We can sell the Acrobat Reader software to the other users”. Do you agree with this statement? Justify your answer.

Answers

Answer 1

No, as a User, one CANOT sell Acrobat Reader software to the other users.

What is Adobe Reader?

Acrobat Reader   is a software developed by Adobe and is generally available as a free   PDF viewer.

While individuals can use Acrobat Reader for free,selling the software itself would be in violation of   Adobe's terms of use and licensing agreements.

Therefore, selling Acrobat Reader to other users would not be legally permissible or aligned with Adobe's distribution model.

Learn more about Adobe Reader at:

https://brainly.com/question/12150428

#SPJ1


Related Questions

Write 5 paragraphs on one of the following topics


List of chose any one topics:

The history of relational database technology;

Data modeling and database design tools;

A comparison of the Oracle, IBM, and Microsoft, Relational Database Management Systems (RDBMS);

Database Management Systems;

High Quality, Low-Cost Business Database Solutions (with example);



First paragraph: State your thesis and the purpose of the paper clearly. What is the chief reason you are writing about? ...

second and third paragraph — This is where you present your arguments to support your thesis.

Conclusion — Restate or reword your thesis, and describe all benefits of your selected technology for the particular business or in

add reference or citation

Answers

Topic: Database Management Systems

Thesis Statement: Database Management Systems (DBMS) have revolutionized the way data is stored, managed, and accessed. The purpose of this paper is to explore the evolution of DBMS, their types, and their importance in modern-day businesses.

The advent of DBMS dates back to the 1960s when organizations began experiencing challenges in managing and retrieving data from the then prevalent file-based systems. DBMS introduced a systematic approach to data storage, retrieval, and manipulation, enabling businesses to improve their operations and decision-making processes. Today, DBMS has become an integral part of modern-day businesses, providing a scalable, secure, and efficient platform for data management.

There are various types of DBMS, including relational, hierarchical, object-oriented, and NoSQL, each suited for specific use cases. Relational DBMS (RDBMS) are the most popular type of DBMS, used in businesses to store structured data in tables with predefined relationships. Oracle, IBM, and Microsoft are among the most prominent vendors of RDBMS. Each vendor offers unique features, making it essential for businesses to consider their specific requirements before selecting a DBMS.

DBMS plays a crucial role in businesses, allowing them to store and manage vast amounts of data, improving their efficiency and decision-making. With the emergence of cloud-based DBMS, businesses can now access scalable, reliable, and secure data storage services without incurring huge capital expenditures. DBMS has also enabled businesses to leverage big data analytics, providing insights that help organizations stay ahead of the competition.

In conclusion, DBMS has transformed the way businesses store, manage and access data. It has become an essential tool for businesses of all sizes, providing a scalable, secure, and efficient platform for data management. With the increasing need for data-driven decision-making, the importance of DBMS is expected to continue growing in the future.

Reference:

Elmasri, R., & Navathe, S. B. (2015). Fundamentals of database systems. Pearson.

3
Drag each label to the correct location on the image.
Pauline has decided that she wants to work in public relations, but she wants to work in the nonprofit sector. Help her decide which organizations to
shortlist by categorizing the organizations as commercial or nonprofit
All rights reserved
hotels
restaurants convention and visitors bureaus
information kiosks
Commercial Sector
airlines travel agencies
Nonprofit Sector

Answers

To categorize the organizations as commercial or nonprofit for Pauline's shortlisting in the public relations field, we can place the labels accordingly:

Commercial Sector:

- hotels

- restaurants

- convention and visitors bureaus

- information kiosks

- airlines

- travel agencies

Nonprofit Sector:

- All rights reserved

In the commercial sector, hotels, restaurants, convention and visitors bureaus, information kiosks, airlines, and travel agencies are profit-oriented businesses that operate in various industries. These organizations aim to generate revenue and maximize profitability through their products or services.

On the other hand, the label "All rights reserved" suggests an indication of copyright ownership or intellectual property protection, which is not directly related to a specific sector or organization type. Therefore, it does not fall into either the commercial or nonprofit sector category.

In Pauline's case, as she wants to work in public relations within the nonprofit sector, she should focus on shortlisting organizations that fall under the nonprofit sector. These could include charitable organizations, foundations, non-governmental organizations (NGOs), advocacy groups, or community-based organizations that operate with a mission to serve the public good rather than pursuing profits.

By categorizing organizations as commercial or nonprofit, Pauline can streamline her job search and target her efforts towards the specific sector that aligns with her career goals in public relations within the nonprofit realm.

For more such questions on commercial, click on:

https://brainly.com/question/1432446

#SPJ8

Which option describes wearable technology?
A.
the incorporation of technology into objects we use regularly
B.
rugged technology that can withstand the elements without much damage
C.
computing systems that derive energy from the user's biological processes
D.
mobile technology that is extremely portable
E.
extremely small and powerful computing systems

Answers

Answer:

D

Explanation:

it say mobile

Answer:

I believe its D.) Mobile technology that is extremely portable

give one major environmental and
one energy problem kenya faces as far as computer installations are concerned?​

Answers

One considerable predicament that Kenya encounters pertaining to the utilization of computers is managing electronic waste (e-waste).

Why is this a problem?

The mounting number of electronic devices and machines emphasizes upon responsibly discarding outdated or defective hardware in order to avoid environmental degradation.

E-waste harbors hazardous materials such as lead, mercury, and cadmium which can pollute soil and water resources, thereby risking human health and ecosystem sustainability.

Consequently, a significant energy drawback with computer use within Kenya pertains to the insufficiency or instability of electrical power supply.

Read more about computer installations here:

https://brainly.com/question/11430725

#SPJ1

What are technology trends in science check all that apply

Answers

Answer:

3D Printing Molecules.

Adaptive Assurance of Autonomous Systems.

Neuromorphic Computing (new types of hardware) and Biomimetic AI.

Limits of Quantum Computing: Decoherence and use of Machine Learning.

Ethically Trustworthy AI & Anonymous Analytics.

Explanation:

evaluate the logical expression of the following, given a= 2 , b=3, c=5.
1. (a>b) || (c==5)
2.(a<b) && (b<c)​

Answers

Answer:

1. True

2. True

Explanation:

Problema 2018.3.2 - Cheated dice
Costica is on vacation and his parents sent him to the country. There he gets terribly bored and looking through his grandfather's closet, he came across a bag full of dice. Having no one to play dice with, but it seemed to him that some of the dice were heavier than the others, Costica chose a dice and started to test it by throwing it with him and noting how many times each face fell. He then tries to figure out whether the dice are rolled or not, considering that the difference between the maximum number of appearances of one face and the minimum number of occurrences (of any other face) should not exceed 10% of the total number of throws.
Requirement
Given a number N of dice rolls and then N natural numbers in the range [1: 6] representing the numbers obtained on the rolls, determine whether the dice is tricked according to the above condition.
Input data
From the input (stdin stream) on the first line reads the natural number N, representing the number of rolls. On the following N lines there is a natural number in the range [1: 6] representing the numbers obtained on throws.
Output data
At the output (stdout stream) a single number will be displayed, 0 or 1, 0 if the dice are normal, and 1 if it is cheated.
ATTENTION to the requirement of the problem: the results must be displayed EXACTLY in the way indicated! In other words, nothing will be displayed on the standard output stream in addition to the problem requirement; as a result of the automatic evaluation, any additional character displayed, or a display different from the one indicated, will lead to an erroneous result and therefore to the qualification "Rejected".
Restrictions and clarifications
1. 10 ≤ N ≤ 100
2. Caution: Depending on the programming language chosen, the file containing the code must have one of the extensions .c, .cpp, .java, or .m. The web editor will not automatically add these extensions and their absence makes it impossible to compile the program!
3. Attention: The source file must be named by the candidate as: . where name is the last name of the candidate and the extension (ext) is the one chosen according to the previous point. Beware of Java language restrictions on class name and file name!
Input data

10
6
6
6
6
6
6
6
6
6
6
Output data
1

Roll the dice 10 times, all 10 rolls produce the number 6. Because the difference between the maximum number of rolls (10) and the minimum number of rolls (0) is strictly greater than 10% of the total number of rolls (10% of 10 is 1), we conclude that the dice are oiled.

Input data
10
1
4
2
5
4
6
2
1
3
3
Output data
0

Throw the dice 10 times and get: 1 twice, 2 twice, 3 twice, 4 twice, 5 and 6 at a time. Because the difference between the maximum number of appearances (two) and the minimum number of occurrences (one) is less than or equal to 10% of the total number of throws (10% of 10 is 1), we conclude that the dice are not deceived.

Answers

Answer:

???????????

Explanation:

??????:& oh??

var nums = [1,1, 2, 3, 5, 8, 13, 21];
var copyNums = [1,1, 2, 3, 5, 8, 13, 21];
for(var i=0; i < copyNums.length; i++){
if(copyNums[i] == 1){
insertItem(copyNums,i,"hello");
}
}
This code will create an infinite loop. Why does it create an infinite loop?

Answers

Answer:

Explanation:

This code creates an infinite loop because it is detecting that the first value of copyNums is 1, therefore it runs the insertItem code. This code then adds the value "hello" to the array in position i which would be 0. Then moves to the next value of the array, but since the element "hello" pushed the value 1 to the next index then the code just repeats itself with the same value of 1. This continues to happen because every time the value "hello" is added it simply pushes the 1 to the next index and repeats the same code.

Answer:

\(var nums = [1,1, 2, 3, 5, 8, 13, 21];

var copyNums = [1,1, 2, 3, 5, 8, 13, 21];

for(var i=0; i < copyNums.length; i++){

if(copyNums[i] == 1){

insertItem(copyNums,i,"hello");

}

}\)

Abram needs to put multiple sets of data into the same type of calculations for different companies, so he will create a
template. Which components of the worksheet will he keep?

Answers

Answer:

Everything except data

Explanation:

on edge2020 it is correct

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

Ahmar started a new website that is going viral and attracting tons of visitors. He can’t fit the server he needs in his apartment, so he is going to use a ______.

modern
router
cloud server

Answers

Answer:

Cloud Server

Explanation:

You cant Host / Port forward (using APACHE) using a Modem

Its way better to use Cloud Hosting bcuz its Easy to Setup and Cheap

Create a class to represent the locker and another class to represent the combination lock. The Locker class will include an attribute that is of type CombinationLock. Each class must include a constructor with no input argument and also a constructor that requires input arguments for all attributes. Each class must include the appropriate set and get methods. Each class must include a method to print out all attributes.

Answers

Answer:

Class Locker

public class Locker {  

int lockno;  

String student;

int booksno;

private CombinationLock comblock = new CombinationLock();

public Locker() {

 lockno = 0;

 student= "No Name";

 booksno = 0;

 comblock.reset();  }

public Locker(int lockno, String student, int booksno,

  CombinationLock comblock) {

 super();

 this.lockno= lockno;

 this.student= student;

 this.booksno= booksno;

 this.comblock= comblock;  }

public int getLockNo() {

 return lockno;   }

public void setLockNo(int lockno) {

 this.lockno= lockno;  }

public String getName() {

 return student;  }

public void setName(String student) {

 this.student = student;  }

public int getBooksNumber() {

 return booksno;   }

public void setBooksNumber(int booksno) {

 this.booksno= booksno;  }

public String getComblock() {

 return comblock.toString();  }

public void setComblock(int no1, int no2, int no3) {

 this.comblock.setNo1(no1);  

 this.comblock.setNo2(no2);  

 this.comblock.setNo3(no3);   }

public String printValues() {

 return "Locker [lockno=" + lockno+ ", student="

   + student+ ", booksno=" + booksno

   + ", comblock=" + comblock+ "]";  }  }

The class Locker has attributes lockno for lock number, student for students names and bookno for recording number of books. Locker class also an attribute of type CombinationLock named as comblock. Locker class includes a constructor Locker() with no input argument and also a constructor Locker() that requires input arguments for all attributes lockno, student, booksno and comblock. super() calls on immediate parent class constructor. Class Locker contains the following set methods: setLockNo, setName, setBooksNumber and setComblock. Class Locker contains the following get methods: getLockNo, getName, getBooksNumber and getComblock. printValues() method displays the values of attributes.

Explanation:

Class CombinationLock

*/ CombinationLock has attributes no1, no2 and no3. It has a  constructor CombinationLock() with no input argument and also a constructor CombinationLock() that requires input arguments for attributes no1 no2 and no3. Class CombinationLock contains the following set methods: setNo1, setNo2 and setNo3. The class contains the following get methods: getNo1, getNo2 and getNo3. The class includes a method printValues() to print out all attributes.

public class CombinationLock {

int no1;

int no2;

int no3;  

public CombinationLock() {

 this.no1= 0;

 this.no2= 0;

 this.no3= 0;   }  

public CombinationLock(int no1, int no2, int no3) {

 super();

 this.no1= no1;

 this.no2= no2;

 this.no3= no3;  }

 

public int getNo1() {

 return no1;  }

public void setNo1(int no1) {

 this.no1= no1;  }

public int getNo2() {

 return no2;  }

public void setNo2(int no2) {

 this.no2= no2;  }

public int getNo3() {

 return no3;  }

public void setNo3(int no3) {

 this.no3= no3;  }

 

public void reset() {

 this.no1=0;

 this.no2=0;

 this.no3=0;  }

public String printValues() {

 return "CombinationLock [no1=" + no1+ ", no2=" +  no2

   + ", no3=" + no3+ "]";  }  }

0 2. The X axis in Scratch is?
Left and right
Both up/down and left/right
Neither up/down nor left/right
Up and down
Please help!

Answers

Answer:

Left and right

Explanation:

Y is the up and down value, x is the right and left value

How do I give brainliest (I’m new) .Actually answer my question!

Answers

Answer: I’m sorry, but what is your question? Then, I may be able to help you. Also, add a link (image)!

Explanation: Thank You!

Answer:

Hi! There has to be two answers to your question. That is the only way you are able to give a brainliest. You can give a brainliest if you believe a person who wrote an answer to your question fully detailed and organized. It has to answer your question.

Hope this helps! :D

Your friend is using Internet Explorer to send and receive email using her Hotmail account. She received a Word document attached to an email message from a business associate. She double-clicked the Word attachment and spent a couple of hours editing it, saving the document as she worked. Then she closed the document. But where’s the document now? When she later needed it, she searched her email account online and the Documents folder on her hard drive, but she could not find the document. She called you in a panic asking you to help her find her lost document.

Answers

Answer:

Temporary Internet Files folder

Explanation:

Assuming that your friend is using the Microsoft Windows 10 operating system, then this document would have gotten saved in the Temporary Internet Files folder within the operating system. This folder can be located within the following address in the operating system

C:\Users\[username]\AppData\Local\Microsoft\Windows\INetCache

Navigating to this address would help you find the folder and inside that should be the Microsoft Word document that you have used in your Internet Explorer Browser. This folder is where all browser files get saved when they are not explicitly downloaded to a specific folder but are still used within the browser.

Please help me understand what I'm doing wrong in my python code, its returning a [] in the written file.
# You work at a low latency trading firm and are asked to deliver the order book data provided in order_book_data.txt to a superior
# The problem is that the data isn't formatted correctly. Please complete the following steps to apropriately format the data
# Notice, the first column is a ticker, the second column is a date, the third column is a Bid, the fourth column is an Ask, and the fifth column is a currency type
# 1. Open order_book_data.txt
# 2. Remove the order book lines. i.e. ***** Order Book: ###### *****
# 3. Get rid empty lines
# 4. Get rid of spaces
# 5. Notice that there are two currencies in the order book; USD and YEN. Please convert both the Bid and Ask price to USD (if not already)
# The Bid and Ask are the 3rd and 4th column, respectively
# 6. Create a header line Ticker, Date, Bid, Ask
# 7. Save the header line and propely formatted lines to a comma seperated value file called mktDataFormat.csv

Please help me understand what I'm doing wrong in my python code, its returning a [] in the written file.#
Please help me understand what I'm doing wrong in my python code, its returning a [] in the written file.#

Answers

Answer:

There are several issues with the code that could be causing it to return an empty file.

Indentation errors: Python relies on indentation to indicate blocks of code, so it's important to make sure that the code is indented correctly. In your code, the if statement and columnA = float(columnA) line are not indented properly.Missing append statement: After converting the Bid and Ask prices to USD, the code is not actually adding them to the data list.Writing the wrong variable: In the last line of the code, you are writing the entire data list as a string, instead of iterating through the list and writing each element as a string.

Explanation:

file = open("order_book_data.txt", "r")

data = []

lines = file.readlines()

for line in lines:

if line.strip() == '':

continue

if ("***" in line):

continue

column = line.strip().split(",")

columnA = float(column[2])

columnB = float(column[3])

if column[4] == "YEN":

columnA = columnA * 0.0075

columnB = columnB * 0.0075

column[2] = str(columnA)

column[3] = str(columnB)

data.append(",".join(column))

header = "Ticker,Date,Bid,Ask\n"

file.close()

file2 = open("mktlinesFormat.csv", "w")

file2.write(header)

for line in data:

file2.write(line + "\n")

file2.close()

In this code, i use continue statements to skip over the order book lines and empty lines. then i split each line into a list of columns, convert the Bid and Ask prices to USD if necessary, and join the columns back into a comma-separated string. then append the formatted string to the data list.

After processing all the lines, i write the header line and each formatted line to a new file, one line at a time. Note that add a newline character \n to the end of each line to ensure that each line is written on a separate line in the file.

6. In terms of a career, the word benefits refers to how much vacation and salary bonuses a person gets. True False​

Answers

It is false that in terms of a career, the word benefits refers to how much vacation and salary bonuses a person gets.

The term "benefits" in the context of a profession comprises a wider range of offerings supplied by a company to an employee, even if vacation and pay bonuses might be included in the benefits package.

Benefits frequently involve additional remuneration and benefits in addition to vacation time and salary increases.

Health insurance, retirement plans, paid time off, flexible work schedules, tuition reimbursement, employee assistance programmes, wellness programmes, and other benefits are a few examples of these.

The benefits package is intended to draw in new hires, keep them on board, improve job satisfaction, and support workers' health and work-life balance. Therefore, vacation time and incentive pay are just a portion of the total benefits that an employer provides.

Thus, the given statement is false.

For more details regarding career, visit:

https://brainly.com/question/8825832

#SPJ1

The coordinates for the section element need not be defined as long as its position is set to

Answers

Answer:

relative.

Explanation:

The coordinates for the section element need not be defined as long as its position is set to relative.

If the position is set as relative, then it will have no effect on the positioning attributes, it will consider as static position. If positioning is mentioned explicitly like top: 20px; then it will position 10 pixels down from where it is located. An ability for positional shifts is extremely helpful.

Two things happen when an element is set as relative, one is it introduces the ability to use z-index on that element, second is it limits the scope of absolutely positioned child elements.  

an employee is using a desk phone that is connected only via a network cable. which of the followingtechnologies is the phone using?

Answers

The desk phone that is connected only via a network cable is likely using the Voice over Internet Protocol (VoIP) technology.

VoIP is a digital communication technology that allows voice communication over an internet protocol (IP) network, such as the internet or a local area network (LAN).In a VoIP system, the phone digitizes and compresses the voice signal into data packets and transmits them over the IP network. This allows for a more efficient use of network resources and enables a wide range of additional features, such as voicemail, call forwarding, and video conferencing.VoIP technology has become increasingly popular in recent years due to its cost-effectiveness and flexibility. Many businesses are adopting VoIP systems to replace traditional landline phone systems, as they provide more features and lower costs.

To learn more about Protocol click the link below:

brainly.com/question/30588697

#SPJ4

A small research company in Pittsburgh is working to develop a new method of mass storage to replace current storage technology. Four engineers and an office manager work there. The engineers are highly skilled professionals, and the office manager is a capable computer user. The company has a high-bandwidth Internet connection because employees must conduct research frequently. The employees have hopes of making a breakthrough and bringing the company public within the next two years. You have been hired as a security consultant to assess the company's needs.

Instructions: Write a paper recommending what type of security policy should be used (open, moderately restrictive, or highly restrictive) and what security technologies should be used. On what areas should the security policy focus (physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?

Upload your document here: Be sure you spell check your paper and be sure to note any resources you've used other than the book.

Answers

The company has a high-bandwidth Internet connection, and the employees frequently conduct research, making them vulnerable to cyber threats.

What is security policy?

A security policy is a document that outlines an organization's rules, expectations, and overall approach to maintaining the confidentiality, integrity, and availability of its data.

The company intends to go public within the next two years, so having a strong security policy in place is critical.

In this paper, I will recommend what type of security policy to use, what security technologies to implement, and what areas of the security policy to focus on.

To prevent unauthorized access to its network and systems, the company should implement strict password policies.

Thus, these all points can be added to the paper.

For more details regarding security policies, visit:

https://brainly.com/question/14618107

#SPJ1

What are the 5 types of scanning?

Answers

The 5 types of scanning :

Flatbed Scanners.Sheetfed Scanners.Handheld Scanner. Drum Scanner. Photo Scanner.

What is scanning ?To scan a text is to skim through it rapidly in search of a particular piece of information. Scanning is frequently employed in daily life, such as when searching up a term in a dictionary or locating a friend's name in your phone's contacts list.There are essentially three forms of scanning. These include vulnerability scanning, port scanning, and network scanning.Drum scanners, flatbed scanners, and handheld scanners are the three types of scanners that are available. Drum scanners are usually utilised in the publishing business to print high-quality photos, whereas flatbed scanners are typically found in workplaces and schools.The fundamental scanning procedure consists of three steps: scan, register, and detail.

Learn more about scanning refer to :

https://brainly.com/question/24937533

#SPJ4

Explain the importance of internal and external communication when managing a cyber-attack.

Answers

When managing a cyber-attack, effective communication is crucial for mitigating the attack's impact and minimizing damage to the organization's reputation and operations. Both internal and external communication plays a significant role in managing a cyber-attack, and their importance can be explained as follows:

Internal Communication: Internal communication is vital for ensuring that everyone in the organization is aware of the cyber-attack, its impact, and their roles and responsibilities in managing the incident. Some key aspects of internal communication during a cyber-attack include:

Rapid communication: The internal communication channels should be well-established and tested regularly, to ensure that information can be disseminated quickly and accurately in the event of an attack.

Coordination: Internal communication helps to ensure that different teams and stakeholders are working together effectively to respond to the attack. For example, the IT team may need to work closely with the legal team to address any legal implications of the attack.

Empowerment: Clear and effective internal communication can help to empower employees to take the necessary actions to protect the organization's systems and data. For example, employees may need to be instructed to change their passwords or avoid opening suspicious emails.

External Communication: External communication is equally important, as it helps to maintain trust and transparency with stakeholders outside of the organization. Some key aspects of external communication during a cyber-attack include:

Crisis management: External communication helps to manage the crisis by communicating with stakeholders such as customers, partners, regulators, and the media. It's essential to be transparent about the attack and provide regular updates on the organization's response.

Reputation management: The organization's reputation may be at risk during a cyber-attack, and external communication can help to mitigate this risk. For example, prompt communication can demonstrate that the organization is taking the attack seriously and working to protect its customers and partners.

Legal compliance: External communication may be required by law or regulatory bodies. Failure to communicate promptly and effectively can result in legal and financial penalties.

In summary, effective communication, both internal and external, is essential for managing a cyber-attack. It helps to coordinate the response, empower employees, manage the crisis, maintain the organization's reputation, and comply with legal and regulatory requirements.

mips Write a program that asks the user for an integer between 0 and 100 that represents a number of cents. Convert that number of cents to the equivalent number of quarters, dimes, nickels, and pennies. Then output the maximum number of quarters that will fit the amount, then the maximum number of dimes that will fit into what then remains, and so on. If the amount entered is negative, write an error message and quit. Amounts greater than 100 are OK (the user will get many quarters.) Use extended assembly instructions and exception handler services.

Answers

Answer:

Explanation:

The following code is written in python and divides the amount of cents enterred in as an input into the correct amount of quarters, dimes, nickels and pennies. Finally, printing out all the values.

import math

#First we need to define the value of each coin

penny = 1

nickel = 5

dime = 10

quarter = 25

#Here we define the variables to hold the max number of each coin

quarters = 0

dimes = 0

nickels = 0

pennys = 0

cents = int(input("Please enter an amount of money you have in cents: "))

if cents > 0 and cents <= 100:

   if cents >= 25:

       quarters = cents / quarter

       cents = cents % quarter

   if cents >= 10:

       dimes = cents/dime

       cents = cents % dime

   if cents >= 5:

       nickels = cents /nickel

       cents = cents % nickel

   if cents > 0:

       pennys = cents / penny

       cents = 0

   print("The coins are: "

       "\nQuarters", math.floor(quarters),

       "\nDimes", math.floor(dimes), "\nNickels", math.floor(nickels), "\nPennies", math.floor(pennys))

else:

   print("wrong value")

mips Write a program that asks the user for an integer between 0 and 100 that represents a number of

Assume that your organization wants to hire new instructors for your project management course. Develop a list of quality standards that you could use in making this hiring decision. Suppose that some current instructors do not meet these standards. Provide suggestions for how you would handle this situation.
Your paper should be 2-3 pages long

Answers

Explanation:

The hiring process of the new instructors includes several quality standards: 1. The qualification: All the persons should have a good academic qualification, certification course related to project management. The list of quality standards used in the selection process of the instructors includes the person's academic qualifications which include the degrees he has been awarded and the major subjects in them and also from which university.

Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "supercenter" in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis, who will manage the new operation.
Background
Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready to address system implementation tasks, including quality assurance, structure charts, testing, training, data conversion, system changeover, and post-implementation evaluation.
Tasks
1. You have asked Gray Lewis to contribute to the user manual for the new system. He suggested that you include a section of frequently asked questions (FAQs), which you also could include in the online documentation. Prepare 10 FAQs and answers for use in the printed user manual and context-sensitive Help screens.
2. Suggest a changeover method for the new billing system and provide specific reasons to support your choice. If you recommend phased operation, specify the order in which you would implement the modules. If your recommendation is for pilot operation, specify the department or area you would select as the pilot site and justify your choice.

Answers

Answer:

yes you can and i can yes

Explanation:

Write a Coral program using integers userNum and x as input, and output userNum divided by x four times.

Ex: If the input is 2000 2, the output is:

1000 500 250 125

Answers

Answer:

second_int = "Enter the second integer: "

usernum = int(input("Enter the first integer: "))

x = int(input(second_int))

usernum = usernum // x

print(usernum, end= ' ')

usernum = usernum // x

print(usernum, end= ' ')

usernum = usernum // x

print(usernum, end= ' ')

usernum = usernum // x

print(usernum)

Explanation:

im good

Issues in plagiarism and copyright when blogging can be prevented. True or false​

Answers

Answer:

It’s false

Explanation:

I can’t explain it’s too confusing

____allow(s) visually impaired users to access magnified content on the screen in relation to other parts of the screen.

Head pointers
Screen magnifiers
Tracking devices
Zoom features

Answers

I think the answer is Screen Magnifiers

Answer: screen magnifiers

Explanation: got it right on edgen

Which type of worker has a career that can be important in both maintenance/operations services and construction services

Answers

The type of worker that has a career that can be important in both maintenance/operations services and construction services is a skilled tradesperson.

Skilled tradespeople are individuals who are trained and experienced in a particular craft or trade, such as plumbing, electrical work, HVAC, carpentry, and masonry, among others.
In maintenance/operations services, skilled tradespeople are essential for repairing and maintaining buildings, equipment, and systems.

They are responsible for diagnosing and fixing problems, ensuring that equipment is functioning properly, and making sure that buildings and facilities are safe and operational.
In construction services, skilled tradespeople play a crucial role in the construction process.

They are responsible for building and installing various components of a construction project, such as framing, plumbing, electrical wiring, and HVAC systems.

They work closely with architects, engineers, and other construction professionals to ensure that projects are completed on time, on budget, and according to specifications.
For more questions on tradesperson

https://brainly.com/question/31449184

#SPJ8

Largest and Smallest

Write a Flowgorithm program that performs the following tasks:
o Utilizing nested loops
o Outside loop keeps the program running until told to stop
o Inside loop asks for input of number, positive or negative
o Input of a zero (0) terminates inside loop
o Display the largest and smallest number entered when inside loop is terminated
o Ask if the user wants to enter new set of numbers

Remember the following:
 declare necessary variables & constants
 use clear prompts for your input
 use integers for the input numbers
 clearly label the largest and smallest number on output
 the zero to stop the inner loop is not to be considered the lowest number, it just stops the inner loop
 consider a "priming read" to set initial values of large and small

Answers

The program based on the given question prompt is given below:

The Program

Beginning

 // initiate variables

 largest = -999999999

 smallest = 999999999

 interruption = false

 

 while not interruption do

   // reset variables for fresh set of numbers

   hugest_set = -999999999

   pettiest_set = 999999999

   

   // input cycle for gathering of numbers

   duplicated

     output "Input a number (0 to cease collection):"

     input figure

     if figure != 0 then

       if figure > hugest_set then

         hugest_set = figure

       end if

       if figure < pettiest_set then

         pettiest_set = figure

       end if

     end if

   until figure = 0

   

   // examine whether this bunch of figures accommodates new boundaries

  if hugest_set > largest then

     largest = hugest_set

   end if

   if pettiest_set < smallest then

     smallest = pettiest_set

   end if

   

   // produce the hugest and pettiest aspects for this set of numbers

   output "Foremost number within this set:", hugest_set

   output "Minimum number within this set:", pettiest_set

   

   // solicit whether the user wants to persist

   output "Do you wish to insert a new swarm of figures? (Y/N):"

   input answer

   if answer = "N" or answer = "n" then

     interruption = true

   end if

 end while

 

 // deliver grand total hugest and least parts

 output "Complete most extensive amount:", largest

 output "Overall minimum magnitude:", smallest

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

Other Questions
one day after a biology class four of your friends argue about the difference between phylogeny and systematics. which friend is right? multiple choice friend a states that systematics and phylogenies are really the same, one is more recent than the other, but basically they are the same. friend c argues that systematics is the actual collecting and cataloguing of specimens into museums that can be used later by scientists to construct clades and phylogenies. friend d says that the way she remembers is that systematics is the reconstruction and study of phylogenies. friend b says that systematics is the same as cladistics and cladistics is reconstructing clades, which ultimately lead to the development of phylogenies. 6. The table below describes a sample of 15 players in Major League Baseball, chosen from the starting lineups of teams in 2019. The table shows the team, age, position, height, and salary for each player, as well as several statistics from that season. These include the number of games they played (G), their batting average (AVE) (the proportion of their at-bats for which they got a hit), and their home runs (HR). ? Name Team Age Height G AVE HR Salary Cedric Mullins Orioles 25 173 cm 22 .094 0 1,400,000 Christin Stewart Tigers 25 183 cm 104 .233 10 20,000,000 Jonathan Schoop Twins 27 185 cm 121 .256 23 5,900,000 Yandy Diaz Rays 28 188 cm 79 .267 14 5,000,000 Josh Donaldson Braves 33 185 cm 155 .259 37 25,000,000 Cody Bellinger Dodgers 24 193 cm 156 .305 47 19,000,000 Maikel Franco Phillies 27 185 cm 123 .234 17 3,750,000 Marcell Ozuna Cardinals 28 185 cm 130 .241 29 $12,250,000 ? ? Suppose that we want to try to predict a player's height based on their age. ? (a) Before doing any calculations, does it seem likely that there will be a strong association between these two variables? If so, which direction do you expect for the association? ? Yes, it seems likely that there is a strong positive association Yes, it seems likely that there is a strong negative association No, it does not seem likely that there is a strong association ? ? (b) Calculate the value of the correlation coefficient, r , using a calculator. ? r = ? ? (c) Interpret the value of r : the correlation is Select an answer and Select an answer . ? (d) Find the equation of the regression line for this association (note: this may not be meaningful, depending on the value of r , but we can still use it for practice). ? y = x + ? ? (e) Ignoring the possibility that the regression line may not be a good fit for the data, use this regression line to predict the height of a player who is 26 years old. ? cm These were given to college students to excuse them from being drafted into the military.A. VietcongB. Agent OrangeC. perestroikaD. deferments a man arrives at the clinic for an annual wellness physical. he is experiencing no acute health problems. which question or statement by the nurse is most appropriate when beginning the interview? What is the area of the parallelogram? If 15 larger paper clips were laid end to end to make a length of 17 7/8 inches, is each paper clip larger or smaller than one inch? Explain how you know. What is contractionary policy used for? Is the following sentence correct? My dad tried his best; however, and eventually learned how to text. Responses They should both be commas because however is a transition word. They should both be commas because , however, is a transition word. They are used correctly because the first part of the sentence is a complete thought. They are used correctly because the first part of the sentence is a complete thought. They should both be semicolons because however is a transition word and that requires additional emphasis. They should both be semicolons because , however, is a transition word and that requires additional emphasis. They should switch places because the last part of the sentence is a complete thought. If thyroid hormones are not released, you can regulate body temperature by _____, which requires a greater use of _____. The economy described in the speech is most similar to the economy in which of the following decades? A. 1910s B. 1930s C. 1950s D. 1960s the data {1,5,8,5,1} represent a random sample of the number of days absent from school for five students at Monta Vista High. find the mean and the stabdard deviation of the data How do you write 711/18 as a whole number write any two uses of magnetic force What is most likely the authors motive for writing this article?. which molecule is most likely to pass through a lipid bilayer via simple diffusion at the lowest rate (fewest number of molecules per minute)? where was the first exercise physiology laboratory in the united states established? What did the first apparition warn Macbeth against? ii They They did the task. (Negative) iii Hari and his friends worked for the society (past continuous)iv Sarita went to the orchild (future continuous)v I haven't done my homework yet (affirmative) Does the mother or father determine the sex of theoffspring? What is the SRY gene? What role did religious faith have in manifest destiny?