what makes a good design​

Answers

Answer 1

Answer:

Life

Explanation:Life makes a good design or just some cottonwood fabric that 10*==^667


Related Questions

What is the output of:

print (8 % 4)

Answers

Answer:

0

Explanation:

The statement, print(8 % 4) will produce the output 0 ;

The print statement is an inbuilt function which is used to output a typed string or display result of a Mathematical calculation and so on.

The expression in the print statement gives 0;

8%4 means, the remainder when 8!is divided by 4 ; 8 /4 gives 2 without a remainder. Meaning that :

8%4 = 0

Hence, print(8 % 4) = 0

All the following statements are true EXCEPT: A) Both SUMIF and SUMIFS Functions consider the conditions first. B) SUMIFS allows SUMRANGE first whereas SUMIF allows sum range last. C) SUMIFS considers conditions last whereas SUMIF considers conditions first D) SUMIFS allows multiple conditions a. A b. B c. C d. D

Answers

All the following statements are true EXCEPT for the statement "Both SUMIF and SUMIFS Functions consider the conditions first."

What is the difference between SUMIF and SUMIFS functions?

SUMIF and SUMIFS are two different functions that are used in Excel. Both functions are used to add up the values in a range of cells that meet specific conditions. But, there is a difference between these two functions. The primary difference is that SUMIF only allows one condition to be checked. While SUMIFS allows multiple conditions to be checked.

For example: SUMIF: =SUMIF(A1:A5, "Apples", B1:B5) - This formula will only sum the values in column B if the corresponding cell in column A is "Apples".SUMIFS: =SUMIFS(B1:B5, A1:A5, "Apples", C1:C5, ">0") - This formula will sum the values in column B if the corresponding cell in column A is "Apples" AND the corresponding cell in column C is greater than 0.

Another difference is that in SUMIFS, the sum_range comes first, while in SUMIF, it comes last. In other words, SUMIFS allows sum_range first, whereas SUMIF allows sum_range last.

All the other options that are mentioned in the question are true. Option A) Both SUMIF and SUMIFS Functions consider the conditions first. Option C) SUMIFS considers conditions last whereas SUMIF considers conditions first Option D) SUMIFS allows multiple conditions to be true.

To learn about the SUMIF function here:

https://brainly.com/question/29848364

#SPJ11

List two building techniques or materials that should be considered if you are building in Tornado Alley.

Answers

Have a strong foundation and a tornado shelter.

Match each field of engineering to its application.

Answers

can you post a picture of the question please?
Hmm can you please send the pic

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

Jose has 3/5 kilogram of peppermints and 2/3 kilogram of candy canes. How many kilograms of candy does he have?

Answers

Answer:

\(\frac{19}{15}\\\)

≅ 1.267

Explanation:

\(\frac{3}{5} +\frac{2}{3} \\\\= \frac{9}{15} + \frac{10}{15} \\\\= \frac{9+10}{15} \\\\= \frac{19}{15} \\\\= 1.267\)

what is the set of rules that manage how data is sent and received over the internet, in the form of packets?

Answers

The set of rules that manage how data is sent and received over the internet, in the form of packets, is known as the "Internet Protocol Suite" or "TCP/IP" (Transmission Control Protocol/Internet Protocol).

Most countries in the world have laws governing email content.
Give three examples of these laws.

Answers

I know you are a lot in the past

----------------------------
Please summarize into 1.5 pages only
----------------------------
Virtualization
Type 2 Hypervisors
"Hosted" Approach
A hypervisor is software that creates and runs VM ins

Answers

Virtualization: It is a strategy of creating several instances of operating systems or applications that execute on a single computer or server. Virtualization employs software to reproduce physical hardware and create virtual versions of computers, servers, storage, and network devices. As a result, these virtual resources can operate independently or concurrently.

Type 2 Hypervisors: Type 2 hypervisors are hosted hypervisors that are installed on top of a pre-existing host operating system. Because of their operation, Type 2 hypervisors are often referred to as "hosted" hypervisors. Type 2 hypervisors offer a simple method of getting started with virtualization. However, Type 2 hypervisors have some limitations, like the fact that they are entirely reliant on the host operating system's performance.

"Hosted" Approach: The hosted approach entails installing a hypervisor on top of a host operating system. This hypervisor uses hardware emulation to create a completely functional computer environment on which several operating systems and applications can run concurrently. In general, the hosted approach is used for client-side virtualization. This method is easy to use and is especially useful for the creation of virtual desktops or the ability to run many operating systems on a single computer.

A hypervisor is software that creates and runs VM instances: A hypervisor, also known as a virtual machine manager, is software that creates and manages virtual machines (VMs). The hypervisor allows several VMs to execute on a single physical computer, which means that the computer's hardware can be utilized more efficiently. The hypervisor's role is to manage VM access to physical resources such as CPU, memory, and I/O devices, as well as to provide VM isolation.

Know more about virtualization, here:

https://brainly.com/question/31257788

#SPJ11

oof x oof = ? idk what that is

Answers

Answer:

= 1 off!

Explanation:

1x1

Answer:

Double OOF!!!!!!!!

Explanation:

I dont have one....

click the file menu in your konsole terminal window and select new window. at the command prompt in this new window, type who and press enter. do you see an additional pseudo terminal session?

Answers

In your Konsole terminal window, click the File menu and select New Window. At the command prompt in this new window, type "who" and press Enter.


When you click the "File" menu in your Konsole terminal window and select "New Window," you will be able to open a new terminal window. Once you have done this, you can type "who" at the command prompt in this new window and press "Enter" to see an additional pseudo terminal session. This will show you the currently logged in users and the terminal sessions that they are using. So, by using the "who" command in the new terminal window, you will be able to see an additional pseudo terminal session.

Learn more about terminal window: https://brainly.com/question/15197572

#SPJ11

You can use the ____ to change the order of the wat windows are stacked.

A). taskbar
B). Open bar
C). toolbar
D). Menu bar

Answers

Answer:

A

Explanation:

Which visual aid would be best for showing changes inacts population size over time?
a line graph
a map
a pile grain
a table

Answers

Answer:

a line graph

Explanation:

I think so . hope this helps

all programs are normally stored in rom and loaded into ram as needed for processing.. True or false?

Answers

All programs are normally stored in rom and loaded into ram as needed for processing. The statement is false.

Read-only memory, also known as ROM, is a category of computer storage that houses non-volatile, permanent data and is typically only readable, not writeable. The software necessary for a computer to reboot or start up each time it is turned on is stored in the ROM. Large input/output (I/O) operations are also carried out by ROM, and it also safeguards programs or software instructions. Data that has been written to a ROM chip cannot be erased.

A little piece of ROM that houses the startup firmware is built into almost all computers. Basic Input/Output System refers to this boot firmware (BIOS). This software comprises of code that directs the computer's boot-up procedures, including the loading of the operating system (OS) into random access memory (RAM) and the execution of hardware diagnostics. 

Learn more about ROM:

https://brainly.com/question/15302096

#SPJ4

Which types of computer hardware are internal?

Answers

Answer:

Here are some :) (sorry if there are too many)

Explanation:

RAM (Random Access Memory): It's a fast-access memory that is cleared when the computer is powered-down. RAM attaches directly to the motherboard, and is used to store programs that are currently running.

Video Card/GPU (Graphics Processing Unit): It's a specialized processor originally designed to accelerate graphics rendering.

Sound Card: USB sound "cards" are external devices that plug into the computer via USB.

Storage: SSD (Solid State Drive): It is a data storage device that uses solid-state memory to store persistent data.

HDD (Hard Disk Drive): It is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces. Just about every new computer comes with a hard disk these days unless it comes with a new solid-state drive.

CPU (Central Processing Unit/ sometimes just called a processor) It's a machine that can execute computer programs, and sometimes called the brain of the computer.

Motherboard: The motherboard is the body or mainframe of the computer, through which all other components interface. It is the central circuit board making up a complex electronic system.

Firmware: Firmware is loaded from the Read only memory (ROM) run from the Basic Input-Output System (BIOS). It is a computer program that is embedded in a hardware device, for example a microcontroller.

Power Supply: The power supply as its name might suggest is the device that supplies power to all the components in the computer.

CD-ROM Drive: There are two types of devices in a computer that use CDs: CD-ROM drive and a CD writer. The CD-ROM drive used for reading a CD. The CD writer drive can read and write a CD.

Floppy Disk: A floppy disk is a type of data storage that is composed of a disk of thin, flexible(“floppy”) magnetic storage medium encased in a square or rectangular plastic shell.

Internal Storage: Internal storage is hardware that keeps data inside the computer for later use and remains persistent even when the computer has no power.

Disk Array Controller: A disk array controller is a device which manage the physical disk drives and presents them to the computer as logical units.

On some computers the speakers are internal as well. :)

The following 6-bit signed binary numbers were found in a computer. What decimal number do they represent? a 011111 b) 111001

Answers

In 6-bit signed binary numbers, the leftmost bit represents the sign and the remaining 5 bits represent the magnitude of the number. If the leftmost bit is 0, then the number is positive, and if it is 1, then the number is negative.

a) 011111 represents a positive number because the leftmost bit is 0. The magnitude of the number is 11111, which is 2^4 + 2^3 + 2^2 + 2^1 + 2^0 = 31. Therefore, the decimal number it represents is +31.

b) 111001 represents a negative number because the leftmost bit is 1. To find the magnitude of the number, we take the complement of the remaining 5 bits and add 1. 110111 + 1 = 111000.

The magnitude is 2^5 + 2^4 + 2^3 = 48. Therefore, the decimal number it represents is -48.More than 100 words:In the digital electronic circuitry, binary numbers are extensively used. The 6-bit signed binary numbers are binary numbers with six digits.  For the negative number, we first take the complement of the magnitude and then add 1 to it. Finally, we add a negative sign to the decimal value obtained to represent the negative number. Therefore, we have determined that the given binary numbers represent +31 and -48.

To know more about magnitude visit:

https://brainly.com/question/31022175

#SPJ11

Users of the system should be able to retrieve account information by providing their customer number and PIN. The input is compared to the customer data for a match. If there is no match, after three attempts the program terminates. After successful verification, the customer should be able to:

Answers

Users who are able to successfully verify their account by providing their customer number and PIN will have access to certain features and functions within the system.

Here are some examples of what users can do after successful verification:

1. View Account Information: Once verified, users will be able to retrieve their account information. This may include details such as their name, contact information, account balance, transaction history, or any other relevant information associated with their account.

2. Update Personal Details: Users can make changes to their personal information, such as updating their address, phone number, or email address. This allows users to keep their account information up to date and accurate.

3. Manage Preferences: Users may have the option to customize their account settings and preferences. This can include choosing notification preferences, selecting language preferences, or setting up security measures like two-factor authentication.

4. Perform Transactions: Depending on the system, users may be able to carry out various financial transactions. This could involve transferring funds between accounts, making payments, scheduling bill payments, or even applying for loans or credit.

5. Access Customer Support: In case users encounter any issues or have questions about their account, they should be able to access customer support services. This may include contacting a support representative via phone, email, or live chat, or accessing a help center or FAQ section for self-assistance.

It's important to note that the specific actions users can take after verification will depend on the functionality and purpose of the system. These examples provide a general overview of what users may be able to do, but the exact features and options can vary.

To know more about verification, visit:

https://brainly.com/question/27973852

#SPJ11

Sandra has composed a draft of her essay in Microsoft Word. She now wants to revise the essay. Which tool can she use to store the document with a different name and makes changes in the new document?

Answers

Answer:

she can use Ctrl S then open it again

Explanation:

i hope this helps and please mark as brainliest

What it means to say media is a continuum, not a category?

Can someone help me with that real quick please?

Answers

It means that media exists along a spectrum with various degrees of characteristics, rather than being strictly defined by rigid categories.

What does such ideology of media being a continuum imply?

This perspective acknowledges the fluidity and overlapping nature of different media forms and their ever-evolving roles in communication, entertainment, and information dissemination.

As technology advances and media platforms continue to converge, the boundaries between traditional media categories (such as print, radio, television, and digital) become increasingly blurred. New forms of media often incorporate elements of existing forms, creating a continuous spectrum of media experiences.

Find more media related question here;

https://brainly.com/question/14047162

#SPJ1

A group worker is planning a group that will be conducted over the internet with web-conferencing software that allows people to meet together at a designated time. What type of specialty group is the group worker designing?.

Answers

A Webinar is a type of Web conferencing that resembles a conference but is conducted web - based.

A sort of web conferencing is a webinar. It is exactly like attending a seminar online. For seminars, lectures, workshops, or product and service demos, webinars are useful.

What varieties of web conferencing are there?

Five types of online conferencing

Webinars. This is the name for online seminars, also known as webcasts and web meetings. Web meetings are virtual gatherings that promote conversation among the attendees.Collaboration online.Electronic presentations

In that they occur in real-time, online, and contain a ton of content, video conferences and webinars have a lot in common. But unlike webinars, which are often one-to-many information encounters, video conferences do not.

To learn more about webinars refer to:

https://brainly.com/question/4139475

#SPJ4

A Webinar is a type of Web conferencing that resembles a conference but is conducted web - based. A sort of web conferencing is a webinar. It is exactly like attending a seminar online. For seminars, lectures, workshops, or product and service demos, webinars are useful.

What varieties of web conferencing are there?

Five types of online conferencing Webinars. This is the name for online seminars, also known as webcasts and web meetings.

Web meetings are virtual gatherings that promote conversation among the attendees.

Collaboration online.

Electronic presentations

In that they occur in real-time, online, and contain a ton of content, video conferences and webinars have a lot in common. But unlike webinars, which are often one-to-many information encounters, video conferences do not.

To learn more about webinars refer to:

brainly.com/question/4139475

#SPJ4

greater user involvement in the system development process usually results in ____.

Answers

Greater user involvement in the system development process usually results in a more successful and user-friendly end product.

When users are actively involved in the development process, they can provide valuable feedback on what features and functionalities are important to them, as well as identify potential issues or challenges that may arise during the use of the system. This feedback can then be incorporated into the development process, resulting in a system that is more tailored to the needs and preferences of its users.

User involvement in the system development process can take many forms, including participating in user testing, providing feedback on prototypes, and collaborating with developers to co-create features and functionalities. When users are involved in these activities, they are able to provide insight into what works well for them and what doesn't, which can help developers to make more informed decisions about the design and development of the system. In addition to providing feedback, user involvement can also help to increase user adoption and satisfaction with the final product. When users feel that they have had a say in the development of the system, they are more likely to feel invested in its success and to use it more frequently and effectively.

To know more about system development visit :-

https://brainly.com/question/31599339

#SPJ11

we can more easily debug a program when the responsibilities are well encapsulated.
a. true
b. false

Answers

It is TRUE to state that we can more easily debug a program when the responsibilities are well encapsulated.

What does it mean to encapsulate responsibilities?

One of the cornerstones of OOP is encapsulation (object-oriented programming). It refers to the combination of data and procedures that operate on that data.

Encapsulation is a technique for hiding the values or state of a structured data object within a class, preventing unauthorized parties from accessing them directly.

To access the values, publically available methods (called getters and setters) are often given in the class, and other client classes call these functions to get and alter the values within the object.

Learn more about debugging:
https://brainly.com/question/13966274
#SPJ1

give me facts on john john son

Answers

Answer: Story -

In 1951, John H. Johnson was selected as Young Man of the Year by the United States Chamber of Commerce. He was the first African-American to receive such honor. In 1966, he received Spingarn Medal by the National Association for the Advancement of Colored People for his contributions in the area of race relations.

Born -  

January 19, 1918, Arkansas City, AR

Died -

August 8, 2005, Chicago, IL

Spouse -

Eunice W. Johnson

(married at 1941–2005)

Children -

Linda Johnson Rice, John Harold Johnson

Explanation:

what does the Data Analysis techniques may involve ?
"

Answers

Data analysis techniques involve various methods and processes to extract insights and patterns from data. These techniques encompass tasks such as data cleaning, exploration, visualization, statistical analysis, machine learning, and predictive modeling.

Data analysis techniques are employed to transform raw data into meaningful information that can guide decision-making and support business objectives. The first step is data cleaning, which involves removing errors, duplicates, and inconsistencies to ensure data accuracy. Exploratory data analysis is then performed to understand the data's structure, relationships, and distribution through summary statistics, histograms, and scatter plots.

Visualization techniques, such as charts, graphs, and dashboards, aid in presenting the data visually for easier comprehension. Statistical analysis involves applying statistical methods like hypothesis testing, correlation analysis, and regression analysis to uncover patterns, relationships, and dependencies within the data.

Machine learning algorithms are employed to develop predictive models that can forecast future outcomes or classify data into different categories. Techniques such as decision trees, random forests, and neural networks are utilized to train and evaluate these models. Additionally, techniques like clustering and dimensionality reduction help identify groups and reduce the complexity of high-dimensional datasets.

Overall, data analysis techniques encompass a range of methods and tools that enable analysts to extract insights, identify trends, and make data-driven decisions, ultimately leading to improved understanding and optimization in various fields, including business, science, and technology.

Learn more about patterns here:

https://brainly.com/question/15115078

#SPJ11

I WILL MARK BRAINLIEST PLZ ANSWER

I WILL MARK BRAINLIEST PLZ ANSWER

Answers

A string is used to hold words and phrases, therefore, Maria should use a string variable.

Question 8
Consider the following code:
a = 3
b = 2
print (a **b)
What is output? 9, 6 , 1, 8​

Answers

Answer:

6 ?

Explanation:

a*b = 3*2 = 6

maybe like this.

(axb)=c
A=3
B=2
C=?

3x2 =6

What value is displayed as a result of executing the code segment?

What value is displayed as a result of executing the code segment?

Answers

Answer:

A: 3

Explanation:

The MOD operator is used to calculate the remainder of dividing two numbers, so by the end of this operation, we are adding the MODs of each integer in this list, because this program ends once each integer in list has gone through the steps, and the result of calculating the MOD of each integer is then added back because of the third step. So it should look like this: (4 MOD 2) + (2 MOD 2)...(1 MOD 2) and the result of adding these values should then result in 3.

The value which is displayed as a result of executing the code segment is equal to: A. 3.

What is MOD?

MOD is an abbreviation for modulo operation and it can be defined as a mathematical technique that is used in computer science to determine the remainder of an arithmetic operation such as the division of two numbers.

Based on the code segment, the value which is displayed as a result of executing the modulo operation would be equal to 3 at the end of the iteration or operation.

Read more on computer codes here: brainly.com/question/25619349

What is the key sequence to copy the first 4 lines and paste it at the end of the file?

Answers

Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.

What comes first in the copy and paste process for a slide?

Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.

What comes first in the copying process of a segment?

The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.

To know more about copy visit:-

https://brainly.com/question/24297734

#SPJ4

All of the following statements are true except one. Which one is FALSE?
A
Tab "leaders" are special tab stops that let you align text containing numbers.
B
You can remove a tab stop by dragging its marker outside the ruler and releasing the mouse button.
с
The Center tab centers the text that follows the tab character under the tab stop.
D
The Right tab aligns the end of the text that comes after the tab character under the tab stop.

Answers

Answer:

D.

Explanation:

The Right tab aligns the end of the text that comes after the tab character under the tab stop.

13. What issues are important to consider in explaining a network design to senior management?

Answers

When explaining a network design to senior management, it is important to consider various issues.

First, senior management may not be technically savvy, so it is crucial to use simple language and avoid jargon. Secondly, it is essential to explain how the design will benefit the organization, for example, how it will increase efficiency, reduce costs or enhance security. Thirdly, the design should be aligned with the organization's goals and objectives. Fourthly, it is important to consider the cost and resources required to implement the design and the expected return on investment. Finally, it is crucial to anticipate and address any concerns or questions senior management may have and provide them with a clear roadmap of the implementation process.

Learn more about network here:

https://brainly.com/question/15717707

#SPJ11

Other Questions
oxalic acid (h2c4o2) is a diprotic acid with a molar mass of 90.03 g/mol. 100 g of acid were weighed out and added to 250 ml of water. then 67.8 ml of koh were used to completely neutralize the acid. what is the concentration of the koh solution?(practice sheet 3) 6x - 7y = -2 solve for x Find the distance between V(4,4) and X(5,8). Round to the nearest tenth, if necessary. The relevant production range for Challenger Trailers, Inc. is between 120,000 units and 190,000 units per month. If the company produces beyond 190,000 units per month:__________. A. the fixed costs and the variable cost per unit will not change B. the fixed costs may change, but the variable cost per unit will remain the same C. the fixed costs will remain the same, but the variable cost per unit may change D. both the fixed costs and the variable cost per unit may change Which of the following statements is the most accurate definition of effectiveness?a.A measure of a specific intervention, procedure, regimen, or service produces a beneficial result under ideal conditions.b.Testing a vaccine in a group of consenting individuals.c.The process of making the best use of scarce resources.d.The effects or end results achieved in relation to the effort expended in terms of money, resources, and time.e.Testing a vaccine in a community where some of individuals do not want to be vaccinated. Which words reveal the irony of the narrator's dilemma? funcion. que a cada numero le asocia su mitad What is the main purpose of presidential primaries and caucuses? Find the factors of f(x) given that x = 3 is a zero.f(x) = x^3 + 12x^2 + 47x + 60 (x + 3)(x + 4)(x 5) (x + 3)(x + 4)(x + 5) (x 3)(x + 5)(x + 6) (x + 3)(x + 3)(x 3) LA VIDA CONTEMPORANEAEnsayo con 3 fuentes:Se les debe dar a los nios la oportunidad de tener voz encuanto a los reglas de lo cuso? What is the correct definition of a calorie?a substance the body needs to functiona process of taking in food and using it for energy, growth, and good healtha guide for making healthful daily food choicesa unit of heat that measures the energy available in foods Providing generous benefits, including health insurance and company-sponsored retirement plans, as well as offering a measure of job security, will help satisfy physiological needs.falsetrue compare Bronx Masquerade and The Outsiders book Question 24 Explain the relationship between total, average and marginal product in the short run and how this is linked to the law of diminishing returns AND analyse and evaluate the extent to which No __________esas palabras. (Don't write those words.)escribesescribenescritoescribas Can someone help on this please? Thank youu;) Lins second pan has a length of 9/4 inches, a width of 10/3 inches, and a height of 4/3 inches. What is the volume of the second pan? Crane Company acquired a patent on an oil extraction technique on January 1, 2020 for $6900000. It was expected to have a 10 year life and no residual value. Crane uses straight-line amortization for patents. On December 31, 2021, the future cash flows expected from the patent were $720000 per year for the next eight years. The present value of these cash flows, discounted at Cranes market interest rate, is $3900000. At what amount should the patent be carried on the December 31, 2021 balance sheet? which of the following serve as a central contact point where critical comments, dilemmas, and advice can be assigned to the person most appropriate for handling a specific case? Relaciona. Match each person or group with the appropriate sentence ending.Usted y yo[Choose ]T[Choose ]Ella[Choose ]Yo[Choose ]Catalina, Pedro y usted[Choose ]