broadband connections After debuting in 1974, Xerox's Alto, a computer with a graphical user interface (GUI) navigated with a(n) ________, never caught on with the public. Later, Apple Macintosh computers' implementation of the (GUI) revolutionized human-computer interaction.

Answers

Answer 1

After debuting in 1974, Xerox's Alto, a computer with a graphical user interface (GUI) navigated with a mouse, never caught on with the public.

The Alto was a groundbreaking machine that introduced many features we now take for granted, such as windows, icons, menus, and the use of a mouse for input.

However, despite its innovative design and capabilities, the Alto was primarily a research prototype and was not widely marketed or sold to the general public.

It was not until the release of the Apple Macintosh in 1984 that the graphical user interface revolutionized human-computer interaction and gained mainstream popularity.

The Macintosh brought the GUI concept to the masses with its intuitive and user-friendly interface.

Steve Jobs and his team at Apple took inspiration from the Xerox Alto and other Xerox PARC (Palo Alto Research Center) innovations, but they refined and packaged the concept into a consumer-friendly product.

The Macintosh featured a built-in screen, mouse, and the iconic desktop metaphor that allowed users to interact with graphical elements on the screen using familiar metaphors like folders, files, and trash cans.

This approach made computing more accessible to non-technical users and revolutionized the way people interacted with computers.

Apple's marketing efforts, including the famous "1984" Super Bowl commercial, helped generate significant interest and awareness for the Macintosh.

The combination of a user-friendly interface, sleek design, and innovative software like MacPaint and MacWrite made the Macintosh a success and set the stage for future GUI-based operating systems.

For more questions on mouse

https://brainly.com/question/29797102

#SPJ11


Related Questions

What would be considered a form of removable, non-mechanical, non-volatile memory? a) RAM. b) ROM. c) Flash memory. d) Magnetic storage.

Answers

Flash memory is considered a form of removable, non-mechanical, non-volatile memory.

Flash memory is a type of solid-state storage technology that is used to store and transfer data electronically. It is non-volatile, meaning that it retains its data even when power is turned off, and it is non-mechanical, meaning that it does not have any moving parts. Flash memory is also considered removable because it can be removed from a device and used in a different device.

In contrast, RAM (Random Access Memory) is a type of volatile memory that is used for temporary storage of data while a computer is running. ROM (Read-Only Memory) is a type of non-volatile memory that is used to store permanent data and instructions that cannot be changed. Magnetic storage, such as hard disk drives or magnetic tapes, are non-volatile and can be removed from a device, but they are not considered non-mechanical as they have moving parts.

Learn more about volatile here:

https://brainly.com/question/14738775

#SPJ11

Which computer program offers a comprehensive collection of tools for creating digital art by using a variety of shapes, lines, and letters which can be easily measured and formatted?​

Answers

Answer:

LibreOffice Draw

Explanation:

Answer:

A

Explanation:

All of the following are ways to paste a copied file except
a. pressing Ctrl + V.
b. right-clicking the file list and clicking Paste in the shortcut menu.
c. pressing Ctrl + P.
d. clicking the Paste button in the Clipboard group.

Answers

All of the approaches listed below are employed for moving text in a document in Word 2016 depending on the context of the inquiry.

A word document's importance can be appreciated by the fact that it allows the user to type and save documents in accordance with their needs. It connects with other MS Office apps and is very accessible to the user. In Word 2016, you must either right-click on the text and choose "Cut," select the text, move the insertion point to the desired location, and then press Ctrl+V to move the text. Alternatively, you can select the text, press Ctrl+C, move the insertion point to the desired location, and then press Ctrl+V. As a result, Word 2016 uses all of the methods listed below to move text around in documents. D is the appropriate response to this question.

Learn more about Word 2016 here:

https://brainly.com/question/13338703

#SPJ4

What type of error occurred?

20 / 0


SyntaxError

ValueError

TypeError

ZeroDivisionError

Answers

Answer:

"Option 4: ZeroDivisionError" is the correct answer

Explanation:

When we try to divide any number by zero in mathematics, the answer is infinity. Similarly, if we try to divide a number by zero in Python, the Python interpreter throws a "ZeroDivisionError" as the denominator or divisor cannot be a zero.

Hence,

"Option 4: ZeroDivisionError" is the correct answer

Answer: ZeroDivisionError

Explanation: got it right on edgen

apply the (1) fifo, (2) lru, and (3) optimal (opt) replacement algorithms for the following page-reference strings:

Answers

This is the page reference strings and the corresponding page replacement algorithms. Page-reference string: 4, 3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5. FIFO, 4   -   -   -  |4   -   -   -  |4   -   -   -  |4   -   -   -  |1   -   -   -  |1   5  -   -  |1   5  3  -  |1   5  3  2  |1  4  3  2   |5  4  3  2   |1  4  3  2   |5  4  3  2.

For the first four page references, the FIFO algorithm simply puts each page in the next available frame. When page 1 arrives, it replaces page 4 because that is the oldest page. The same thing happens for page 5. Then, when page 2 arrives, it replaces page 1 because that is the oldest page. Finally, when page 5 arrives again, it replaces page 3 because that is the oldest page. LRU, 4   -   -   -  |4   3   -   -  |4   3   2   -  |1   3   2   -  |1   4   2   -  |4   5   2   -  |4   5   3   -  |1   5   3   2  |1  4  3  2   |1  4  5  2   |1  5  4  2   |1  5  4  3. For the first four page references, the LRU algorithm simply puts each page in the next available frame. When page 1 arrives, it replaces page 4 because that is the least recently used page.

The same thing happens for page 5. Then, when page 2 arrives, it replaces page 3 because that is the least recently used page. Finally, when page 5 arrives again, it replaces page 4 because that is the least recently used page. OPT, 4   -   -   -  |4   3   -   -  |4   3   2   -  |1   3   2   -  |1   4   2   -  |4   5   2   -  |4   5   3   -  |1   5   3   2  |1  4  3  2   |5  4  3  2   |1  5  3  2   |1  5  4  3. The OPT algorithm looks ahead to see which page will be used farthest into the future and chooses the page that won't be used for the longest time. For the first four page references, the OPT algorithm simply puts each page in the next available frame. When page 1 arrives, it looks ahead and sees that page 4 will be used next, so it replaces page 4. The same thing happens for page 5. Then, when page 2 arrives, it looks ahead and sees that pages 3 and 4 will be used next, so it replaces page 3. Finally, when page 5 arrives again, it looks ahead and sees that pages 4 and 2 will be used next, so it replaces page 4.

To know more about algorithms visit:

https://brainly.com/question/31936515

#SPJ11

windows 11 has 3 accessibility categories, what are they?

Answers

Windows 11 has 3 accessibility categories Vision., Hearing., Mobility disabilities easier to find and use, making it one of the most accessible operating systems available.

Windows 11 makes accessibility tools for people with vision, hearing, and mobility disabilities easier to find and use, making it one of the most accessible operating systems available. Although PC hardware is nice, it is of little use without cutting-edge software.

What's coming to Windows 11 accessibility?

Voice access, which lets users control most of the operating system with their voice, is another new feature in the Windows 11 2022 Update. Without having to move your hands, you can open and close apps, navigate text, click things, press keyboard keys, and more with this.

What exactly are access permissions?

Android Accessibility Services was made to help app developers make their apps more accessible to people with disabilities and to help them overcome the obstacles they face when using smartphones. To take advantage of these advantages, users must enable "Accessibility Permissions" when downloading these apps.

Learn more about windows 11 :

brainly.com/question/30613269

#SPJ4

you begin troubleshooting a computer that does not start. the fan in the power supply does not turn on when the pc is plugged into a known good ac outlet. what would you do? power supply

Answers

Answer: The power supply may be eco-friendly and not turn the fan on until the cpu or gpu is under load requiring more power from the power supply. To turn the fan On I recommend running a benchmark to put the computer under load. If that doesn't turn the fan on check the fan settings in your motherboard bios.

Explanation:

What’s 9- 4 x y + 44 - -8
and what is 77 - 1.3 + -22

Answers

Answer:

1. -4y + 61

2. 53.7

Discuss the evolution of file system data processing and how it is helpful to understanding of the data access limitations that databases attempt to over come

Answers

Answer:

in times before the use of computers, technologist invented computers to function on disk operating systems, each computer was built to run a single, proprietary application, which had complete and exclusive control of the entire machine. the  introduction and use of computer systems that can simply run more than one application required a mechanism to ensure that applications did not write over each other's data. developers of Application addressed this problem by adopting a single standard for distinguishing disk sectors in use from those that were free by marking them accordingly.With the introduction of a file system, applications do not have any business with the physical storage medium

The evolution of the file system gave  a single level of indirection between applications and the disk the file systems originated out of the need for multiple applications to share the same storage medium. the evolution has lead to the ckean removal of data redundancy, Ease of maintenance of database,Reduced storage costs,increase in Data integrity and privacy.

Explanation:

Q. Identify FOUR (4) differences between the agile approach and
the process maturity approach to software process improvement.?

Answers

The agile approach and the process maturity approach to software process improvement differ in several key aspects. The four main differences include their focus on flexibility vs. compliance, iterative vs. linear progression, team vs. organizational level, and adaptability vs. standardization.

Focus: The agile approach emphasizes flexibility and adaptability, aiming to respond quickly to changing requirements and deliver frequent increments of working software. In contrast, the process maturity approach focuses on compliance with established standards and best practices, aiming to achieve a predictable and controlled software development process.Progression: Agile follows an iterative and incremental approach, where software is developed and delivered in short iterations called sprints. Each sprint results in a potentially shippable product increment. On the other hand, the process maturity approach follows a more linear progression, where organizations aim to reach higher levels of process maturity by adhering to predefined process improvement models, such as the Capability Maturity Model Integration (CMMI).Level of Application: Agile primarily operates at the team level, with cross-functional teams working collaboratively and self-organizing to deliver value. It encourages close collaboration between developers, testers, and other stakeholders. In contrast, the process maturity approach focuses on organizational-level improvements, with a broader scope that includes standardizing processes across different teams and departments.Adaptability vs. Standardization: Agile encourages teams to adapt their processes based on project-specific needs and feedback. It values flexibility and allows for experimentation and continuous improvement. Conversely, the process maturity approach aims for standardization and consistency across the organization. It focuses on defining and following prescribed processes, often driven by external process models or frameworks.

In summary, the agile approach prioritizes flexibility, iterative development, team-level collaboration, and adaptability. The process maturity approach, on the other hand, emphasizes compliance, linear progression, organizational-level improvements, and standardization. Each approach has its strengths and suitability depending on the context and goals of the software development organization.

Learn more about Capability Maturity Model Integration here:

https://brainly.com/question/28999598

#SPJ11


What explains the discrepancy between the number of bytes you can
actually store on a storage device and what the advertisers say you can
store on the that device?
Anyone knows this ? Please help

Answers

Answer:

This is because, the advertisers report the storage space in decimal while the computer reads the storage space in binary.

Explanation:

The advertisers report the storage space in decimal or base 10 because humans count in decimal, whereas the computer reports the storage space in binary or base 2.

Since the computer storage is in bytes and 8 bits equal 1 byte, It is easier to write a storage space of 1 kB as 1000 B but it is actually supposed to be 1024 B(2¹⁰). So, there is a discrepancy of 1024 B - 1000 B = 24 B.

As  we go higher, the discrepancy increases. For example, 1 MB is advertised as 1000 kB = 1000000 B but is actually supposed to be 1024 kB = 1024 × 1024 B = 1048576 B. So, there is a discrepancy of 1048576 B - 1000000 B = 48576 B.

So, the actual number of bytes on the storage device is actually less than that reported due to the different number systems in which they are reported in. This discrepancy is less in memory cards or flash drives though in which the stated value of storage capacity might be the actual storage size.

Note that the base 10 or decimal system was chosen by advertiser since this is what consumers understand.

You are the IT Director for Stormwind training studios. Your company has decided to start using Microsoft Intune for all of their software deployments. You want to set up a notification system so that you see all alerts and your IT Manager only gets notified for Critical alerts. How do you accomplish this

Answers

Answer:

Well, if the IT Manager gets only critical alerts on a phone, then the IT Manager has to go to settings and make sure to have all alerts on.  

Explanation:

The IT Manager, probably has his notifications, critical alerts, on only. So the IT Manager should have his notifications to ALL. Where he will be able to see all of the alerts.

Jim lost his job due to the replacement of robots in a manufacturing factory. As an ethical practice, what should the manufacturing factory do?

As an ethical practice, the manufacturing factory should provide alternative ____
to Jim.

Answers

An alternative
“position”

how to arrange the following in descending order pb, kb, b, byte, tb, gb​

Answers

Answer:

pb, tb, gb, kb, byte, b

Explanation:

trust me bro

What is the default layout position for images added to a Word 2016 document? square, where the text wraps around an image around a square border through, where the text wraps around an image with irregular borders in front of the text, where the image is placed over the text in-line, with the text where the text stays with the image

Answers

Answer: in- line, with the text where the text stays with the image

Explanation:

Answer:

D: in-line, with the text where the text stays with the image

Explanation:

Just did it on edge :D hope this helps

The line represents a visible line that represents features that can be seen
in the current view.
Continuous Thick Line
Pictorial Sketch Types
Aligned Section View
Chain Thin Line

Answers

We use the Continuous Thick Line representation which uses in the line.

The continuous thick line represents a sample that depicts features seen in the current view, which can be used to represent apparent contours and boundaries.

In this, the scribbled lines are used to generate contours and edges that are not visible from the outside.This line type is utilized in site plans for apparent outlines, general detailing, existing structures, and landscaping.

Therefore, the answer is "continuous thick line".

Learn more about the line here:

brainly.com/question/26196994

The line represents a visible line that represents features that can be seenin the current view.Continuous

As per the statement, the line represents the visible part of the features that can be seen in the current views as the line is a continuous thick line.  Thus the option A is correct.

Which line represents a visible feature of current view.?

The visible lines are those that make up most of the visible part of the features and are noted for the summary lines and refer to the specific views.

A continuous line can be easily seen and is visible for very far and hence this line is a sorrowing the side of the matter. It can be used to outline the object and is has a medium weight.  Hence the visibility of the line is lone factor of the continuality and thickness.

Find out more information about the line represented.

brainly.com/question/12242745.

What are examples of educational goals? Check all that apply.

A. Cayden wants to save up for a vacation.

B. Alondra wants to graduate from high school.

C. Jaxon wants to be accepted for an apprenticeship.

D. Zane wants to earn a college degree.

E. Natalia wants to pass an exam at the end of her advanced biology class.

F. Rylee wants to get a raise at her job.

G. Ciara wants to run a marathon.

Answers

Answer:

The answers include,

B. Alondra wants to graduate from high school.

C. Jaxon wants to be accepted for an apprenticeship.

D. Zane wants to earn a college degree.

E. Natalia wants to pass an exam at the end of her advanced biology class.

Explanation:

All of the following have to do with your education and they are all something that you wish to achieve in the future!

(03 MC)Why is it important to set goals and share them with others?

A) Sharing goals makes you feel like you are better than the other person.
B) If you share your goals, you are more likely to achieve them.
C) Sharing goals is something you should do in order to get a good grade.
D) If you share your goals with others, people will like you more.

ANSWER: B) If you share your goals, you are more likely to achieve them.

Answers

Answer:

answer is b

Explanation:

hope it was helpful

Answer: B, If you share your goals, you are more likely to achieve them.

We know sharing goals can be helpful to everyone, one of the main reasons people share goals is so that they can get the motivation to carry on doing their work. For example, If you and a friend had a goal of going to the gym 3 times a week you would feel responsible if you told your friend that you wouldn't be able to complete the goal this week. Which would make you feel bad for your friend who wants to complete the goal. It also helps with motivation if your friend doesn't want to go then you encourage them and make sure they remember the goal.

Answer choice A, would not make much sense since you are doing the goal together, and + this is a school question and they wouldn't encourage ego. Answer choice C, could be a result of sharing goals with others but doesn't suit the question as much as B. Answer choice D, does apply to the question at all people could end up liking you more but it could also end up the other way around.

Our answer is without a doubt B

Enjoy!

19. List three things you can do to protect your online reputation:

Answers

Answer:

- be aware of the online community
- don’t cyber bully
- always be friendly

Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters. Which typeface should he use?
A.
old style
B.
geometric sans-serifs
C.
transitional and modern
D.
humanist sans
E.
slab serifs

Answers

The type of typeface that Derek should use is option D: humanist sans.

What is an typeface?

A typeface is known to be a kind of a design tool that is used for lettering and it is one that is made up of variations in regards to its size, weight (e.g. bold), slope and others.

What defines a humanist font?

The “Humanist” or “Old Style” is known to be a kind of a historical classification that is used for any typefaces that have its inspiration from Roman lettering and also that of the Carolingian minuscule as it often  include forms that looks like the stroke of a pen.

Since Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters, The type of typeface that Derek should use is option D: humanist sans.

Learn more about typeface from

https://brainly.com/question/11216613

#SPJ1

approximately how much bandwidth does a unicast audio flow use? (4-ch, 24-bit, 48khz, 1msec latency).

Answers

Approximately 6Mbps bandwidth a Unicast audio flow uses, (with the provided information i.e. 4-ch, 24-bit, 48khz, 1 msec latency).

Unicast flows are point-to-point flows from a single transmitter to a single receiver. Unicast flows typically contain up to 4 channels of audio or 1 channel of video. Each channel of Unicast flows can vary between 4 and 64 according to the latency setting of the device. Bandwidth usage of a typical Unicast audio flow is about 6 Mbps.

Unicast audio flow is a better option for over-the-top (OTT) delivery to public viewers it is because it provides a more personalized experience.

You can leran more about bandwidth at

https://brainly.com/question/12908568

#SPJ4

Fault tolerance refers to

how a network fails.

how well a network recovers after a failure.

mirror operations.

servers.

Answers

Answer:

servers

Explanation:

because it good for servers

Answer: How well a network recovers after a failure.

Explanation:

a) suppose you see multiple connections on your workstation in state fin wait 1. what is likely going on? whose fault is it?

Answers

Note that suppose you see multiple connections on your workstation in state FIN_WAIT, this shows signals that the distant computer has terminated the connection with the workstation's local program, but the local application has not yet acknowledged it.

What is the rationale for the above answer?

When FIN WAIT-1 is displayed for many TCP connections on a workstation, it means that the distant computer has terminated the connection with the local program running on the workstation but the local application has not yet recognized it. It denotes the places at which the first phase of an active close four-way link request and response was created.

While the FIN WAIT-2 status indicates that the program on the local workstation has ended the connection, the client-distant system has yet to accept the termination response.

Displaying the FIN-WAIT-1 status for many TCP connections on a workstation indicates that the issue is occurring on the local system or workstation side since it is the one that is not accepting the distant system's termination request.

Learn more about Multiple Connections:
https://brainly.com/question/5617051
#SPJ1

1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your organization’s IT infrastructure?

Answers

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

Write a recursive function called digit_count() that takes a positive integer as a parameter and returns the number of digits in the integer. Hint: The number of digits increases by 1 whenever the input number is divided by 10.

Ex: If the input is:

345
the function digit_count() returns and the program outputs:

3

Answers

Using the computational knowledge in python it is possible to write a code that Write a recursive function called digit_count()

What is a function in Python?

In Python, a function is a sequence of commands that performs some task and that has a name. Its main purpose is to help us organize programs into chunks that correspond to how we envision a solution to the problem.

Writting the code in python:

def countDigits(n):

  if n< 10:

     return 1

  else:

      return 1 + countDigits(n / 10)

See more about python at brainly.com/question/13437928

#SPJ1

Write a recursive function called digit_count() that takes a positive integer as a parameter and returns

how to unlock iphone without passcode or face id with calculator?

Answers

Based on troubleshooting techniques, one of the major ways to unlock an iPhone without a passcode or face id with a calculator is to go to Airplane mode and use a calculator.

What is unlocking the device?

Unlocking of a device is a term that is used to describe the process of unlocking a device that allows the users to move their device from one network to another compatible network.

Generally, it is believed that the unlocking process varies by device and by the provider.

In the case of the iPhone to unlock without a passcode or password, a user needs to follow these steps.

Steps to follow to unlock your iPhone deviceSwipe down on your control panel while covering your camera Face ID. If you are on an older iPhone 5, iPhone 6, iPhone 7, or iPhone 8 then swipe up.Turn off your, Wi-Fi, Data, and Bluetooth. Turn on Aeroplane mode.Enter into your calculator, and type in a decimal place.Turn your phone sideways to enter scientific mode, press “IN”, then Press “Rand”Swipe up on your device and it’s unlocked

Hence, in this case, it is concluded that there is a typical process to follow to unlock your iPhone without a passcode.

Learn more about unlocking a device here: https://brainly.com/question/28022467

#SPJ1

Who here has an old (preferably 80s) Toyota Celica i just bought mine and want to know how you guys like yours because mine is fine ash ;)

Answers

Answer:

Explanation:

The 1980 Toyota Celica is a great car, it was my first car and I loved it. It has many luxury features that you don't see much in cars of that year. It is also extremely reliable and can take lots of use before beginning to give problems. I used to use it to get to and from school on a daily basis and it never once left me stranded. It includes power steering, cruise control, AC, etc. Not much more you can ask for in a car, it is also a very beautiful looking car, especially a well taken care of one. Enjoy your car.

PLS, PLS, PLS, HELP! I RLY NEED THIS. PLSSSSS

A guest has requested to host a special event in the main dining room, and you've been asked to help with the planning. You need to order helium balloons from your local Party Center, but you are trying to keep costs down. Each balloon costs $1.00 but if you buy more you get a great discount. Here is the cost for balloons at the Party Center:

Up to 50 balloons - $1.00 each
Over 50 and up to 100 - $0.50 each additional balloon
Over 100 - $0.25 each additional balloon
For example, if you buy 150 balloons, it will cost you:
First 50 = $50
Next 50 = $25
Next 50 = $12.50
--------------------------
Total 150 balloons = $87.50

Write a program that prompts for the number of balloons and then calculate and display the total cost for the balloons for your party.

Answers

It's pretty hard but I think it is 1,350

You are the administrator of what will become a large Windows Server network that uses the TCP/IP protocol. Currently, the network consists of three Windows Servers and 50 Windows workstations all on the same subnet.
During the last meetingyou had with the CIO, it was determined that company growth would mean adding workstations and printers to the existing network for a total of 235 devices. The existing hardware will be used on the network as the new devices are added. How should you assign IP addresses to the workstations on the network to minimize administration?

Answers

The best way to assign IP addresses to workstations on a network to minimize administration is to use DHCP (Dynamic Host Configuration Protocol).

DHCP is a protocol that assigns dynamic IP addresses to devices on a network. It reduces network management tasks and errors caused by manual IP address configuration, such as assigning the same IP address to multiple devices, by automating the process.

DHCP can also be used to assign other configuration parameters, such as subnet mask and default gateway, to devices on a network. It ensures that new devices added to the network receive valid IP addresses without manual configuration. DHCP offers several benefits, including:It reduces network administration tasks and errors, such as IP address conflicts.

It automatically assigns IP addresses to new devices on the network. It allows centralized IP address management. It simplifies network management. It saves time and resources. It supports IP address reservation for specific devices.

Know more about the IP addresses

https://brainly.com/question/14219853

#SPJ11

The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * symbol represents multiplication. Fix the errors so that the code works correctly: input ("Enter a number: ") print (num * 8)

Answers

Answer:

The correct program is as follows:

num = float(input ("Enter a number: "))

print(num * 8)

Explanation:

Notice the difference between (1)

num = float(input ("Enter a number: "))

print (num * 8)

and (2)

input ("Enter a number: ")

print(num * 8)

Program 1 is correct because:

- On line 1, it takes user input in numeric form, unlike (2) which takes it input as string

- On line 2, the program multiplies the user input by 8 and prints it out

Other Questions
How do we check if a circle, c, overlaps with a group, g? a. Loop over the shapes in g and check temporaryShapeName.hitsShape(c) for each one. b. Check g.hitsShape(c) c. Check temporaryShapeName.hitsShape(c) d. Loop over the shapes in c and check temporaryShapeName.hitsShape(g) for each one. John consumes two goods, X and Y. The total utility function is as follows: The price of X is $9, and the price of Y is $12. a. Write an expression for John's MRS. b. What is the optimal mix between X and Y in John's market basket 1. A metal block weighs 500 gf in air and 460 gf when completely immersed in water. Calculate the upthrust on the block -3(-7-x)=(x+2) I really need help Why should we care about public opinion?What is public opinion and how do we measure it? Name two typesof public opinion and explain the distinction. What are thelimitations of public opinion resea The posted speed limit is 45 miles per hour.Select all of the rates that are faster than 45 miles per hour.A. 45 km per hourB. 64.1 km per hourC. 86.4 km per hourD. 91 km per hourchoose all that apply At a pottery shop, there are 7 vases for every 3 planters.Which of the following shows the ratio of planters to vases at the shop? . 3. Which of these is true of pysuasive speeches? (1 point) O They ask for little audience commitment. They place the speaker in the role of a teacher. They have few appeals to feelings. They place the audience in a role of agents of change. Ben's living room is a rectangle measuring 11 yards by 204 inches. By how many feet does feet does the length of the room exceed the width if a copyright owner can prove that he has legal ownership of the work and that an infringer copied the work without permission, what type of infringement has occurred? What is the central idea of this passage? human beings are creative when they get into trouble. because of one mans actions, whales never eat human beings. whales always have a sore throat because of a grating. human beings should stay away from whales to avoid being swallowed. The price elasticity of demand indicates: the extent to which consumers respond to a change in price. B the extent to which a demand curve shifts as income changes. the slope of the demand curve. D how far business executives can stretch their fixed costs. O Question 3 Events A and B are mutually exclusive if OA and B can occur simultaneously A and B cannot occur simultaneously O occurrence of A affects probability of B O occurrence of A does not affect probability of B O None of the above during drill-down, you go from high-level summary data to detailed levels of data. T/F? the income statement for caladium reports net sales of $91,608 million and cost of goods sold of $69,128 million. an examination of balance sheet amounts indicates accounts receivable increased $1,718 million, inventory increased $868 million, and accounts payable to suppliers decreased $1,952 million.required:using the direct method, calculate (1) cash received from customers and (2) cash paid to suppliers I need help I dont really understand PLEASE HURRY I RLLY NEED THIS............All that day Mowgli sat in the cave tending his fire-pot and dipping dry branches into it to see how they looked. He found a branch that satisfied him, and in the evening when Tabaqui came to the cave and told him rudely enough that he was wanted at the Council Rock, he laughed till Tabaqui ran away. Then Mowgli went to the Council, still laughing.Mowglis Brothers, The Jungle Book,Rudyard KiplingExplain how the ending of the passage creates tension and might lead to a conflict. pls help!!!!!! pls provide an explaination if you can Use the formula M = log10 T to find the magnitude M of an earthquake with a shock wave that measuresT = 1,000 on a seismograph.The magnitude is one problem railroads faced during the late 1800s that was corrected by solid public relations was What does twain believe the united states intends to do with the people of the philippines? help them gain freedom build up their economy conquer them