In windows vista/7 what is another name for the notification area that shows programs running in the background?

Answers

Answer 1

System tray is another term for the notification box in Windows Vista and Windows 7 that displays applications running in the background.

What is a System tray.?The system tray, often known as the "systray," is a portion of the taskbars in the Microsoft Windows operating system's (OS) graphical user interface that offers quick access icons to the user's most frequently used programs and shows the time. Other operating systems, including Linux, Mac OS, Android, and iOS, all have a system tray. The notification area, often known as the "system tray," can be found at the bottom right corner of the Windows Taskbar.It has tiny icons that make it simple to access system features including antivirus settings, printer, modem, sound volume, battery life, and more.

To learn more about System tray, refer to:

https://brainly.com/question/28147966

#spj4


Related Questions

Which of the following is NOT an output device?
Group of answer choices

Screen

Printer

Speakers

Camera

Answers

Answer:

printer

Explanation:

It is an input device

Among the given options, the camera is NOT an output device.

Given that;

The devices are,

Screen

Printer

Speakers

Camera

Now, we know that;

The camera is typically considered an input device as it captures images or videos to be stored or processed by the computer.

On the other hand, screens (displays), printers, and speakers are examples of output devices as they respectively present visual, printed, and audio information generated by the computer.

So, the camera is NOT an output device.

To learn more about Computer visit:

https://brainly.com/question/30256882

#SPJ3

Identify the authors of the books Becca Nelson ordered. Perform the search using the customer name.
a)
The SQL statement with the traditional approach
Query:
SELECT a.lname, a.fname, b.title FROM books b, orders o, orderitems i, customers c, bookauthor t, author a
WHERE c.customer# = o.customer#
AND firstname = 'BECCA'
AND lastname = 'NELSON'
AND o.order# = i.order#
AND i.isbn = b.isbn
AND b.isbn = t.isbn
AND t.authorid = a.authorid;
Sample Output:

Answers

The SQL statement with the traditional approach:


Query:
SELECT a.lname, a.fname, b.title
FROM books b, orders o, orderitems i, customers c, bookauthor t, author a
WHERE c.customer# = o.customer#
AND c.firstname = 'BECCA'
AND c.lastname = 'NELSON'
AND o.order# = i.order#
AND i.isbn = b.isbn
AND b.isbn = t.isbn
AND t.authorid = a.authorid;


Sample Output:
This search will show the author's last name, first name, and the title of each book that Becca Nelson has ordered.

To know more about SQL, click here:

https://brainly.com/question/20264930

#SPJ11

What is the missing word?
if numA< numB: # line 1
numX = numA # line 2
numA > numB: # line 3
numX = B # line 4

Answers

Answer:

The answer is elif

Explanation:

I got it right in the assignment

The missing word in the given statement is as follows:

if numA< numB: # line 1

        numX = numA # line 2

        elif numA > numB: # line 3

        numX = B # line 4.

What is Elif?

Elif may be characterized as a short "else if" function. It is used when the first if statement is not true, but you want to check for another condition. If the statement pairs up with Elif and the else statement in order to perform a series of checks.

According to the context of this question, if-elif-else statement is used in Python for decision-making i.e the program will evaluate the test expression and will execute the remaining statements only if the given test expression turns out to be true. This allows validation for multiple expressions.

Therefore, The missing word in the given statement is Elif.

To learn more about Elif function in Python, refer to the link:

https://brainly.com/question/866175

#SPJ5










Problem 11-32 (Algo) Special Order [LO 11-2, 11-8] [The following information applies to the questions displayed below.] Award Plus Company manufactures medals for winners of athletic events and other

Answers

The cost per unit for laptop keyboards is $60.90, while the cost per unit for desktop keyboards is $97.43.

To compute the cost per unit for laptop and desktop keyboards, we need to allocate the overhead costs based on the activity measures provided. Let's calculate the cost per unit for each type of keyboard:

For laptop keyboards:

1. Materials receiving & handling cost: 1% of material cost = 0.01 * $5,800 = $58

2. Production setup cost: Number of setups * allocation rate = 30 * $106 = $3,180

3. Assembly cost: Number of parts * allocation rate = 49 * $5 = $245

4. Quality inspection cost: Inspection time * allocation rate = 7,200 minutes * $1.70 = $12,240

5. Packing and shipping cost: Number of orders * allocation rate = 70 * $9 = $630

Total overhead cost for laptop keyboards = $58 + $3,180 + $245 + $12,240 + $630 = $16,353

Cost per unit for laptop keyboards = Total cost / Number of units = $16,353 / 210 = $78.10

For desktop keyboards:

Follow the same steps as above, using the activity measures for desktop keyboards.

Total overhead cost for desktop keyboards = $28 + $1,272 + $135 + $3,360 + $180 = $4,975

Cost per unit for desktop keyboards = Total cost / Number of units = $4,975 / 210 = $23.69

Therefore, the cost per unit for laptop keyboards is $78.10, while the cost per unit for desktop keyboards is $23.69.

Learn more about desktop keyboards here:

https://brainly.com/question/32260674

#SPJ11

kay is selecting an application management approach for her organization. employees need the flexibility to install software on their systems, but kay wants to prevent them from installing certain prohibited packages. what type of approach should she use?

Answers

The correct answer is Which of the following technologies does Mobile Device Management (MDM) solutions not often support B. MDM products are unable to take over control of a device that is not already under the organization's management.

 

Organizations can manage devices, including virtual machines, actual computers, mobile devices, and Internet of Things (IoT) devices. The security plan of any firm must include device management. device management Keep track of every machine and get in touch with the input-output device controller. Memory drivers and other input-output devices are only a few examples of the devices that are monitored by device management. The system is effectively distributed and redistributed through the device management. By supplying visibility, manageability, and security, modern device management (MDM), or the management of the hardware assets used to access and work with data assets, can assist leaders in streamlining these complex transformations, resulting in agility, flexibility, and ultimately the capacity to act more quickly.

To learn more about Device Management click on the link below:

brainly.com/question/11599959

#SPJ4

2.2 Code Practice: Question 2

Answers

The codes are written below in python.

What are codes?

Coding is a type of computer language that facilitates communication with computers. Human languages are not understood by computers. Coding enables interaction between people and computers.

Code tells the computer what actions to take and which tasks to complete. We read input using the input() method and then convert it to a float using the float() function.

num1 = float(input("Enter a number: "))

num2 = float(input("Enter a number: "))

print("Sum: " + str(num1 + num2))

Therefore, the codes in python are written above.

To learn more about codes, refer to the link:

https://brainly.com/question/18508134

#SPJ9

The complete question is:

Question 2: write a python program to add two numbers.

Why are asl tls and https necessary

Answers

Mark brainliest if satisfied
HTTPS is a secure extension of HTTP. Websites that install and configure an SSL/TLS certificate can use the HTTPS protocol to establish a secure connection with the server. The goal of SSL/TLS is to make it safe and secure to transmit sensitive information including personal data, payment or login information.

Suppose you are going to train an MLP network with the five properties shown below. Calculate the total number of weights (i.e., weight parameters) that will be adjusted during the training process. Show and explain how you derive your answer. Note that you may not need to use all the properties provided. (2 marks)
a. The training set consists of N samples.
b. The dimensionality of each sample is D1.
c. The dimensionality of each target value is D2.
d. The MLP is fully connected and it has two hidden layers with the number of hidden neurons of L1 and L2, respectively.
e. The MLP network will be trained for T iterations

Answers

The total number of weights that will be adjusted during the training process for the given MLP network is (D1 + 1) × L1 + (L1 + 1) × L2 + (L2 + 1) × D2.

In order to calculate the total number of weights that will be adjusted during the training process for an MLP network with given properties a, b, c, d, and e, we can use the following formula:

Total number of weights = (D1 + 1) × L1 + (L1 + 1) × L2 + (L2 + 1) × D2where,D1 = dimensionality of each sampleD2 = dimensionality of each target value

L1 = number of hidden neurons in the first hidden layer

L2 = number of hidden neurons in the second hidden layer

Using the above formula and substituting the given values of the properties, we get:

Total number of weights = (D1 + 1) × L1 + (L1 + 1) × L2 + (L2 + 1) × D2= (D1 + 1) × L1 + (L1 + 1) × L2 + (L2 + 1) × D2

For a fully connected MLP network, each neuron in the first hidden layer is connected to D1 input neurons and one bias neuron, therefore the number of weights in the first layer will be (D1 + 1) × L1.

Similarly, each neuron in the second hidden layer is connected to L1 neurons and one bias neuron, therefore the number of weights in the second layer will be (L1 + 1) × L2.

Finally, each output neuron is connected to L2 neurons and one bias neuron, therefore the number of weights in the output layer will be (L2 + 1) × D2.

Hence, the total number of weights in the given MLP network is (D1 + 1) × L1 + (L1 + 1) × L2 + (L2 + 1) × D2.

Learn more about MLP network :https://brainly.com/question/28888608

#SPJ11

Explain the danger leaks pose when operating a tractor.

Answers

Read and follow procedures as outlined in the operator's manual. By being familiar with the operating features of a tractor, the operator will develop confidence when the tractor is driven under adverse conditions. Learn the location and purpose of all of the guages and controls as well as other indicators. Knowing where the controls are by memory can allow you to react more quickly in an emergency situation. There have been accident situations where individuals have become entangled in machinery or the power takeoff shaft and rescuers or family did not know how to disengage the equipment. Family members should be showed how to shut down equipment or disengage the PTO in case of emergency.
Study the various decals on your equipment. They may point out DANGER, WARNING and CAUTION for various points on the tractor. Have an experienced tractor operator with you as you review the various decals and ask questions!

10 effects that you can find in Audacity.

Answers

Answer: Distortion.

Echo.

Limiter.

Paulstretch (extreme stretch)

Phaser.

Reverb.

Reverse.

Truncate Silence.

etc

Explanation: this is it

Describe how computer simulations have helped to improve mathematical models and the significance they play in developing solutions.

Answers

Answer:

Kindly check explanation

Explanation:

Simulation means the act of using computer programs to generate a replica of real world or intended rela life application which are being tested, monitored and adjusted over time. Simulated models have played a huge role in developing solutions that have been built and refined by these simulation softwares such that it is much more easier to test these models before coming to make a real life match for it. This often save cost and offers a faster way of building models as there is no need for physical coupling before generating the model. In filed such as health, simulation models of body parts and other fragile areas can be made withoutvthe need for a real human during testing or building.

There are different functions of computer. Computer simulations have become a useful part of mathematical modelling because they help in the;

Mathematical modelling of a lot of natural systems that are found in physics, chemistry and biology.

Mathematical modelling of a lot of human systems such as those found in economics, psychology, and social science etc.

They have help us to have a preview or insight into the various work or operation of those systems.

Computer simulations that are build models in science, technology and entertainment has help to save time and money, and allow man to do things that would be impossible to do before.

Learn more about computer simulations from

https://brainly.com/question/24912812

Define computer system?​

Answers

Answer:

A computer system is a "complete" computer that includes the hardware, operating system (main software), and peripheral equipment needed and used for "full" operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster.

What are some benefits of the Internet? (select all that apply)

ease of communication

e-mail

collaboration

increased exposure of activity online

Answers

Answer:

ease of communication

email

collaboration

increased exposure of activity online

Explanation:

it all applies because all of it is benefits of internet

The benefits of the internet selected from the given options are: ease of communication, e-mail, and collaboration, which are present in option 1, option 2, and option 3.

What are the benefits of the internet?

     

The internet has revolutionized the way people communicate with each other, it has made communication much easier and faster than before. With the help of the internet, people can communicate with each other across the world in real-time through various means, such as instant messaging, video conferencing, and social media platforms. The ease of communication has had many benefits, such as allowing people to stay in touch with their loved ones, regardless of their location. Email is one of the most popular and widely used forms of communication on the internet, and collaboration is another significant benefit of the internet.

Hence, the correct answers are ease of communication, e-mail, and collaboration, which are present in options 1, 2, and 3, among all other options.

Learn more about the benefits of the internet here.

https://brainly.com/question/24149931

#SPJ7

Given the definitions provided for cultural boundaries within
this website (high-context v. low-context, sequential v.
synchronic, & affective v. neutral), categorize the US for each
point. (2 poi

Answers

1. High-context v. low-context: The United States can be categorized as low-context.

2. Sequential v. synchronic: The United States can be categorized as sequential.

3. Affective v. neutral: The United States can be categorized as neutral.

1. High-context v. low-context: High-context cultures rely heavily on shared knowledge, implicit communication, and context-specific understanding. Low-context cultures, on the other hand, prioritize explicit communication and rely less on shared context. In the United States, communication tends to be more direct, explicit, and focused on individuality rather than shared context. Therefore, the United States can be categorized as low-context.

2. Sequential v. synchronic: Sequential cultures emphasize linear thinking, step-by-step processes, and value time management. Synchronic cultures, on the other hand, value multitasking, flexible time management, and may engage in multiple activities simultaneously. The United States generally follows a sequential approach, emphasizing punctuality, adherence to schedules, and a linear approach to tasks. Therefore, the United States can be categorized as sequential.

3. Affective v. neutral: Affective cultures emphasize expressing emotions openly, valuing personal relationships, and prioritizing the emotional aspect of communication. Neutral cultures, on the other hand, tend to focus on factual information, rationality, and maintaining emotional restraint in communication. The United States generally leans towards a neutral communication style, emphasizing facts, logic, and a certain level of emotional restraint in most interactions. Therefore, the United States can be categorized as neutral.

Based on the given definitions, the United States can be categorized as a low-context culture, following a sequential approach to tasks, and having a neutral communication style. However, it's important to note that culture is a complex and multifaceted concept, and categorizing an entire country based on a few dimensions may oversimplify the cultural diversity and variations within the population.

To know more about sequential follow the link:

https://brainly.com/question/30412492

#SPJ11

program that does the following. Do not use the System.in, System.out, System.exit, or any awt/swing classes. Thus, just like HW6, your program should be able to work with multiple UIs.
• Prompt the user with two choices: "go" and "stop".
• If the user selects "go", your modified program should print the message "I've done it n times!" ", then repeat the menu.
where n is the number of times "go" has been selected. For example, the first time the user selects "go", the program should print "I've done it 1 times!". The second time, the program should print "I've done it 2 times!". Etcetera.
• If the user selects "stop", print the message "Bye!" and terminate the program.

Answers

import java.util.Scanner;

public class GoStop {

   private static int count = 0;

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       while (true) {

           System.out.println("Enter 'go' to continue or 'stop' to quit: ");

           String input = scanner.next();

           if (input.equals("go")) {

               System.out.println("I've done it " + count + " times!");

               count++;

           } else if (input.equals("stop")) {

               System.out.println("Bye!");

               break;

           } else {

               System.out.println("Invalid input. Please enter 'go' or 'stop'.");

           }

       }

   }

}

Sure, here is the Java program that does the following:

Java

import java.util.Scanner;

public class GoStop {

   private static int count = 0;

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       while (true) {

           System.out.println("Enter 'go' to continue or 'stop' to quit: ");

           String input = scanner.next();

           if (input.equals("go")) {

               System.out.println("I've done it " + count + " times!");

               count++;

           } else if (input.equals("stop")) {

               System.out.println("Bye!");

               break;

           } else {

               System.out.println("Invalid input. Please enter 'go' or 'stop'.");

           }

       }

   }

}

This program does not use the System.in, System.out, System.exit, or any awt/swing classes. It uses a Scanner object to read input from the user, and it prints output to the console. The program will continue to run as long as the user enters go. If the user enters stop, the program will print Bye! and terminate.

Learn more about Java Programming here:

https://brainly.com/question/13918216

#SPJ11

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?​

Answers

Note that the consequence of configuring a router with the IPV6 unicast-routing global configuration command is that "the IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages." (Option B)

What is IPV6?

The most current version of the Internet Protocol, the communications protocol that supplies an identifying and location system for computers on networks and directs data across the Internet, is Internet Protocol version 6.

Internet Protocol version 6 (IPv6) is a required component of Windows Vista, Windows Server 2008, and subsequent versions. We do not advocate turning off IPv6 or any of its components. Some Windows components may stop working as a result. Instead of blocking IPV6, it is advocated for one to utilize "Prefer IPv4 over IPv6" in prefix policies.

Learn more about routers;
https://brainly.com/question/15851772
#SPJ1

Full Question:

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?​

All router interfaces will be automatically activated.The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.Each router interface will generate an IPv6 link-local address.​It statically creates a global unicast address on this router.​

which computer was used to solve problems in major universities,military agencies and scientific research laboratories?​

Answers

Answer:

IBM

Explanation:

The term "Super Computing" was first used by the New York World newspaper in 1929 to refer to large custom-built tabulators IBM made for Columbia University. It was used to solve problems involving by major universities, military agencies and scientific research laboratories.

Answer: IBM

The term "Super Computing" was first used by the New York World newspaper in 1929 to refer to large custom-built tabulators IBM made for Columbia University. It was used to solve problems involving by major universities, military agencies and scientific research laboratories.

Match the following.
1. the process of reducing repetition of data
data normalization
2. individual categories of data you will enter in a database
records
3. a field that is a unique identifier for each record in the table
fields
4. data that is entered in the database
primary key
5. a link between two tables
relationship

Answers

Answer:

1192783728439

Explanation:

why is laptop personal computer​

Answers

Answer:

MARK AS BRAINLIEST! LOOK AT PICTURES!

why is laptop personal computer
why is laptop personal computer

What are some benefits of a MacBook Pro?

Answers

Answer:

Best High-Definition Screen Display. The MacBook Pro with LED-backlit Retina display possesses one of the most stunning screens in the market. ...

Powerful Operating System. ...

Better Battery Performance. ...

Durable Keyboard and Trackpad. ...

High-End Look and Feel. ...

Macbooks Last for a Long Time.

Explanation:

;)

HYUNDAI Motors is considering producing cars in Incheon with production function Q=10KL
2
, where Q is number of cars per week, K is units of capital measured in automated assembly-lines, and L is thousands of workers per week. SAMSUNG Motors is considering producing cars in Daegu with production function Q=10 K
2
L. A) Both HYUNDAI and SAMSUNG must pay ∀600,000,000 per unit of labor ( W600,000 per worker x1,000 workers) and W1,200,000,000 per unit of capital, where W600,000 is the weekly wage and W1,200,000,000 is the weekly interest cost to finance an automated assembly line. How many units of labor and how many units of capital would each firm use to produce 1280 cars? (You may round your answer to the nearest 1,000 workers and the nearest automated assembly line.) B) How much would it cost HYUNDAI to produce 1280 cars? What would the cost be per car? C) How much would it cost SAMSUNG to produce 1280 cars? What would the cost be per car? D) While the firms are studying their options, BOK doubles interest rates up so that the cost of capital rises to W2,400,000,000. The Incheon economy is booming, and HYUNDAI finds that it must pay $1,200,000 per worker per week. Daegu's economy is less vibrant, and wage per worker stay at W600,000 per week. How many units of labor and how many units of capital will each firm now envision needing to produce 1280 cars? What are each firm's prospective costs per car?

Answers

A)19,261 units of labor and 32 units of capital. B)The cost of HYUNDAI is V38,020,800,000, resulting in a cost per car of V29,690,625. C)25,398 units of labor and 40 units of capital. D)V52,463,200,000

If the interest rates double and Hyundai has to pay $1,200,000 per worker per week while Samsung's wage per worker remains at W600,000 per week, Hyundai would require around 9,219 units of labor and 45 units of capital. The prospective cost for Hyundai per car would increase to V41,570,313. Samsung, in this scenario, would need approximately 12,199 units of labor and 50 units of capital. The prospective cost for Samsung per car would be V44,385,938.

A) To find out the number of units of labor and capital required by Hyundai and Samsung to produce 1280 cars, we can use their respective production functions. For Hyundai, Q = 10KL^2, where Q is the number of cars, K is the capital (automated assembly lines), and L is the labor. By substituting Q = 1280, we can solve for K and L. Similarly, for Samsung, Q = 10K^2L. By substituting Q = 1280, we can solve for K and L. Rounding the values to the nearest thousand workers and automated assembly lines gives us the final results.

B) To calculate the cost for Hyundai to produce 1280 cars, we multiply the number of units of labor by the wage per worker and the number of units of capital by the interest cost per assembly line. Adding these costs together gives us the total cost for Hyundai. Dividing the total cost by the number of cars (1280) provides us with the cost per car.

C) The process for calculating the cost for Samsung is similar to that of Hyundai. We multiply the number of units of labor by the wage per worker and the number of units of capital by the interest cost per assembly line. Adding these costs together gives us the total cost for Samsung. Dividing the total cost by the number of cars (1280) provides us with the cost per car.D) In this scenario, the interest rates double, and Hyundai has to pay $1,200,000 per worker per week, while Samsung's wage per worker remains at W600,000 per week. We repeat the calculations using the new wage and interest rate values to determine the number of units of labor and capital required by each firm. The prospective cost per car is then calculated using the same method as in parts B and C, but with the updated costs.

To learn more about HYUNDAI visit:

brainly.com/question/30762678

#SPJ11

write a c program that reads this file and creates a normal human-readable text file from its contents. the new file should be called grades.txt. in this file, the data should appear in the same order, one record per line, but neatly aligned into fixed-width columns.

Answers

         FILE *in_file  = fopen("name_of_file", "r"); // read only

         FILE *out_file = fopen("name_of_file", "w"); // write only

         

         if (in_file == NULL || out_file == NULL)

           {  

             printf("Error! Could not open file\n");

             exit(-1); // must include stdlib.h

           }

         

         fprintf(file, "this is a test %d\n", integer);

         fprintf(stdout, "this is a test %d\n", integer);

         printf(         "this is a test %d\n", integer);

         fscanf(file, "%d %d", &int_var_1, &int_var_2);  

         fscanf(stdin, "%d %d", &int_var_1, &int_var_2);  

         scanf(        "%d %d", &int_var_1, &int_var_2);

C Programming :

          C is a programming language for general-purpose computers. Dennis Ritchie invented it in the 1970s, and it is still widely used and influential today. C's features are designed to accurately reflect the capabilities of the targeted CPUs. C, the successor to the programming language B, was created by Ritchie at Bell Labs between 1972 and 1973 to build utilities that ran on Unix. It was used to re-implement the Unix operating system's kernel. C gradually gained popularity during the 1980s. C compilers are available for almost all modern computer architectures and operating systems, making it one of the most widely used programming languages. Since 1989, ANSI (ANSI C) and the International Organization for Standardization have standardised C.

             C is an imperative procedural language with a static type system that supports structured programming, lexical variable scope, and recursion. It was created to be compiled in order to provide low-level memory access and language constructs that map efficiently to machine instructions, all while requiring minimal runtime support. Despite its low-level capabilities, the language was designed to promote cross-platform development. With few changes to its source code, a standards-compliant C programme written with portability in mind can be compiled for a wide range of computer platforms and operating systems.

To learn more about c program refer :

https://brainly.com/question/15683939

#SPJ4

C is a programming language for general-purpose computers. Dennis Ritchie invented it in the 1970s, and it is still widely used and influential today.  

 What is mean by C Programming ?

C is a programming language for general-purpose computers. Dennis Ritchie invented it in the 1970s, and it is still widely used and influential today. C's features are designed to accurately reflect the capabilities of the targeted CPUs. C, the successor to the programming language B, was created by Ritchie at Bell Labs between 1972 and 1973 to build utilities that ran on Unix. It was used to re-implement the Unix operating system's kernel. C gradually gained popularity during the 1980s. C compilers are available for almost all modern computer architectures and operating systems, making it one of the most widely used programming languages. Since 1989, ANSI (ANSI C) and the International Organization for Standardization have standardised C.

 FILE *in_file  = fopen("name_of_file", "r"); // read only

        FILE *out_file = fopen("name_of_file", "w"); // write only

 

        if (in_file == NULL || out_file == NULL)

          {  

            printf("Error! Could not open file\n");

            exit(-1); // must include stdlib.h

          }

       

        fprintf(file, "this is a test %d\n", integer);

        fprintf(stdout, "this is a test %d\n", integer);

        printf(         "this is a test %d\n", integer);

        fscanf(file, "%d %d", &int_var_1, &int_var_2);  

        fscanf(stdin, "%d %d", &int_var_1, &int_var_2);  

        scanf(        "%d %d", &int_var_1, &int_var_2);

            C is an imperative procedural language with a static type system that supports structured programming, lexical variable scope, and recursion. It was created to be compiled in order to provide low-level memory access and language constructs that map efficiently to machine instructions, all while requiring minimal runtime support. Despite its low-level capabilities, the language was designed to promote cross-platform development. With few changes to its source code, a standards-compliant C programme written with portability in mind can be compiled for a wide range of computer platforms and operating systems.

To learn more about c program refer to :

brainly.com/question/15683939

#SPJ4

if you want to know the length of the string that is stored in a string object, you can call the object's size member function. group of answer choices true false

Answers

If you want to know the length of the string that is stored in a string object, you can call the object's size member function. The given statement is true.

To obtain the number of characters in a string, you may use the "size()" function, which is a member function of the string class. The "size()" member function returns the length of a string as an unsigned integer. It takes no parameters as input and returns the length of the string that is currently saved in the object.

Example: Let's say a string object "str" is created with the value "Hello world!". To retrieve the length of the string "str," the "size()" member function will be called.

So the syntax would be:

str.size();

Output: 11 (This indicates that the length of the string is 11)

Therefore, the statement is true.

Learn more about the size() function here:

https://brainly.com/question/27036857

#SPJ11

I need help, help me please ..​

I need help, help me please ..

Answers

Answer:

1. cookies

2.domain name

3.web browser as web saver name

4.html

Explanation:

sana makatulong

You’ve been stuck in bumper-to-bumper traffic for nearly an hour on a hot summer day. The temperature warning light has just come on. How will you handle this situation? What safety precautions will you take?

Answers

Answer:

In a bumper-to-bumper traffic, when the engine starts overheating the situation can be handled by tapping the accelator which will revive the engine.

Explanation:

Overheating of engine can be due to many reasons. But one should know what to do when an engine overheats in a traffic. Bumper-to-bumper traffic is when the cars are so close in traffic that they touch each other. This usually happens when there's a traffic for a long time or on very busy lane. During summer times, it is important to keep checking the engine temperature to avoid any problem.

When one is stuck in bumper-to-bumper traffic with overheating engine, then there are some meausres that one can take. They are:

To put the car on park or neutral mode of driving and tap the accelator which will revive the engine. The heat can be disperse by rolling down the window and turn the heater up. It will disperse the heat.

In combination, the powerful tools that systems analysts use to provide a framework for rapid, efficient software development, is called a ____ environment.

Answers

Answer:

4GL is the answer

hope this is what ur looking for...

mike meyers' comptia a and guide to managing and troubleshooting pcs lab manual, seventh edition michael meyers

Answers

The book, "Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs Lab Manual, Seventh Edition Michael Meyers" is that this book is a comprehensive learning tool .

That has explanations for the key concepts of PC hardware and software installation, configuration, maintenance, and troubleshooting. The book is very well written and has all the necessary information that one needs to understand PC hardware and software installation, configuration, maintenance, and troubleshooting.

It is divided into two sections: the first section covers hardware installation, configuration, maintenance, and troubleshooting, while the second section covers software installation, configuration, maintenance, and troubleshooting. The book has a hands-on approach, with lots of illustrations, diagrams, and practical examples. It also has review questions and lab exercises at the end of each chapter to help reinforce the concepts learned.

To know more about Lab Manual visit:

https://brainly.com/question/950632

#SPJ11

the emerging trends in microcomputer technology in relation to size

Answers

Miniaturisation, decreased power consumption, higher computing power, and the integration of numerous functionalities into a single chip or device are emerging themes in microcomputer technology.

What are the three new social trends that computers are bringing about?

AI, edge computing, and quantum computing are some of the most recent trends in computer science. The latest developments in robotics and cybersecurity are also taught to IT professionals.

What are the two newest trends and technologies?

Spatial computing and the spatial web, digital persistence, multientity environments, decentralisation technology, high-speed, low-latency networking, sensor technologies, and AI applications are just a few of the new, enabling technologies and trends.

To know more about microcomputer  visit:-

https://brainly.com/question/27948744

#SPJ9

pls explain the special keys on a keyboard and their functions ...eg shift key,control key​

Answers

Tab- used to advance the cursor to the next tab stop.

Shift- allows you to type capital letters and the symbols at the top of the keys

Control-  enabling other keys on the keyboard to perform secondary functions

Alt- used to change (alternate) the function of other pressed keys

CapsLock- causes all letters of bicameral scripts to be generated in capital letters.

Answer:

Multiple functions

Explanation:

If you'd like an answer to the purpose of the shift key and the control key, then I'll answer those two, specifically. Tell me if you'd like any more assistance afterwards! ( :

#1: Shift key: This key's basic function is this: when you hold down on it as well as a letter key (e.g. f ), then it will automatically make that letter uppercase.

For example, in this sentence I typed F while pressing the shift key as well:

Frederick looked out the window.

While in this one, I didn't.

frederick looked out the window.

My computer automatically tells me that the spelling of Frederick I used in the second sentence is wrong, since Frederick is proper - and is the beginning of a sentence.

#2: Control key: This key allows you to to do some pretty cool things, depending on which key you click it with.

For example, ctrl + j generates a document download page, while ctrl + d opens a bookmark page? option.

I hope this was very helpful, and let me know if you need any further assistance in the future! ( :

What tool should be used to create real-time monitors that can be customized to show specific data on hardware, protocols, and applications

Answers

Answer:

steel

contrete

Explanation:

Other Questions
In JKL, KL = 14, LJ = 3, and JK =12. Which statement about the angles of JKL must be true? 50 Points! Multiple choice geometry question. Photo attached. Thank you! Explain the way Congress, the president, bureaucrats, andcitizens provide meaningful oversight over the bureaucracies. Price skimming focuses on selling products to ____ and ____ in the consumer adoption process model. explain maximum and minimum thermometer working(answer only for points will be reported) "By any other name"Which character in the story is most outspoken and disturbed by the treatment of Indian people by the english? Use evidence from the text to support your answer in a claim-evidence-commentary paragraph. The ratio of the lengths of corresponding sides of 2 similar triangles is 7:4. What is theratio of the perimeters of the triangles? Pascal's law states that if a gas is maintained at a constant temperature, then its volume will be inversely proportional to its pressure. True False Pascal's law is one of the main underlying principles at work in Hydraulic systems. True False Archimedes's principle depends on the presence of a vertical pressure gradient. True False Archimedes's principle does not apply to "small" objects, such as the centimeter length scale or smaller. Assume the object is not so small that the continuum assumption fails to hold. True False Claire has been asked by her manager to review the disaster recovery plan, as he believes it is currently insufficient for the organization's needs. She finds a few issues and starts planning modifications to the backup schedule so that backups are done more frequently. Which of the following might be the reason for this new backup schedule what do you think your strengths and weaknesses working online What did mendel call the two kinds of traits exhibited by the pea plants. In a price system, changes in prices:___.a. imply that people have made mistakes in the past. b. signal to policy makers what goods should and should not be taxed.c. signal to everyone in the system what goods are relatively more or less scarce. d. make it difficult for the system to function well. new york state police define an as one who operates a motor vehicle in a selfish, bold or pushy manner. aggressive driver average driver safe driver all of the above Devon is young and has just graduated college with her associates degree. She plans to start saving money for retirement as soon as she starts her new job. By taking 10% of her monthly gross income, Devon is ableto contribute (a) $__________ each month to a retirement plan. The account is expected to earn interest with an APR of 5.25% compounded monthly. Round answers to two decimal places.a. How much money will be in Devons retirement account if she continues to make the same monthly. investment for 40 years?b. Overall, Devon contributed how much of her own money into the retirement account?c. What percent of the final balance in Devons retirement account was interest?You may not ask for help from others or give help to others on specific project questions.Part 1: Continued2. Later in life, Devon convinces her friend Taylor to start saving for retirement as well. Even though Taylor is the same age as Devon, she hasnt started saving for retirement yet. With only 20 years left until they both plan to retire, Taylor decides she needs to invest at least twice as much as Devon each month to try to catch up to Devons retirement plan. Taylor opens a similar retirement account to Devons that also has an APR5.25% compounded monthly. She will invest (b) $__________ per month. Round answers to two decimal places.a. How much money will be in Taylors retirement account if she continues to make the same monthly investment for 20 years?b. By the time she retires, Taylor will have contributed how much of her own money overall?c. What percent of the final balance in Taylors retirement account will be interest? 3. Write complete sentences that identify which person had the higher amount and by how much. Round answers to two decimal places.a. Who had more money in their retirement account when they planned to retire? How much more? b. Who contributed more to their retirement account? How much more? In the moths leading world war 1 the united states wanted to maintain the neutrality because This graph shows that- pourquoi est-il important de pratiquer des prix bas? how did distance affect the city-states of ancient Greece? 1. Describe the sequencing of factors influencing health status codes for patients that also have chronic conditions being managed by the provider. 2. Provide one (1) example diagnosis of a factor influencing health status code. Explain why your example is considered a factor influencing health status the nurse is caring for a respiratory client who uses a noninvasive positive pressure device. which medical equipment does the nurse anticipate to find in the clients room?