write a statement that calls print larger, passing it sales and sales, as the first and second arguments, respectively

Answers

Answer 1

Answer:

logger.printLarger(sales1, sales2);

Explanation:


Related Questions

Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters. Which typeface should he use?
A.
old style
B.
geometric sans-serifs
C.
transitional and modern
D.
humanist sans
E.
slab serifs

Answers

The type of typeface that Derek should use is option D: humanist sans.

What is an typeface?

A typeface is known to be a kind of a design tool that is used for lettering and it is one that is made up of variations in regards to its size, weight (e.g. bold), slope and others.

What defines a humanist font?

The “Humanist” or “Old Style” is known to be a kind of a historical classification that is used for any typefaces that have its inspiration from Roman lettering and also that of the Carolingian minuscule as it often  include forms that looks like the stroke of a pen.

Since Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters, The type of typeface that Derek should use is option D: humanist sans.

Learn more about typeface from

https://brainly.com/question/11216613

#SPJ1

what is bitcoin??????​

Answers

Answer:

a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments.

Explanation:

Jack needs to create a technical drawing for a new tool.

Answers

Answer:

Jack should send an e-mail out to all of their clients and BCC them on it (so that they don't have each others information) and distribute the information quickly. E-mail is one fastest ways to get information sent to a large amount of people at one time

Answer:

so blueprints? jack needs to know the name and action of each part

which diagram best represents the relationship between the internet and the world wide web?

Answers

The relationship between the internet and the World Wide Web can be best represented by the diagram of overlapping circles or Venn diagram.

The internet and the World Wide Web (WWW) are closely related but distinct concepts. The internet is a global network of interconnected computers and devices that allows the transmission of data and communication between them. On the other hand, the World Wide Web refers to a system of interconnected hypertext documents and resources that are accessed through the internet. A diagram showing overlapping circles or a Venn diagram is often used to depict the relationship between the internet and the World Wide Web. The overlapping portion represents the shared elements and interconnectedness of the two, highlighting how the World Wide Web is an application or service that operates on top of the internet infrastructure.

Learn more about World Wide Web (WWW) here:

https://brainly.com/question/24768260

#SPJ11

on distribution center optimization case study, which distribution center performed, best, and why?

Answers

The distribution center that performed the best in the optimization case study cannot be determined without specific information about the study.

The performance of a distribution center in an optimization case study depends on various factors such as efficiency, cost-effectiveness, customer satisfaction, and specific objectives of the study. Without specific details about the case study, including the metrics used to measure performance and the goals of the optimization, it is not possible to determine which distribution center performed the best.

In a distribution center optimization case study, different distribution centers may excel in different areas based on their location, infrastructure, logistics capabilities, and management strategies. Factors such as transportation costs, inventory management, order fulfillment speed, and overall operational efficiency play a crucial role in evaluating the performance of a distribution center. To identify the distribution center that performed the best, a comprehensive analysis of key performance indicators and specific objectives of the case study would be necessary.

Learn more about excel here:

https://brainly.com/question/3441128

#SPJ11

the wireless spectrum, as defined by the fcc, spans frequencies between which two options below?

Answers

The wireless spectrum, as defined by the FCC (Federal Communications Commission), spans frequencies between 9 kHz and 300 GHz.

The wireless spectrum, as defined by the FCC (Federal Communications Commission) spans frequencies between 9 kHz and 300 GHz.

It is the range of frequencies that can be used for wireless communication, including radio, television, cellular communication, Wi-Fi, and many other types of wireless technologies.

The FCC regulates the wireless spectrum to ensure that different wireless devices can coexist without interfering with each other, and to ensure that the spectrum is used efficiently.

To know more about wireless spectrum, click here:

https://brainly.com/question/10248654

#SPJ11

Does anyone have the GCSE 2018 Design Technology J310/01 practice paper?
If you do please tag it with your answer :))))

Answers

Answer:

Mark as brainliest.

Explanation:

Does anyone have the GCSE 2018 Design Technology J310/01 practice paper?If you do please tag it with

Identify the causes of installation problems. (Choose all that apply)

Identify the causes of installation problems. (Choose all that apply)

Answers

Answer:

the last one

Explanation:

please mark brainliest

Answer: The answers are: A,B,D

edg.

For each of the following IP addresses, what does the router do if a packet with that address arrives? Show your calculation and briefly explain your answer.
i. 202.18.24.60
ii. 202.18.24.134
iii. 202.18.24.164
iv. 202.18.24.199
v. 202.18.24.240

Answers

Since all of the IP addresses have the same network ID, the router would forward the packets to the next hop associated with the 202.18.24.0 network ID in its routing table.

If a packet with an IP address arrives at a router, the router checks its routing table to determine the next hop for the packet. The next hop is the IP address of the next router or device that the packet should be sent to in order to reach its final destination. The router performs a bitwise AND operation between the destination IP address and the subnet mask to determine the network ID.

It then compares the network ID with the network IDs in its routing table to find the best match. The best match is the network ID with the longest prefix match, meaning the most number of matching bits between the network ID and the destination IP address. The router then forwards the packet to the next hop associated with the best match network ID.

For the given IP addresses, the router would perform the following calculations:

i. 202.18.24.60 AND 255.255.255.0 = 202.18.24.0 (network ID)
ii. 202.18.24.134 AND 255.255.255.0 = 202.18.24.0 (network ID)
iii. 202.18.24.164 AND 255.255.255.0 = 202.18.24.0 (network ID)
iv. 202.18.24.199 AND 255.255.255.0 = 202.18.24.0 (network ID)
v. 202.18.24.240 AND 255.255.255.0 = 202.18.24.0 (network ID)

Learn more about IP addresses:

https://brainly.com/question/14219853

#SPJ4

For the given IP addresses, the router would perform the following calculations:

i. 202.18.24.60 AND 255.255.255.0 = 202.18.24.0 (network ID)ii. 202.18.24.134 AND 255.255.255.0 = 202.18.24.0 (network ID)iii. 202.18.24.164 AND 255.255.255.0 = 202.18.24.0 (network ID)iv. 202.18.24.199 AND 255.255.255.0 = 202.18.24.0 (network ID)v. 202.18.24.240 AND 255.255.255.0 = 202.18.24.0 (network ID)

Since all of the IP addresses have the same network ID, the router would forward the packets to the next hop associated with the 202.18.24.0 network ID in its routing table.

If a packet with an IP address arrives at a router, the router checks its routing table to determine the next hop for the packet. The next hop is the IP address of the next router or device that the packet should be sent to in order to reach its final destination. The router performs a bitwise AND operation between the destination IP address and the subnet mask to determine the network ID.

It then compares the network ID with the network IDs in its routing table to find the best match. The best match is the network ID with the longest prefix match, meaning the most number of matching bits between the network ID and the destination IP address. The router then forwards the packet to the next hop associated with the best match network ID.

For the given IP addresses, the router would perform the following calculations:

i. 202.18.24.60 AND 255.255.255.0 = 202.18.24.0 (network ID)

ii. 202.18.24.134 AND 255.255.255.0 = 202.18.24.0 (network ID)

iii. 202.18.24.164 AND 255.255.255.0 = 202.18.24.0 (network ID)

iv. 202.18.24.199 AND 255.255.255.0 = 202.18.24.0 (network ID)

v. 202.18.24.240 AND 255.255.255.0 = 202.18.24.0 (network ID)

Learn more about IP addresses:

brainly.com/question/14219853

#SPJ11

What is the advantage of using CSS?
O A.
O B.
O c.
OD.
It stores data separately.
It streamlines the HTML document.
It creates a better-structured document.
It allows clickable actions.

Answers

b It streamlines the HTML document.

how many ones dose it take to get 9 tens

Answers

It takes 90 ones to get 9 tens
The answer would be 90:)

Explanation: there are 10 ones in one 10 so if you multiply 10 times 9 it’s 90

if you were any type of fnaf charater who would you be and why?

Answers

Answer:

Foxy

Explanation:

Cause he's cool and he's my favorite.

What is normally disabled by default on most Linux servers?
O TUI
O laas
O GUI
O Embedded Linux

Answers

The Option that is normally disabled by default on most Linux servers is GUI.

Is Linux an embedded OS?

Embedded Linux is known to be a kind of Linux operating system as well as a kernel that is set up to be place or installed and known to be used inside embedded devices as well as other appliances.

It is seen as a kind of compact type of Linux that gives features and services in line with the operating system.

Therefore, The one that is normally disabled by default on most Linux servers is GUI.

Learn more about GUI from

https://brainly.com/question/3692609

#SPJ1

define a function getchars() that has one input string parameter, one character parameter, and one output vector parameter passed by reference

Answers

The C++ code for a function getchars() with one input string parameter, one character parameter, and one output vector parameter passed by reference is shown below.

Coding Part:

#include <iostream>

#include <vector>

using namespace std;  

void GetValues(string inputString, char x, vector<char> &results)

{     int l = inputString.length();     for (int i = 0; i < l; i++)

{         if (inputString[i] != x)

{             results.push_back(inputString[i]);

        }    

    }

}

int main()

{     string inputString;     int i;    

char x;    

vector<char> results;    

cin >> inputString;    

cin >> x;          

GetValues(inputString, x, results);          

for (i = 0; i < results.size(); ++i)

{         cout << results.at(i) << endl;     }    

return 0; }

To know more about vector parameter, visit: https://brainly.com/question/29761259

#SPJ4

Who has gotten a random file link from someone? What file does it contain?

Answers

Answer:

those are bots , just report those

Explanation:

I got it but I didn’t download it cuz it looks sketchy he literally posted that same link to everyone who has made a question so I would advise not to download it

1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your organization’s IT infrastructure?

Answers

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

which statement best describes an application programming interface? group of answer choices it is a protocol that allows web browsers to request data from a web server. it provides programmers with a standard way to extend an application's capabilities. it is the top layer of the osi model of networking. it is the gui interface that windows uses to interact with the user.

Answers

While the top layers of a OSI model deal on applications and applications, they deal with data transit.

An OSI is what?

The seven levels which computer systems employ to interact over a network are described by the Identify Common Interconnection (OSI) model. Inside the early 1980s, all major telecommunications and computer businesses embraced it as the first universal architecture for network communications.

What does OSI stand for?

Because it focuses with systems that are accessible for communication with other systems, this model is referred to also as ISO OSI reference model. A collection of methods for quality as an OSI (open system interconnection) model - view - controller, thus, enables any two distinct systems, regardless of their underlying architecture, to communicate with one another via a network.

To know more about OSI visit:

https://brainly.com/question/14433133

#SPJ4

Need answer ASAP

In which phrase does software coding and testing happen in the spiral model?

The spiral model does not have a separate testing phase. Both software coding and testing occurs during the _____ phase.

Answers

both software coding and testing occurs during Engineering phase

5. Consider the statement: The average of two odd integers is an integer. (a) Write the symbolic form of the statement using quantifiers. (b) Prove or disprove the statement. Specify which proof strategy is used.

Answers

(a) The symbolic form of the statement using quantifiers is:

∀x∀y [(x+y)/2 ∈ Z ∧ x,y ∈ O],

where Z denotes integers and O denotes odd integers.

(b) We can prove the statement by using a direct proof strategy.

Proof: Let x and y be any two odd integers. Then, we can express them as x = 2a+1 and y = 2b+1, where a and b are integers.

The average of x and y is (x+y)/2, which is equal to (2a+1+2b+1)/2 = (2a+2b+2)/2 = 2(a+b+1)/2 = a+b+1.

Since a and b are integers, a+b+1 is also an integer. Therefore, the average of any two odd integers is an integer.

Thus, the statement is proved.

Learn more about symbolic here:

https://brainly.com/question/19425496

#SPJ11

What are attributes and what role do they play with in a HTML document?

Answers

Answer:

HTML attributes are special words used inside the opening tag to control the element's behavior. HTML attributes are a modifier of an HTML element type. An attribute either modifies the default functionality of an element type or provides functionality to certain element types unable to function correctly without them.

Explanation:

a pilot was asked to drop food packets in a terrain. he must fly over the entire terrain only once but cover a maximum number of drop points. the points are given as inputs in the form of integer coordinates in a two dimensional field. the flight path can be horizontal or vertical, but not a mix of two or diagonal. write an algorithm in python to find the maximum number of drop points that can be covered by flying over the terrain once. write an optimal solution in code

Answers

One possible solution in Python for this problem is as follows:

Define two empty sets to keep track of the rows and columns that contain drop points. Loop through each drop point and add its row and column to their respective sets.

Calculate the total number of rows and columns that have at least one drop point.

The maximum number of drop points that can be covered by flying over the terrain once is the maximum of these two values.

Here's the code:

def max_drop_points(drop_points):

   rows = set()

   cols = set()

   for point in drop_points:

       rows.add(point[0])

       cols.add(point[1])

   return max(len(rows), len(cols))

The function max_drop_points takes a list of tuples representing the coordinates of the drop points as its input and returns the maximum number of drop points that can be covered by flying over the terrain once. This solution has a time complexity of O(n), where n is the number of drop points, which is optimal.

Find out more about Function

brainly.com/question/30459148

#SPJ4

Ava is at her first job interview, and the interviewer asks her a difficult question she hasn't prepared to answer. What should Ava do?

Helpppp!!!!! im giving Brainliest

Answers

Answers: It's A. Or C. sorry that the best i got

Explanation:

Answer:

Take a deep breath and gather her thoughts.

Explanation:

Just took it and got full marks

Which function in excel helps facilitate taking a random sample?

Answers

The function to help facilitate taking a random function would be the rand() function. It will produce a number greater than or equal to 0, but less than 1.

srv02 holds a shared folder named forecast for the managers group. maria is a member of the managers group. you would like to grant the managers group full control to the folder named forecast, but limit maria's access to read only. you have added the managers group to the access list for the forecast folder and granted full control access. you now need to limit maria's access to the folder. what should you do? (choose two. each choice is a complete solution.) answer add maria to the ntfs permissions for the folder. grant read access. add maria's account to the forecast share. grant change access and deny full control. remove maria's account from the managers group and grant read access. add maria's account to the forecast share. grant read access and deny full control. remove maria's account from the managers group and grant change access.

Answers

Add Maria to the NTFS permissions for the folder and grant read access.

Add Maria's account to the forecast share and grant read access and deny full control.

To limit Maria's access to the Forecast folder, we need to modify the permissions for her user account. Since the Managers group already has full control access to the folder, we can simply add Maria's account to the NTFS permissions and grant her read access.

To prevent Maria from accidentally or intentionally modifying the folder, we also need to modify the share permissions. We can add Maria's account to the share permissions for the Forecast folder and grant her read access, while denying her full control access. This will allow her to view the contents of the folder, but not modify them.

Removing Maria's account from the Managers group is not a good solution, as it would remove her from the group that has access to the folder, and would not accomplish the goal of limiting her access.

For more question on NTFS click on

https://brainly.com/question/30479858

#SPJ11

Charles Ives's large and varied output includes works in many genres, but not _______.
a. Songs
b. Symphonies
c. chamber music
d. operas

Answers

Charles Ives, an influential American composer, created a broad array of works across many musical genres, including songs, symphonies, and chamber music. However, he did not compose in the genre of operas.

Charles Ives, the renowned American composer, has left an indelible mark on the world of music with his extensive and diverse body of work. His output spans across various genres like songs, symphonies, and chamber music. However, one genre that is notably absent from his repertoire is opera. Despite his eclectic approach to composition and the broad spectrum of his musical experiments, Ives never ventured into the realm of operatic music. Thus, the correct answer to your question would be 'operas', as that is the genre Charles Ives did not contribute to during his prolific career as a composer.

Learn more about Charles Ives here:

https://brainly.com/question/32807514

#SPJ11

Trevor works for many different clients and creates a wide variety of business publications. Which two factors in the list below have the most influence over his layout designs? (multiple choice)


audience

color scheme

dynamic tension

goals

Answers

Answer:

• Audience

• Goals

Explanation:

Trevor works for many different clients and creates a wide variety of business publications. The two factors in the list below have the most influence over his layout designs are:

a) Audience

From the above question,we can see that Trevor creates different publications for different clients. This is because, the taste, wants or desires of each clients varies. It is not the same. Therefore, the layout of his publication is influence by the target audience that the publication is meant for.

For example, a client may want a publication with big fonts because the target audience who would be reading the publication are elderly people.

Another clients may want his publication designed with smaller fonts and a unique font style.

It is Trevor's duty to make sure that he caters to the needs his client's target audience by satisfying their desires, however different they may be.

b) Goals

The goals of the publication is one of the things that can influence the layout design of Trevor's publication. Let's take for example, a client is creating a publication to reach the teen society, probably a publication on pop music or fashion, this is the goal. Trevor would have to create the publication such that it attracts teens. The layout of the publication would have to come in catchy colours, interesting fonts, musical symbols that would catch the eye of teens and make them want to read such publication.

Which one of these is NOT a type of printer

-Laser

-Electric

-Photo

-Inkjet
Need answer soon, thanks!

Answers

Answer:

electric

Explanation:

eletric is not a print ouo

The electric should not be the type of printer.

The information regarding the printer is as follows:

A printer is a machine that should be connected to the computer for making the copies on paper that should be held by the computer.It could be laser, photo, and the inkjet, etc.Here the digital data should be transformed into the printed media.

Therefore we can conclude that the electric should not be the type of printer.

Learn more about the printer here: brainly.com/question/4455685

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

Amy is not sure if the Web page loaded completely in her browser. She should look at the _____.

status bar
command toolbar
search engine
address bar

Answers

Answer:

Status Bar

Explanation:

A status bar will show the progress of the page that is being loaded.

Status bar It shows how much the page has loaded and how much it has left till fully loade

Can someone help me on a 60 second ringtone :(

Can someone help me on a 60 second ringtone :(

Answers

Answer:

If you have an apple phone, its as easy as importing it into Garage Band, cutting it to size, and exporting it as a ringtone or even a text tone. My text tone is now Megalovania.

Other Questions
Question 3Which category BEST fits the words in List 2?analyze, contemplate, investigate, examine, elaborate, speculate,reflect, report, review, describegeography wordsstudy wordsliterature wordsmedia words What are the 4 types of literary criticism?. People who read novels are more likely to attend sports events and movies than those who do not.Is this a fact or opinion.If it is a option then what words make it and opinion.If it is a fact then what words can you change to make it an opinion. Ay, tengo un hambre insoportable. Me voy a comer esta hamburguesa porque est ________(very delicious) y es _____(very inexpensive). (2 points)-riqusimo, baratisimo -riqusima, baratsima-riquisima, baratsimo-riqusimo, baratisima Write 250 beads in total on 8 necklaces as an algebraic expression. Refer to the passage."The subjects of Her Britannic Majesty, or their agents, shall be permitted to purchase, at all places in the Ottoman Dominions, (whether for the purposes of internal trade or exportation) all articles, without any exception whatsoever, the produce, growth, or manufacture of the said Dominions; and the Sublime Porte formally engages to abolish all monopolies of agricultural produce, or of any other articles whatsoever, as well as all Permits from the local Governors, either for the purchase of any article, or for its removal from one place to another when purchased; and any attempt to compel the subjects of Her Britannic Majesty to receive such Permits from the local Governors, shall be considered as an infraction of Treaties, and the Sublime Porte shall immediately punish with severity any Vizirs and other Officers who shall have been guilty of such misconduct, and render full justice to British subjects for all injuries or losses which they may duly prove themselves to have suffered."Excerpt of the Treaty of Balta Liman, a commercial treaty signed between the Ottoman and British Empires in 1838In which of the following ways did the provisions in the passage affect Ottoman society?A two-tiered justice system was created.Regressive taxes were implemented.Reforms that angered the military establishment were enacted.The government took action against the interests of elites. 7. Which direct human impact could cause ocean food chains to collapse?1.overfishing2.Odamaging coral reefs3.coral bleaching4.underfishing PLEASE HELP ITS OVERDUE Part AWhich word best describes the character Ralph in Lord of the Flies?conceitedstudioustimidsensibleQuestion 2Part BWhich line of Ralph's dialogue best supports the answer in Part A?"'His real names Piggy!'""'Sucks to your as-mar!'""'We must make a fire. ""'Who wants Jack for chief?'" How fast does the depth of the water change when the water is 10 ft high if the cone leaks water at a rate of 10 ft3/min? Answer: The depth of the water decreases at 128125 ft/min.20 Des 2020 3(x - 1) = 2x + 9Do this equation have one solution, many solution, or no solution? the qualified applicant pool for five management trainee positions consists of nine women and six men. (a) how many different groups of applicants can be selected for the positions? (b) how many different groups of trainees would consist entirely of women? (c) probability extension: if the applicants are equally qualified and the trainee positions are selected by drawing the names at random so that all groups of five are equally likely, what is the probability that the trainee class will consist entirely of women? (round your answer to four decimal places.) Please help, im so lost Let f(x) - (x-1)(x+3) i). What are the critical numbers? ). At what values of x does f(x) have a local maximum? At what values of x does f(x) have a local minimum? A. Critical numbers are x=1 and x=-0.6 f has a local max at -0.6 and a local min at 1 B. Critical numbers are x=-1 and x=-0.6 f has a local max at -0.6 and a local min at 1 C. Critical numbers are x=1 and x=0.6 f has a local max at -0.6 and a local min at 1 D.None of the above A merger of the healthcare provider may create sufficient market power to change two price takers (as separate entities) into one price setter (as a combined entity). Group of answer choicesTrueFalse what is this problem what items does the united states often export to other countries? responses rice and pineapples rice and pineapples helicopters and airplanes helicopters and airplanes chocolate and coffee chocolate and coffee electronics and coffee the nurse is assessing a client with crohn disease who is scheduled for an upper gastrointestinal series. which condition would necessitate the cancellation of the procedu re? What happens when sugar is mixed into water 9 and 1/9 subtracted by 1 and 4/5 What is the dot product of vectors u = and v=?