820
#SPJ1
MULTI-SELECT
Which of the following is a current development in networking?
need for thicker cables
FDDI
need for better data storage
Ethernet
Answer:
Need for better data storage
Explanation:
Just got is right on edg
Answer:
C. needs better data storage
Explanation:
explain why it is important for you to understand and explain the basic internal and external parts of a computer in the work place setting
Answer:
Having a good understanding of the terminology and jargon used with computers helps you be more efficient with other technology.
Explanation:
Anyone connected to the Internet has a better understanding of using the Internet and connecting other devices.
Consider the following method:
public void doSomething(int n) {
if (n > 0) {
doSomething(n/2);
StdOut.print(n);
doSomething(n/2); }
}
How many recursive calls are made by doSomething(n)?
Answer:
two recursive calls are made
Explanation:
In this piece of code two recursive calls are made by doSomething(n). This is assuming that the input (n) is greater than 0. Otherwise the function will simply end because it will completely skip over the IF statement which holds the entirety of the functions code. A recursive call is represented as the name of the function/method itself within itself. Therefore, everytime the code states doSomething(n) or in this case doSomething(n/2) it is calling itself.
Your friend Alicia says to you, “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I don’t think I’m going to do that.” How would you respond to Alicia? Explain.
Since my friend said “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I will respond to Alicia that it is very easy that it does not have to be hard and there are a lot of resume template that are online that can help her to create a task free resume.
What is a resume builder?A resume builder is seen as a form of online app or kind of software that helps to provides a lot of people with interactive forms as well as templates for creating a resume quickly and very easily.
There is the use of Zety Resume Maker as an example that helps to offers tips as well as suggestions to help you make each resume section fast.
Note that the Resume Builder often helps to formats your documents in an automatic way every time you make any change.
Learn more about resume template from
https://brainly.com/question/14218463
#SPJ1