No, as a User, one CANOT sell Acrobat Reader software to the other users.
What is Adobe Reader?Acrobat Reader is a software developed by Adobe and is generally available as a free PDF viewer.
While individuals can use Acrobat Reader for free,selling the software itself would be in violation of Adobe's terms of use and licensing agreements.
Therefore, selling Acrobat Reader to other users would not be legally permissible or aligned with Adobe's distribution model.
Learn more about Adobe Reader at:
https://brainly.com/question/12150428
#SPJ1
Write 5 paragraphs on one of the following topics
List of chose any one topics:
The history of relational database technology;
Data modeling and database design tools;
A comparison of the Oracle, IBM, and Microsoft, Relational Database Management Systems (RDBMS);
Database Management Systems;
High Quality, Low-Cost Business Database Solutions (with example);
First paragraph: State your thesis and the purpose of the paper clearly. What is the chief reason you are writing about? ...
second and third paragraph — This is where you present your arguments to support your thesis.
Conclusion — Restate or reword your thesis, and describe all benefits of your selected technology for the particular business or in
add reference or citation
Topic: Database Management Systems
Thesis Statement: Database Management Systems (DBMS) have revolutionized the way data is stored, managed, and accessed. The purpose of this paper is to explore the evolution of DBMS, their types, and their importance in modern-day businesses.
The advent of DBMS dates back to the 1960s when organizations began experiencing challenges in managing and retrieving data from the then prevalent file-based systems. DBMS introduced a systematic approach to data storage, retrieval, and manipulation, enabling businesses to improve their operations and decision-making processes. Today, DBMS has become an integral part of modern-day businesses, providing a scalable, secure, and efficient platform for data management.
There are various types of DBMS, including relational, hierarchical, object-oriented, and NoSQL, each suited for specific use cases. Relational DBMS (RDBMS) are the most popular type of DBMS, used in businesses to store structured data in tables with predefined relationships. Oracle, IBM, and Microsoft are among the most prominent vendors of RDBMS. Each vendor offers unique features, making it essential for businesses to consider their specific requirements before selecting a DBMS.
DBMS plays a crucial role in businesses, allowing them to store and manage vast amounts of data, improving their efficiency and decision-making. With the emergence of cloud-based DBMS, businesses can now access scalable, reliable, and secure data storage services without incurring huge capital expenditures. DBMS has also enabled businesses to leverage big data analytics, providing insights that help organizations stay ahead of the competition.
In conclusion, DBMS has transformed the way businesses store, manage and access data. It has become an essential tool for businesses of all sizes, providing a scalable, secure, and efficient platform for data management. With the increasing need for data-driven decision-making, the importance of DBMS is expected to continue growing in the future.
Reference:
Elmasri, R., & Navathe, S. B. (2015). Fundamentals of database systems. Pearson.
3
Drag each label to the correct location on the image.
Pauline has decided that she wants to work in public relations, but she wants to work in the nonprofit sector. Help her decide which organizations to
shortlist by categorizing the organizations as commercial or nonprofit
All rights reserved
hotels
restaurants convention and visitors bureaus
information kiosks
Commercial Sector
airlines travel agencies
Nonprofit Sector
To categorize the organizations as commercial or nonprofit for Pauline's shortlisting in the public relations field, we can place the labels accordingly:
Commercial Sector:
- hotels
- restaurants
- convention and visitors bureaus
- information kiosks
- airlines
- travel agencies
Nonprofit Sector:
- All rights reserved
In the commercial sector, hotels, restaurants, convention and visitors bureaus, information kiosks, airlines, and travel agencies are profit-oriented businesses that operate in various industries. These organizations aim to generate revenue and maximize profitability through their products or services.
On the other hand, the label "All rights reserved" suggests an indication of copyright ownership or intellectual property protection, which is not directly related to a specific sector or organization type. Therefore, it does not fall into either the commercial or nonprofit sector category.
In Pauline's case, as she wants to work in public relations within the nonprofit sector, she should focus on shortlisting organizations that fall under the nonprofit sector. These could include charitable organizations, foundations, non-governmental organizations (NGOs), advocacy groups, or community-based organizations that operate with a mission to serve the public good rather than pursuing profits.
By categorizing organizations as commercial or nonprofit, Pauline can streamline her job search and target her efforts towards the specific sector that aligns with her career goals in public relations within the nonprofit realm.
For more such questions on commercial, click on:
https://brainly.com/question/1432446
#SPJ8
Which option describes wearable technology?
A.
the incorporation of technology into objects we use regularly
B.
rugged technology that can withstand the elements without much damage
C.
computing systems that derive energy from the user's biological processes
D.
mobile technology that is extremely portable
E.
extremely small and powerful computing systems
Answer:
D
Explanation:
it say mobile
Answer:
I believe its D.) Mobile technology that is extremely portable
give one major environmental and
one energy problem kenya faces as far as computer installations are concerned?
One considerable predicament that Kenya encounters pertaining to the utilization of computers is managing electronic waste (e-waste).
Why is this a problem?The mounting number of electronic devices and machines emphasizes upon responsibly discarding outdated or defective hardware in order to avoid environmental degradation.
E-waste harbors hazardous materials such as lead, mercury, and cadmium which can pollute soil and water resources, thereby risking human health and ecosystem sustainability.
Consequently, a significant energy drawback with computer use within Kenya pertains to the insufficiency or instability of electrical power supply.
Read more about computer installations here:
https://brainly.com/question/11430725
#SPJ1
What are technology trends in science check all that apply
Answer:
3D Printing Molecules.
Adaptive Assurance of Autonomous Systems.
Neuromorphic Computing (new types of hardware) and Biomimetic AI.
Limits of Quantum Computing: Decoherence and use of Machine Learning.
Ethically Trustworthy AI & Anonymous Analytics.
Explanation:
evaluate the logical expression of the following, given a= 2 , b=3, c=5.
1. (a>b) || (c==5)
2.(a<b) && (b<c)
Answer:
1. True
2. True
Explanation:
Problema 2018.3.2 - Cheated dice
Costica is on vacation and his parents sent him to the country. There he gets terribly bored and looking through his grandfather's closet, he came across a bag full of dice. Having no one to play dice with, but it seemed to him that some of the dice were heavier than the others, Costica chose a dice and started to test it by throwing it with him and noting how many times each face fell. He then tries to figure out whether the dice are rolled or not, considering that the difference between the maximum number of appearances of one face and the minimum number of occurrences (of any other face) should not exceed 10% of the total number of throws.
Requirement
Given a number N of dice rolls and then N natural numbers in the range [1: 6] representing the numbers obtained on the rolls, determine whether the dice is tricked according to the above condition.
Input data
From the input (stdin stream) on the first line reads the natural number N, representing the number of rolls. On the following N lines there is a natural number in the range [1: 6] representing the numbers obtained on throws.
Output data
At the output (stdout stream) a single number will be displayed, 0 or 1, 0 if the dice are normal, and 1 if it is cheated.
ATTENTION to the requirement of the problem: the results must be displayed EXACTLY in the way indicated! In other words, nothing will be displayed on the standard output stream in addition to the problem requirement; as a result of the automatic evaluation, any additional character displayed, or a display different from the one indicated, will lead to an erroneous result and therefore to the qualification "Rejected".
Restrictions and clarifications
1. 10 ≤ N ≤ 100
2. Caution: Depending on the programming language chosen, the file containing the code must have one of the extensions .c, .cpp, .java, or .m. The web editor will not automatically add these extensions and their absence makes it impossible to compile the program!
3. Attention: The source file must be named by the candidate as: . where name is the last name of the candidate and the extension (ext) is the one chosen according to the previous point. Beware of Java language restrictions on class name and file name!
Input data
10
6
6
6
6
6
6
6
6
6
6
Output data
1
Roll the dice 10 times, all 10 rolls produce the number 6. Because the difference between the maximum number of rolls (10) and the minimum number of rolls (0) is strictly greater than 10% of the total number of rolls (10% of 10 is 1), we conclude that the dice are oiled.
Input data
10
1
4
2
5
4
6
2
1
3
3
Output data
0
Throw the dice 10 times and get: 1 twice, 2 twice, 3 twice, 4 twice, 5 and 6 at a time. Because the difference between the maximum number of appearances (two) and the minimum number of occurrences (one) is less than or equal to 10% of the total number of throws (10% of 10 is 1), we conclude that the dice are not deceived.
Answer:
???????????
Explanation:
??????:& oh??
var nums = [1,1, 2, 3, 5, 8, 13, 21];
var copyNums = [1,1, 2, 3, 5, 8, 13, 21];
for(var i=0; i < copyNums.length; i++){
if(copyNums[i] == 1){
insertItem(copyNums,i,"hello");
}
}
This code will create an infinite loop. Why does it create an infinite loop?
Answer:
Explanation:
This code creates an infinite loop because it is detecting that the first value of copyNums is 1, therefore it runs the insertItem code. This code then adds the value "hello" to the array in position i which would be 0. Then moves to the next value of the array, but since the element "hello" pushed the value 1 to the next index then the code just repeats itself with the same value of 1. This continues to happen because every time the value "hello" is added it simply pushes the 1 to the next index and repeats the same code.
Answer:
\(var nums = [1,1, 2, 3, 5, 8, 13, 21];
var copyNums = [1,1, 2, 3, 5, 8, 13, 21];
for(var i=0; i < copyNums.length; i++){
if(copyNums[i] == 1){
insertItem(copyNums,i,"hello");
}
}\)
Abram needs to put multiple sets of data into the same type of calculations for different companies, so he will create a
template. Which components of the worksheet will he keep?
Answer:
Everything except data
Explanation:
on edge2020 it is correct
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
Ahmar started a new website that is going viral and attracting tons of visitors. He can’t fit the server he needs in his apartment, so he is going to use a ______.
modern
router
cloud server
Answer:
Cloud Server
Explanation:
You cant Host / Port forward (using APACHE) using a Modem
Its way better to use Cloud Hosting bcuz its Easy to Setup and Cheap
Create a class to represent the locker and another class to represent the combination lock. The Locker class will include an attribute that is of type CombinationLock. Each class must include a constructor with no input argument and also a constructor that requires input arguments for all attributes. Each class must include the appropriate set and get methods. Each class must include a method to print out all attributes.
Answer:
Class Locker
public class Locker {
int lockno;
String student;
int booksno;
private CombinationLock comblock = new CombinationLock();
public Locker() {
lockno = 0;
student= "No Name";
booksno = 0;
comblock.reset(); }
public Locker(int lockno, String student, int booksno,
CombinationLock comblock) {
super();
this.lockno= lockno;
this.student= student;
this.booksno= booksno;
this.comblock= comblock; }
public int getLockNo() {
return lockno; }
public void setLockNo(int lockno) {
this.lockno= lockno; }
public String getName() {
return student; }
public void setName(String student) {
this.student = student; }
public int getBooksNumber() {
return booksno; }
public void setBooksNumber(int booksno) {
this.booksno= booksno; }
public String getComblock() {
return comblock.toString(); }
public void setComblock(int no1, int no2, int no3) {
this.comblock.setNo1(no1);
this.comblock.setNo2(no2);
this.comblock.setNo3(no3); }
public String printValues() {
return "Locker [lockno=" + lockno+ ", student="
+ student+ ", booksno=" + booksno
+ ", comblock=" + comblock+ "]"; } }
The class Locker has attributes lockno for lock number, student for students names and bookno for recording number of books. Locker class also an attribute of type CombinationLock named as comblock. Locker class includes a constructor Locker() with no input argument and also a constructor Locker() that requires input arguments for all attributes lockno, student, booksno and comblock. super() calls on immediate parent class constructor. Class Locker contains the following set methods: setLockNo, setName, setBooksNumber and setComblock. Class Locker contains the following get methods: getLockNo, getName, getBooksNumber and getComblock. printValues() method displays the values of attributes.
Explanation:
Class CombinationLock
*/ CombinationLock has attributes no1, no2 and no3. It has a constructor CombinationLock() with no input argument and also a constructor CombinationLock() that requires input arguments for attributes no1 no2 and no3. Class CombinationLock contains the following set methods: setNo1, setNo2 and setNo3. The class contains the following get methods: getNo1, getNo2 and getNo3. The class includes a method printValues() to print out all attributes.
public class CombinationLock {
int no1;
int no2;
int no3;
public CombinationLock() {
this.no1= 0;
this.no2= 0;
this.no3= 0; }
public CombinationLock(int no1, int no2, int no3) {
super();
this.no1= no1;
this.no2= no2;
this.no3= no3; }
public int getNo1() {
return no1; }
public void setNo1(int no1) {
this.no1= no1; }
public int getNo2() {
return no2; }
public void setNo2(int no2) {
this.no2= no2; }
public int getNo3() {
return no3; }
public void setNo3(int no3) {
this.no3= no3; }
public void reset() {
this.no1=0;
this.no2=0;
this.no3=0; }
public String printValues() {
return "CombinationLock [no1=" + no1+ ", no2=" + no2
+ ", no3=" + no3+ "]"; } }
0 2. The X axis in Scratch is?
Left and right
Both up/down and left/right
Neither up/down nor left/right
Up and down
Please help!
Answer:
Left and right
Explanation:
Y is the up and down value, x is the right and left value
How do I give brainliest (I’m new) .Actually answer my question!
Answer: I’m sorry, but what is your question? Then, I may be able to help you. Also, add a link (image)!
Explanation: Thank You!
Answer:
Hi! There has to be two answers to your question. That is the only way you are able to give a brainliest. You can give a brainliest if you believe a person who wrote an answer to your question fully detailed and organized. It has to answer your question.
Hope this helps! :D
Your friend is using Internet Explorer to send and receive email using her Hotmail account. She received a Word document attached to an email message from a business associate. She double-clicked the Word attachment and spent a couple of hours editing it, saving the document as she worked. Then she closed the document. But where’s the document now? When she later needed it, she searched her email account online and the Documents folder on her hard drive, but she could not find the document. She called you in a panic asking you to help her find her lost document.
Answer:
Temporary Internet Files folder
Explanation:
Assuming that your friend is using the Microsoft Windows 10 operating system, then this document would have gotten saved in the Temporary Internet Files folder within the operating system. This folder can be located within the following address in the operating system
C:\Users\[username]\AppData\Local\Microsoft\Windows\INetCache
Navigating to this address would help you find the folder and inside that should be the Microsoft Word document that you have used in your Internet Explorer Browser. This folder is where all browser files get saved when they are not explicitly downloaded to a specific folder but are still used within the browser.
Please help me understand what I'm doing wrong in my python code, its returning a [] in the written file.
# You work at a low latency trading firm and are asked to deliver the order book data provided in order_book_data.txt to a superior
# The problem is that the data isn't formatted correctly. Please complete the following steps to apropriately format the data
# Notice, the first column is a ticker, the second column is a date, the third column is a Bid, the fourth column is an Ask, and the fifth column is a currency type
# 1. Open order_book_data.txt
# 2. Remove the order book lines. i.e. ***** Order Book: ###### *****
# 3. Get rid empty lines
# 4. Get rid of spaces
# 5. Notice that there are two currencies in the order book; USD and YEN. Please convert both the Bid and Ask price to USD (if not already)
# The Bid and Ask are the 3rd and 4th column, respectively
# 6. Create a header line Ticker, Date, Bid, Ask
# 7. Save the header line and propely formatted lines to a comma seperated value file called mktDataFormat.csv
Answer:
There are several issues with the code that could be causing it to return an empty file.
Indentation errors: Python relies on indentation to indicate blocks of code, so it's important to make sure that the code is indented correctly. In your code, the if statement and columnA = float(columnA) line are not indented properly.Missing append statement: After converting the Bid and Ask prices to USD, the code is not actually adding them to the data list.Writing the wrong variable: In the last line of the code, you are writing the entire data list as a string, instead of iterating through the list and writing each element as a string.Explanation:
file = open("order_book_data.txt", "r")
data = []
lines = file.readlines()
for line in lines:
if line.strip() == '':
continue
if ("***" in line):
continue
column = line.strip().split(",")
columnA = float(column[2])
columnB = float(column[3])
if column[4] == "YEN":
columnA = columnA * 0.0075
columnB = columnB * 0.0075
column[2] = str(columnA)
column[3] = str(columnB)
data.append(",".join(column))
header = "Ticker,Date,Bid,Ask\n"
file.close()
file2 = open("mktlinesFormat.csv", "w")
file2.write(header)
for line in data:
file2.write(line + "\n")
file2.close()
In this code, i use continue statements to skip over the order book lines and empty lines. then i split each line into a list of columns, convert the Bid and Ask prices to USD if necessary, and join the columns back into a comma-separated string. then append the formatted string to the data list.
After processing all the lines, i write the header line and each formatted line to a new file, one line at a time. Note that add a newline character \n to the end of each line to ensure that each line is written on a separate line in the file.
6. In terms of a career, the word benefits refers to how much vacation and salary bonuses a person gets. True False
It is false that in terms of a career, the word benefits refers to how much vacation and salary bonuses a person gets.
The term "benefits" in the context of a profession comprises a wider range of offerings supplied by a company to an employee, even if vacation and pay bonuses might be included in the benefits package.
Benefits frequently involve additional remuneration and benefits in addition to vacation time and salary increases.
Health insurance, retirement plans, paid time off, flexible work schedules, tuition reimbursement, employee assistance programmes, wellness programmes, and other benefits are a few examples of these.
The benefits package is intended to draw in new hires, keep them on board, improve job satisfaction, and support workers' health and work-life balance. Therefore, vacation time and incentive pay are just a portion of the total benefits that an employer provides.
Thus, the given statement is false.
For more details regarding career, visit:
https://brainly.com/question/8825832
#SPJ1
The coordinates for the section element need not be defined as long as its position is set to
relative.
Explanation:The coordinates for the section element need not be defined as long as its position is set to relative.
If the position is set as relative, then it will have no effect on the positioning attributes, it will consider as static position. If positioning is mentioned explicitly like top: 20px; then it will position 10 pixels down from where it is located. An ability for positional shifts is extremely helpful.
Two things happen when an element is set as relative, one is it introduces the ability to use z-index on that element, second is it limits the scope of absolutely positioned child elements.
an employee is using a desk phone that is connected only via a network cable. which of the followingtechnologies is the phone using?
The desk phone that is connected only via a network cable is likely using the Voice over Internet Protocol (VoIP) technology.
VoIP is a digital communication technology that allows voice communication over an internet protocol (IP) network, such as the internet or a local area network (LAN).In a VoIP system, the phone digitizes and compresses the voice signal into data packets and transmits them over the IP network. This allows for a more efficient use of network resources and enables a wide range of additional features, such as voicemail, call forwarding, and video conferencing.VoIP technology has become increasingly popular in recent years due to its cost-effectiveness and flexibility. Many businesses are adopting VoIP systems to replace traditional landline phone systems, as they provide more features and lower costs.
To learn more about Protocol click the link below:
brainly.com/question/30588697
#SPJ4
A small research company in Pittsburgh is working to develop a new method of mass storage to replace current storage technology. Four engineers and an office manager work there. The engineers are highly skilled professionals, and the office manager is a capable computer user. The company has a high-bandwidth Internet connection because employees must conduct research frequently. The employees have hopes of making a breakthrough and bringing the company public within the next two years. You have been hired as a security consultant to assess the company's needs.
Instructions: Write a paper recommending what type of security policy should be used (open, moderately restrictive, or highly restrictive) and what security technologies should be used. On what areas should the security policy focus (physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?
Upload your document here: Be sure you spell check your paper and be sure to note any resources you've used other than the book.
The company has a high-bandwidth Internet connection, and the employees frequently conduct research, making them vulnerable to cyber threats.
What is security policy?A security policy is a document that outlines an organization's rules, expectations, and overall approach to maintaining the confidentiality, integrity, and availability of its data.
The company intends to go public within the next two years, so having a strong security policy in place is critical.
In this paper, I will recommend what type of security policy to use, what security technologies to implement, and what areas of the security policy to focus on.
To prevent unauthorized access to its network and systems, the company should implement strict password policies.
Thus, these all points can be added to the paper.
For more details regarding security policies, visit:
https://brainly.com/question/14618107
#SPJ1
What are the 5 types of scanning?
The 5 types of scanning :
Flatbed Scanners.Sheetfed Scanners.Handheld Scanner. Drum Scanner. Photo Scanner.What is scanning ?To scan a text is to skim through it rapidly in search of a particular piece of information. Scanning is frequently employed in daily life, such as when searching up a term in a dictionary or locating a friend's name in your phone's contacts list.There are essentially three forms of scanning. These include vulnerability scanning, port scanning, and network scanning.Drum scanners, flatbed scanners, and handheld scanners are the three types of scanners that are available. Drum scanners are usually utilised in the publishing business to print high-quality photos, whereas flatbed scanners are typically found in workplaces and schools.The fundamental scanning procedure consists of three steps: scan, register, and detail.Learn more about scanning refer to :
https://brainly.com/question/24937533
#SPJ4
Explain the importance of internal and external communication when managing a cyber-attack.
When managing a cyber-attack, effective communication is crucial for mitigating the attack's impact and minimizing damage to the organization's reputation and operations. Both internal and external communication plays a significant role in managing a cyber-attack, and their importance can be explained as follows:
Internal Communication: Internal communication is vital for ensuring that everyone in the organization is aware of the cyber-attack, its impact, and their roles and responsibilities in managing the incident. Some key aspects of internal communication during a cyber-attack include:
Rapid communication: The internal communication channels should be well-established and tested regularly, to ensure that information can be disseminated quickly and accurately in the event of an attack.
Coordination: Internal communication helps to ensure that different teams and stakeholders are working together effectively to respond to the attack. For example, the IT team may need to work closely with the legal team to address any legal implications of the attack.
Empowerment: Clear and effective internal communication can help to empower employees to take the necessary actions to protect the organization's systems and data. For example, employees may need to be instructed to change their passwords or avoid opening suspicious emails.
External Communication: External communication is equally important, as it helps to maintain trust and transparency with stakeholders outside of the organization. Some key aspects of external communication during a cyber-attack include:
Crisis management: External communication helps to manage the crisis by communicating with stakeholders such as customers, partners, regulators, and the media. It's essential to be transparent about the attack and provide regular updates on the organization's response.
Reputation management: The organization's reputation may be at risk during a cyber-attack, and external communication can help to mitigate this risk. For example, prompt communication can demonstrate that the organization is taking the attack seriously and working to protect its customers and partners.
Legal compliance: External communication may be required by law or regulatory bodies. Failure to communicate promptly and effectively can result in legal and financial penalties.
In summary, effective communication, both internal and external, is essential for managing a cyber-attack. It helps to coordinate the response, empower employees, manage the crisis, maintain the organization's reputation, and comply with legal and regulatory requirements.
mips Write a program that asks the user for an integer between 0 and 100 that represents a number of cents. Convert that number of cents to the equivalent number of quarters, dimes, nickels, and pennies. Then output the maximum number of quarters that will fit the amount, then the maximum number of dimes that will fit into what then remains, and so on. If the amount entered is negative, write an error message and quit. Amounts greater than 100 are OK (the user will get many quarters.) Use extended assembly instructions and exception handler services.
Answer:
Explanation:
The following code is written in python and divides the amount of cents enterred in as an input into the correct amount of quarters, dimes, nickels and pennies. Finally, printing out all the values.
import math
#First we need to define the value of each coin
penny = 1
nickel = 5
dime = 10
quarter = 25
#Here we define the variables to hold the max number of each coin
quarters = 0
dimes = 0
nickels = 0
pennys = 0
cents = int(input("Please enter an amount of money you have in cents: "))
if cents > 0 and cents <= 100:
if cents >= 25:
quarters = cents / quarter
cents = cents % quarter
if cents >= 10:
dimes = cents/dime
cents = cents % dime
if cents >= 5:
nickels = cents /nickel
cents = cents % nickel
if cents > 0:
pennys = cents / penny
cents = 0
print("The coins are: "
"\nQuarters", math.floor(quarters),
"\nDimes", math.floor(dimes), "\nNickels", math.floor(nickels), "\nPennies", math.floor(pennys))
else:
print("wrong value")
Assume that your organization wants to hire new instructors for your project management course. Develop a list of quality standards that you could use in making this hiring decision. Suppose that some current instructors do not meet these standards. Provide suggestions for how you would handle this situation.
Your paper should be 2-3 pages long
Explanation:
The hiring process of the new instructors includes several quality standards: 1. The qualification: All the persons should have a good academic qualification, certification course related to project management. The list of quality standards used in the selection process of the instructors includes the person's academic qualifications which include the degrees he has been awarded and the major subjects in them and also from which university.
Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "supercenter" in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis, who will manage the new operation.
Background
Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready to address system implementation tasks, including quality assurance, structure charts, testing, training, data conversion, system changeover, and post-implementation evaluation.
Tasks
1. You have asked Gray Lewis to contribute to the user manual for the new system. He suggested that you include a section of frequently asked questions (FAQs), which you also could include in the online documentation. Prepare 10 FAQs and answers for use in the printed user manual and context-sensitive Help screens.
2. Suggest a changeover method for the new billing system and provide specific reasons to support your choice. If you recommend phased operation, specify the order in which you would implement the modules. If your recommendation is for pilot operation, specify the department or area you would select as the pilot site and justify your choice.
Answer:
yes you can and i can yes
Explanation:
Write a Coral program using integers userNum and x as input, and output userNum divided by x four times.
Ex: If the input is 2000 2, the output is:
1000 500 250 125
Answer:
second_int = "Enter the second integer: "
usernum = int(input("Enter the first integer: "))
x = int(input(second_int))
usernum = usernum // x
print(usernum, end= ' ')
usernum = usernum // x
print(usernum, end= ' ')
usernum = usernum // x
print(usernum, end= ' ')
usernum = usernum // x
print(usernum)
Explanation:
im good
Issues in plagiarism and copyright when blogging can be prevented. True or false
Answer:
It’s false
Explanation:
I can’t explain it’s too confusing
____allow(s) visually impaired users to access magnified content on the screen in relation to other parts of the screen.
Head pointers
Screen magnifiers
Tracking devices
Zoom features
Answer: screen magnifiers
Explanation: got it right on edgen
Which type of worker has a career that can be important in both maintenance/operations services and construction services
The type of worker that has a career that can be important in both maintenance/operations services and construction services is a skilled tradesperson.
Skilled tradespeople are individuals who are trained and experienced in a particular craft or trade, such as plumbing, electrical work, HVAC, carpentry, and masonry, among others.
In maintenance/operations services, skilled tradespeople are essential for repairing and maintaining buildings, equipment, and systems.
They are responsible for diagnosing and fixing problems, ensuring that equipment is functioning properly, and making sure that buildings and facilities are safe and operational.
In construction services, skilled tradespeople play a crucial role in the construction process.
They are responsible for building and installing various components of a construction project, such as framing, plumbing, electrical wiring, and HVAC systems.
They work closely with architects, engineers, and other construction professionals to ensure that projects are completed on time, on budget, and according to specifications.
For more questions on tradesperson
https://brainly.com/question/31449184
#SPJ8
Largest and Smallest
Write a Flowgorithm program that performs the following tasks:
o Utilizing nested loops
o Outside loop keeps the program running until told to stop
o Inside loop asks for input of number, positive or negative
o Input of a zero (0) terminates inside loop
o Display the largest and smallest number entered when inside loop is terminated
o Ask if the user wants to enter new set of numbers
Remember the following:
declare necessary variables & constants
use clear prompts for your input
use integers for the input numbers
clearly label the largest and smallest number on output
the zero to stop the inner loop is not to be considered the lowest number, it just stops the inner loop
consider a "priming read" to set initial values of large and small
The program based on the given question prompt is given below:
The ProgramBeginning
// initiate variables
largest = -999999999
smallest = 999999999
interruption = false
while not interruption do
// reset variables for fresh set of numbers
hugest_set = -999999999
pettiest_set = 999999999
// input cycle for gathering of numbers
duplicated
output "Input a number (0 to cease collection):"
input figure
if figure != 0 then
if figure > hugest_set then
hugest_set = figure
end if
if figure < pettiest_set then
pettiest_set = figure
end if
end if
until figure = 0
// examine whether this bunch of figures accommodates new boundaries
if hugest_set > largest then
largest = hugest_set
end if
if pettiest_set < smallest then
smallest = pettiest_set
end if
// produce the hugest and pettiest aspects for this set of numbers
output "Foremost number within this set:", hugest_set
output "Minimum number within this set:", pettiest_set
// solicit whether the user wants to persist
output "Do you wish to insert a new swarm of figures? (Y/N):"
input answer
if answer = "N" or answer = "n" then
interruption = true
end if
end while
// deliver grand total hugest and least parts
output "Complete most extensive amount:", largest
output "Overall minimum magnitude:", smallest
Read more about flowcharts here:
https://brainly.com/question/6532130
#SPJ1