Answer:
The correct answer is Save as
The option that is to select to save a copy of word online document to hard drive is the save as option.
What is word document?The term “Word Document” is used to denote the document that is made in the Microsoft Word. This document is made in the proper format with the MS Word. This document can be safe electronically by selecting the save as option.
After saving that document, this will automatically save on the hard drive of the computer device of that user.
Therefore, option A is correct.
Learn more about the Word document, refer to:
https://brainly.com/question/15939168
#SPJ2
The city of Green Acres is holding an election for mayor. City officials have decided to automate the process of tabulating election returns and have hired your company to develop a piece of software to monitor this process. The city is divided into five precincts. On election day, voters go to their assigned precinct and cast their ballots. All votes cast in a precinct are stored in a data file that is transmitted to a central location for tabulation.
Required:
Develop a program to count the incoming votes at election central.
Answer:
Explanation:
The following program asks the user to enter the precinct number and then loops to add votes until no more votes need to be added. Then it breaks the loop and creates a file called results to save all of the results for that precinct.
precinct = input("Enter Precinct Number: ")
option1 = 0
option2 = 0
while True:
choice = input("Enter your vote 1 or 2: ")
if int(choice) == 1:
option1 += 1
else:
option2 += 1
endVote = input("Vote again y/n")
if endVote.lower() != 'y':
break
f = open("results.txt", "w")
f.write("Precinct " + precinct + ": \nOption 1: " + str(option1) + "\nOption 2: " + str(option2))
What are acenders? What are decenders?
Answer:
Explanation:
An ascender is the part of a lowercase letter that extends above the mean line of a font, or x-height
The descender is the part that appears below the baseline of a font.
Answer: Ascenders are lowercase letters that are written above or pass the mean line. Meanwhile descenders are below the baseline.
Explanation: An example of ascender letters are: b, h, and l. Examples of decenders are: g, p, and y.
What is the default zoom percentage in Word?
50%
100%
150%
200%
Answer:
The default zoom percentage in Word is 100%.
Answer:
100
Explanation:
Do you use commas or periods in Terms Of Conditions?
For example,
in the following terms of conditions should be a comma or a period?
- Professionalism is required, (or period)
- You may not breach this document, (or period)
Furthermore, if a period is used, is the rest of the contract useless?
Answer:
yes u should use a period
Explanation:
would someone know how to write this in python and make sure it works.
The program written in Python programming language that performs the required computations is:
def calculate(data):
for item in data:
print(item, end = ' ')
print()
for item in data:
print(item, ' ', (item**2))
total = 0
for item in data:
total += item
print("The total of the values is",total)
total = 1
for item in data:
total *= item
print("The product of the values is",total)
data1 = [12, 10, 32, 3, 66, 17, 42, 99, 20]; data2 = [14, 7, -12, 88, -17, 22, -5, 18]
calculate(data1); calculate(data2)
How to write the program in Python programming language?The program written in Python programming language, where comments are used to explain each line is as follows:
#This defines the calculate function
def calculate(data):
#This iterates through the list
for item in data:
#This prints the list elements
print(item, end = ' ')
#This prints a new line
print()
#This iterates through the list
for item in data:
#This prints the list elements and the squares
print(item, ' ', (item**2))
#This initializes the total to 0
total = 0
#This iterates through the list
for item in data:
#This calculates the total
total += item
#This prints the total
print("The total of the values is",total)
#This initializes the product to 1
total = 1
#This iterates through the list
for item in data:
#This calculates the products
total *= item
#This prints the products
print("The product of the values is",total)
#This initializes data1 and data2
data1 = [12, 10, 32, 3, 66, 17, 42, 99, 20]; data2 = [14, 7, -12, 88, -17, 22, -5, 18]
#This calls the function for data1 and data2
calculate(data1); calculate(data2)
Read more about python programs at
https://brainly.com/question/26497128
#SPJ1
Declare an array to store objects of the class defined by the UML. Use a method from the JOPTIONPANE class to request the length of the array the use
Here's the code snippet that declares an array to store objects of a class defined by a UML and uses the showInputDialog method from the JOptionPane class to request the length of the array from the user:
The Code Snippetimport javax.swing.JOptionPane;
public class MyClass {
public static void main(String[] args) {
int length = Integer.parseInt(JOptionPane.showInputDialog("Enter the length of the array:"));
MyUMLClass[] array = new MyUMLClass[length];
// Rest of the code...
}
}
class MyUMLClass {
// Class definition...
}
This instance entails that the user is requested to provide the quantity of items in the array with the use of the showInputDialog method, and subsequently, the input value is saved into the length variable. Subsequently, a collection of MyUMLClass instances is generated with a predetermined size.
Read more about arrays here:
https://brainly.com/question/29989214
#SPJ1
How do you setup Synapse x? Please explain each step
1. You download the compressed file from the website
2. Create a new folder on your desktop, then copy the file location.
3. Right click on the compressed file that contains Synapse X
4. Select “Extract all,” then paste the file location of the folder you wish to keep it in, and click “Extract.”
5. Make sure Windows Real-time Protection is OFF before trying to run the .exe file, otherwise your OS will automatically delete the .exe file then you'll have to delete all the contents from your folder and restart from step 3.
You can find the Windows Real-time Protection option by going to the Windows search bar and typing "Virus and Threat Protection,"
then clicking on the "Manage Settings" button underneath the "Virus & threat protection" tab, then disabling Real-time Protection.
It will give you a prompt warning you that your PC could be open to threats, however as long as if you're not downloading shady things from shady sites, and you're not discoverable on your Wi-Fi network, you'll be fine without it.
Keep in mind, Real-time Protection automatically turns itself back on after a set amount of time of it being disabled. So you'll have to disable it every time you wish to use Synapse X.
6. Once you've done all of that, just follow the prompts that Synapse X gives you, give your whitelist code, log in, and you're set.
what are the uses of joystick
create a powerpoint presentation on various e commerce websites. compare them and write which one is your favourite and why
The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.
Thus, By providing information via various website services, you can raise audience engagement and knowledge. Internet stores Ppt Images and Graphics.
You can deliver information in stages using this template. Using this PPT design, you may also show information on products, exclusive discounts, and strong online websites. This style is entirely changeable, so personalize it right away to satisfy the demands of your audience.
A lousy PowerPoint presentation can detract from the excellent content you're providing with team stakeholders because of poor color choices or unclear slides.
Thus, The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.
Learn more about PPT, refer to the link:
https://brainly.com/question/31676039
#SPJ1
Create a file account.cpp containing a Bank Account Class.
Your class should contain:
- private fields for the customer’s name and a balance.
- one or more constructors.
- methods to access the name and balance (these methods don’t modify the data)
- and methods to deposit and withdraw an amount (these methods modifies the data).
Write a main function that creates two of these objects: Account1 & Account2 and then:
- prints the original balance for both accounts with the customer’s name
- deposits some amount in Account1 and prints the final balance with the customer’s name
- withdraws some amount from Account2 and prints the final balance with the customer’s name
Answer:
#include <iostream>
using namespace std;
class BankAccount {
string name = name;
double balance = balance;
BankAccount( string name, double balance ) {
string name = name;
double balance = balance;
return 0;
}
string getName( ){
return name;
}
double getbalance( ) {
return balance;
void setName( string username){
name = username;
}
void setbalance( double newBalance){
balance = newBalance;
}
int main( ) {
BankAccount user1(John, 0.0);
BankAccount user2(Jane, 0.0);
user1.setbalance( 2300.00)
user2.setbalance( 4300.00)
cout << user1.getname() << user1.getbalance();
cout << user1.getname() << user1.getbalance();
}
Explanation:
The C source code above using a class to create a data structure of a bank account user name and balance. The attribute name and balance are private to the class and can be retrieved and modified through the get and set methods.
can be an unintentional cyber breach.
Software bugs
Replay attacks
Spoofing
HELP ME PLEASE!?!
Answer:Cybersecurity risks can be broadly segmented into two types: passive and active attacks. In a passive attack, no modification of data occurs and the target does not
Explanation:
bc i know
atch each description on the left with the appropriate cloud technology on the right. drag drop public cloud provides cloud services to just about anyone. press delete to clear private cloud allows cloud services to be shared by several organizations. press delete to clear community cloud provides cloud services to a single organization. press delete to clear hybrid cloud integrates one cloud service with other cloud services.
According to the question, the correct match is a: 1. Public cloud, b: 3. Community cloud, c: 4. Private cloud, d: 2. Hybrid cloud.
What is Cloud service ?A cloud service is any service that is made available to users who are on demand via internet from the cloud computing service providers. These service providers have servers in their company premises where they offer the services from.
The service known as “cloud computing” operates via internet technologies. Software-as-a-service (SaaS) is a notion that is part of cloud computing that is used to host applications by any third party and offer them to users as services.
Platform-as-a-service (PaaS) is a model where a third party offers the user the tool for application development.
Therefore, the correct match is a: 1. Public cloud, b: 3. Community cloud, c: 4. Private cloud, d: 2. Hybrid cloud.
To know more about cloud visit:
https://brainly.com/question/27108963
#SPJ4
Technician A says a push-button switch has a spring-loaded button that, when pressed, makes or breaks an electrical connection. Technician B says pressure switch is a special type of push-button switch that stays in one position until you move it. Who is right?
Answer:
Both technicians are correct! A push-button switch is a type of switch that is activated by pressing a button. It can be either momentary or maintained, which means it stays in the "on" or "off" position when the button is released.
Explanation:
A pressure switch is a special type of push-button switch that operates based on pressure, as Technician B stated. The switch stays in one position until a certain pressure is applied to the button, at which point it switches to the opposite position. This makes it ideal for applications where a switch needs to be activated by a physical force, such as when a certain pressure is reached in a fluid system.
So, both technicians have correctly described different aspects of push-button switches.
For a company, intellectual property is _______________.
A) any idea that the company wants to keep secret
B) the same as the company’s policies
C) any topic discussed at a meeting of senior management
D) all of the company’s creative employees
E) a large part of the company’s value
For a company, intellectual property is any idea that the company wants to keep secret. Thus the correct option is A.
What is intellectual Property?The type of integrity is defined as "intellectual property" which includes intangible works developed by humans with an innovative and problem-solving approach.
These intellectual properties are protected by companies to avoid leakage of the secret of development as well as to avoid imitation of the creation. This protection of the intellectual property is legally bounded.
If any violation of this act has been noticed and found guilty will have to face consequences in terms of charges of violation as well as heavy penalties based on the type and importance of the work.
Therefore, option A any idea that the company wants to keep secret is the appropriate answer.
Learn more about intellectual property, here:
https://brainly.com/question/18650136
#SPJ2
If background option when creating file. the color of the background is
Answer:
Light Grey.
Explanation:
I guess because mostly I have seen document background colour is Grey.
After the following lines of code are executed, what will be the output? (python)
def calc(x, y):
x = 20
y = 10
def main():
a = 2
b = 3
calc(a, b)
print(‘The values are:’, a, b)
main()
After executing the code, the output will be: The values are: 20 10. The main() function initializes the variables a and b with the values 2 and 3, respectively.
What is the explanation?The main() function initializes the variables a and b with the values 2 and 3, respectively. The calc() function takes two arguments, x and y, but then immediately overwrites them with the values 20 and 10, respectively. This means that whatever values were passed to calc() will be ignored. The calc() function returns two values, x and y, which are then assigned to the variables a and b in the main() function.
Finally, the print() statement outputs the values of a and b, which were set to 20 and 10, respectively, by the calc() function.
Learn more about values, here:
https://brainly.com/question/30145972
#SPJ1
What is the difference between laser jet printer and inkjet printer? 60 - 100 words
Answer:
A laser jet printer uses toner, while an inkjet printer sprays ink dots onto a page. Laser jet printers generally work faster than inkjet printers. Although inkjet printers are cheaper than laser jet printers, they are usually more expensive to maintain in the long run as ink cartridges have to be replaced more often. Thus, laser jet printers are cheaper to maintain. Laser jet printers are great for mass printing as they are faster and, as mentioned earlier, cheaper to replenish. Whereas inkjet printers are better for printing high quality images.
¿Que ess ready player one?
The interpretation or translation of the following phrase is: "Are you ready player one?"
Why are translations important?Translation is necessary for the spreading new information, knowledge, and ideas across the world. It is absolutely necessary to achieve effective communication between different cultures. In the process of spreading new information, translation is something that can change history.
In this example, it is possible that a flight simulation has just displayed the above message. It is important for the trainee in the simulator to be able to interpret the following message.
Learn more about interpretation:
https://brainly.com/question/28879982
#SPJ1
Full Question:
What is the interpretation of the following:
¿Que ess ready player one?
In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.
Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.
Ex: If the input is:
apples 5
shoes 2
quit 0
the output is:
Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy
Answer:
Explanation:
import java.util.Scanner;
public class MadLibs {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
String word;
int number;
do {
System.out.print("Enter a word: ");
word = input.next();
if (word.equals("quit")) {
break;
}
System.out.print("Enter a number: ");
number = input.nextInt();
System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");
} while (true);
System.out.println("Goodbye!");
}
}
In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.
Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.
3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification
Here's the correct match for the purpose and content of the documents:
The Correct Matching of the documentsProject proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.
Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.
Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.
Read more about Project proposal here:
https://brainly.com/question/29307495
#SPJ1
Please help me I don’t understand what I am to do
If you require data sorting in SQL, implementing the ORDER BY clause in your SELECT statement can be used.
For illustration: arrange a table named "employees" by decreasing salary, as per the following selection:
The SQL CodeSELECT * FROM employees
ORDER BY salary DESC;
Additionally, more than one column can be configured for sorting utilizing supplementary fields to the ORDER BY clause, such as:
SELECT * FROM employees
ORDER BY department ASC, salary DESC;
This configuration will first sort data according to ascending departments, then within each department descend it based on salaries.
Your images are not clear enough so I gave you an idea on how to sort data in SQL.
Read more about SQL here:
https://brainly.com/question/25694408
#SPJ1
Which of these symbols is the assignment operator?
{ }
( )
#
=
Answer:
# i think
Explanation:
Its = (D) I made my own game in python
Which company is producing laptops nowadays? *
Cute
Aspire
Dell
Innovative
Answer:
dell
thanks for points
Given a positive integer n, the following rules will always create a sequence that ends with 1, called the hailstone sequence:If n is even, divide it by 2If n is odd, multiply it by 3 and add 1 (i.e. 3n +1)Continue until n is 1Write a program that reads an integer as input and prints the hailstone sequence starting with the integer entered. Format the output so that ten integers, each separated by a tab character (\t), are printed per line.The output format can be achieved as follows:print(n, end='\t')Ex: If the input is:
Which of the following represents the numeric value nine as a decimal number? ( 9 01001 ΟΝ Nine
Nine is represented as the digit "9" in numerical form. "01001" and "N Nine," the other values mentioned, do not correspond to the decimal value of nine.
What is output with a 0d start?Python output denotes a decimal integer by beginning with 0d.
What are some of the benefits of procedural programming over object-oriented programming, according to 6 points?A comparatively straightforward method for programming computers is procedural programming. This is why procedural programming languages are the starting point for many developers because they offer a coding base that the developer can use as they learn other languages, like an object-oriented language.
To know more about decimal visit:
https://brainly.com/question/28033049
#SPJ9
Which character is midway between the 3rd character from left and 6lh character from rights
a. 2
b. 3 ANS
c. 8
d. Y
Answer:
D
Explanation:
You're troubleshooting a computer that runs Windows 10. The operating system has halted and a blue screen is displayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue?
Answer:
Search for the error in Microsoft's knowledge base.
Explanation:
Search for the error in Microsoft's knowledge base or using an internet search engine to find a solution.
You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented?
Options are :
Smart card
Key fob
Biometric reader
Cable lock
Answer: Smart Card.
Explanation: A Personal Identity Verification device is a smart card that is used to store a user's digital identity and provide secure access to government computer systems. By requiring users to use a PIV device when sending digitally signed and encrypted emails, the government contractor is implementing the use of smart cards as a physical security measure. Smart cards are secure, portable, and can be used to provide strong authentication and encryption for a wide range of applications, including digital signatures and encrypted emails. They offer a high level of security by requiring a user to physically possess the card in order to access its stored information.
Question 10 of 10
What information system would be most useful in determining what direction
to go in the next two years?
A. Decision support system
B. Transaction processing system
C. Executive information system
D. Management information system
SUBMIT
Answer: C. Executive information system
Explanation: The information system that would be most useful in determining what direction to go in the next two years is an Executive Information System (EIS). An EIS is designed to provide senior management with the information they need to make strategic decisions.
An Executive Information System (EIS) would be the most useful information system in determining what direction to go in the next two years. So, Option C is true.
Given that,
Most useful information about determining what direction to go in the next two years.
Since Executive Information System is specifically designed to provide senior executives with the necessary information and insights to support strategic decision-making.
It consolidates data from various sources, both internal and external, and presents it in a user-friendly format, such as dashboards or reports.
This enables executives to analyze trends, identify opportunities, and make informed decisions about the future direction of the organization.
EIS typically focuses on high-level, strategic information and is tailored to meet the specific needs of top-level executives.
So, the correct option is,
C. Executive information system
To learn more about Executive information systems visit:
https://brainly.com/question/16665679
#SPJ6
A computer has a cache, main memory, and a disk. If a referenced word is in the cache, 20ns are required to access it. If it is in main memory but not in the cache (called cache miss), 80ns are needed to load it into the cache (this includes the time to originally check the cache), and then reference is started again. If the word is not in main memory, 25ms are required to fetch the word from disk, followed by 80ns to copy it to the cache, and then the reference is started again. The cache hit ratio is 0.95 and the main memory hit ratio is 0.8. What is the average time in ns required to access a referenced word on this system (state the number only without the unit, round to the closest integer -- for instance of your answer is 100.7 ns, enter: 101)
Answer:
250,024
Explanation:
We will have to calculate cache access, main memory access and disk access. Then add up the sum of all these to get the answer
1. Cache access
= Time x hit ratio
= 0.95 x 20 ns
= 19ns
2. Main memory access
= (1-cache hit ratio)*(memory hit ratio)*(cache time + memory time)
= (1-0.95)*0.8*(20ns + 80ns)
= 0.05 x 0.8 x 100
= 4ns
3. Disk access =
(1-cache ratio)*(1-memory ratio)*(cache time + memory time + disk time)
Disk time = 25ms = 25x1000000 = 25000000ns
= (1-0.95)*(1-0.8)*(20+80+25000000)
= 0.05x0.2x25000100
= 250001 ns
When we sum all of these values
Average time = 19ns + 4ns + 250001ns
= 250,024ns
This is the average time required to access a referenced word