Write the CSS to configure an h1 selector with drop shadow text, a 50%

transparent background color, and sans-serif font that is 4em in size.​

Answers

Answer 1

Explanation:

h1{

tect-shadow: ;

background-size: 50%;

background-color: transparent;

font-family: sans-serif;

font-size: 4em;

}


Related Questions

You decide to test the voltages across several of the components. The measured voltages are:

V1 = 0 Volts
V2 = 12 Volts
V3 = 0 Volts
V4 = 12 Volts

These voltages do not correspond with what should be happening if there is current flowing through each device.

Which statement below describes what is happening?

Zero voltage across the fuse indicates that the fuse is the problem.
12 volts across the resistor and no current indicates that the resistor is blown.
Zero volts across the lamp indicates that the light is bad.
The fuse is bad because there is no current.

Answers

Zero volts across the lamp indicates that the light is bad. The correct option is C.

What is resistor?

A resistor is a passive two-terminal electrical component used in circuits to implement electrical resistance.

Resistors have a variety of purposes in electronic circuits, including lowering current flow, adjusting signal levels, dividing voltages, biassing active components, and terminating transmission lines.

After the light bulb, a test of 0 volts shows that there is no resistance in the ground circuit.

At that time, the battery is receiving all of the circuit's voltage (by the path of least resistance), and no voltage is passing through the metre (0 volt reading).

Thus, the correct option is C.

For more details regarding resistor, visit:

https://brainly.com/question/24297401

#SPJ1

What order means that the highest numbers will be on top of the column

Answers

Answer:

Descending

Explanation:

he files provided in the code editor to the right contain syntax and/or logic errors. In each case, determine and fix the problem, remove all syntax and coding errors, and run the program to ensure it works properly.

An example of the program is shown below:

Enter a number between 1 and 20 >> 5
5 4 3 2 1 Blastoff!
JAVA CODE:
// Prompt user for value to start
// Value must be between 1 and 20 inclusive
// At command line, count down to blastoff
// With a brief pause between each displayed value
import java.util.Scanner;
public class DebugSix3
{
public static void main(String[] args)
{
Scanner keyboard = new Scanner(System.in);
int userNum, val;
final int MIN = 1;
final int MAX = 20;
final int TIME_WASTER = 100000;
System.out.print("Enter a number between " + MIN +
" and " + MAX + " >> ");
userNum = keyboard.nextInt();
while(userNum < MIN && userNum < MAX)
{
System.out.println("Number out of range");
System.out.print("Enter a number between " + MIN + " and " +
MAX + " inclusive >> ");
userNum = keyboard.nextInt();
}
for(val = userNum; val == 0; --val)
{
System.out.print(val + " ");
for(int x = 0; x < TIME_WASTER; ++x)
for(int y = 0; y < TIMEWASTER; ++y)
for(int z = 0; z < TIME_WASTER;);
// Adjust these numbers for faster or slower performance
}
System.out.println("Blastoff!");
}
}

Answers

Fixed code:

import java.util.Scanner;

public class DebugSix3 {
public static void main(String[] args) {
Scanner keyboard = new Scanner(System.in);
int userNum, val;
final int MIN = 1;
final int MAX = 20;
final int TIME_WASTER = 100000;

Kotlin:
System.out.print("Enter a number between " + MIN + " and " + MAX + " >> ");
userNum = keyboard.nextInt();

while (userNum < MIN || userNum > MAX) {
System.out.println("Number out of range");
System.out.print("Enter a number between " + MIN + " and " + MAX + " inclusive >> ");
userNum = keyboard.nextInt();
}

for (val = userNum; val >= 0; --val) {
System.out.print(val + " ");
try {
Thread.sleep(1000);
} catch (InterruptedException e) {
e.printStackTrace();
}
}
System.out.println("Blastoff!");
}

Changes made:

Fixed the while loop condition to use OR instead of AND
Fixed the for loop condition to use greater than or equal to instead of equal to
Added a try-catch block to pause the loop for 1 second using Thread.sleep() instead of nested for loops
Fixed some syntax errors and indentation issues.

program to take the command line input to cut down the blast off.

// DebugSix3.java

// Prompt user for value to start

// Value must be between 1 and 20 inclusive

// At command line, count down to blastoff

// With a brief pause between each displayed value

import javax.swing.*;

public class DebugSix3

{

 public static void main(String[] args)

 {

   String userNumString;

   int userNum, val;

   final int MIN = 1;

   final int MAX = 20;

   userNumString = JOptionPane.showInputDialog(null,

       "Enter a number between " + MIN + " and " + MAX + " inclusive");

   userNum = Integer.parseInt(userNumString);

   while(userNum < MIN || userNum > MAX)

   {

      userNumString = JOptionPane.showInputDialog(null,

       "Number out of range" +

       "\nEnter a number between " + MIN + " and " + MAX + " inclusive");

      userNum = Integer.parseInt(userNumString);

   }

   for(val = userNum; val > 0; --val)

   {

     System.out.print(val + "  ");

     for(int x = 0; x < 100000; ++x)

      for(int y = 0; y < 10000; ++y);

      // Adjust these numbers for faster or slower performance

   }

   System.out.println("Blastoff!");

 }

}

learn more about command line input here:

https://brainly.com/question/19569210

#SPJ1

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.
You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

Answers

Note that it is TRUE to state that you must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

How is this so?

Azure Event Hubs, a   data streaming platform,can be integrated with Azure Active Directory (Azure AD) for authentication and authorization purposes.

This ensures that requests to access and utilize Event Hubs resources are authorized and controlled through Azure AD, providing secure and authorized access to the application.

Learn more about Azure Active Directory at:

https://brainly.com/question/28400230

#SPJ1

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.

You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

True or False?

Imagine you're an Event Expert at SeatGeek. How would you respond to this customer?

* Hi SeatGeek, I went to go see a concert last night with my family, and the lead singer made several inappropriate comments throughout the show. There was no warning on your website that this show would not be child friendly, and I was FORCED to leave the show early because of the lead singer's behavior. I demand a refund in full, or else you can expect to hear from my attorney.

Best, Blake

Answers

By Imagining myself as an Event Expert at SeatGeek.I would respond to the customer by following below.

Dear Ronikha,

Thank you for reaching out to SeatGeek regarding your recent concert experience. We apologize for any inconvenience caused and understand your concerns regarding the lead singer's inappropriate comments during the show.

We strive to provide accurate and comprehensive event information to our customers, and we regret any oversight in this case.

SeatGeek acts as a ticket marketplace, facilitating the purchase of tickets from various sellers. While we make every effort to provide accurate event details, including any warnings or disclaimers provided by the event organizers, it is ultimately the responsibility of the event organizers to communicate the nature and content of their shows.

We recommend reaching out directly to the event organizers or the venue where the concert took place to express your concerns and seek a resolution.

They would be in the best position to address your experience and provide any applicable remedies.

Should you require any assistance in contacting the event organizers or obtaining their contact information, please let us know, and we will be happy to assist you further.

We appreciate your understanding and value your feedback as it helps us improve our services.

Best regards,

Vicky

Event Expert, SeatGeek

For more such questions Event,click on

https://brainly.com/question/30562157

#SPJ8

You are creating a new Active Directory domain user account for the Rachel McGaffey user account. During the account setup process, you assigned a password to the new account. However, you know that the system administrator should not know any user's password for security reasons. Only the user should know his or her own password-no one else. Click the option you would use in the New Object-User dialog to remedy this situation.User must change password of next at next logon

Answers

User must modify the next logon's password. "Logon procedure" is another phrase that uses logon as a modifier. To log on is the two-word verb form.

The process of login is used to access an operating system or application, typically on a distant computer. A user almost always has to have both a user ID and a password in order to log on. Simply put, logging in implies confirming the identity of the user. It denotes that a user has been recognized and given permission to enter a website or program where they have already registered. Both web portals and web apps support login. There is no difference in meaning between the spellings login and log-in. They allude to entering a password and username when login into a computer or system, and are from a more recent, technological era.

Learn more about logon here

https://brainly.com/question/14454005

#SPJ4

_________ graphic applications are used today on a variety of devices, including touch-screen kiosks and mobile phones.

Answers

Answer:

Explanation:

Adobe Illustrator is the graphic application, that can be used to smartphones to design graphical projects.

A user invokes an app that writes a file. The app displays a progress bar that shows how much of the file has been written. Just as the progress bar reaches 50%, the battery fails and the device crashes. When the user reboots the device, he or she discovers that less than 20% of the file has actually been written. Explain why the app reported writing 50%. Frame your answer in terms of the design of I/O device drivers.

Answers

Answer:

The app reported writing 50% before the battery fails is because while writing, the data is been saved in the secondary memory via a buffer and not directly to the primary memory ( RAM ) and its returned from the secondary memory via the buffer to the primary memory

Explanation:

The app reported writing 50% before the battery fails is because while writing, the data is been saved in the secondary memory via a buffer and not directly to the primary memory ( RAM ) and its returned from the secondary memory via the buffer to the primary memory

What the app displays as a progress bar is from the Buffer, this is because as the developer was designing the app he wanted the data entry to be very fast  hence he had to send the file through a buffer with the aid of a workstation he designed. so if the secondary storage is slow in returning the data  back to the primary memory as fast as it entered the secondary memory via the Buffer, Then the percentage of the file that would be displayed as written when the system reboots will be less than what the app displayed before the reboot i.e. 20% < 50%

what is the numeric value of 19%(2+3) as evulated by Java

Answers

Answer:

4

Explanation:

java does parenthesis first then mod so it will do 2+3 which is 5 then 19 mod 5 which is 4(5 goes in evenly 3 times for a total of 15. Mod is the remainder number meaning that 19-15 = 4).

How many clients has
Accenture engaged globally on blockchain?

Answers

3,84, 000 people are engaged globally on blockchain.

- blockchain network technology by Accenture creates a database and allows the different organizations to access it in real-time without privacy issues

- For this Blockchain project, Accenture has employed 3,84,000 people approximately all over the world.

- The motto of Accenture’s Blockchain project is “Enable and empower multiparty systems to accelerate transformation”

If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of storage. A file made up of 4097 bytes will use 4096 bytes of storage. A file made up of 4097 bytes will use 4096*2=8192 bytes of storage. Knowing this, can you fill in the gaps in the calculate_storage function below, which calculates the total number of bytes needed to store a file of a given size?
1 def calculate_storage(filesize):
2 block_size = 4096
3 # Use floor division to calculate how many blocks are fully occupied
4 full_blocks = ___
5 # Use the modulo operator to check whether there's any remainder
6 partial_block_remainder = ___
7 # Depending on whether there's a remainder or not, return
8 if partial_block_remainder > 0:
9 return ___
10 return ___
11
12 print(calculate_storage(1)) # Should be 4096
13 print(calculate_storage(4096)) # Should be 4096
14 print(calculate_storage(4097)) # Should be 8192
15 print(calculate_storage(6000)) # Should be 8192

Answers

Answer:

def calculate_storage(filesize):

   block_size = 4096

   full_blocks = filesize // block_size

   partial_block = filesize % block_size

   if partial_block > 0:

       return (full_blocks + 1) * block_size

   return filesize

print(calculate_storage(1))

print(calculate_storage(4096))

print(calculate_storage(4097))

Explanation:

The python program defines the function 'calculate_storage' that calculates the block storage used. It gets the number of blocks used to store the data by making a floor division to get the integer value, then it checks for remaining spaces in the block. If there are spaces left, it adds one to the full_blocks variable and returns the result of the multiplication of the full_blocks and block_size variables.

could someone teach me how to program it? Thanks you

Answers

Answer:

Did you read the pdf? Also I only know JAVAscript and scratch not Verilog

Explanation:

Which of the following allows computers to process human voice commands into written format

Speech Recognition

Text input

Eye tracking

Auditory flashes

Answers

Speech Recognition allows computers to process human voice commands into written format

What is speech recognition?

Speech recognition, also known as automatic speech recognition (ASR), is a technology that converts spoken language into written text or other machine-readable formats. it involves the ability of a computer or electronic device to understand and interpret human speech and transcribe it into written form.

Speech recognition systems  utilize various techniques, including signal processing, statistical modeling, and machine learning algorithms, to analyze and decode spoken language. these systems are designed to recognize and differentiate between different phonetic units, words, and phrases based on the acoustic characteristics of the speech input.

Learn more about Speech Recognition at

https://brainly.com/question/30483623

#SPJ1

In a peer-to-peer network, every computer can communicate directly with every other computer. In addition, every computer is capable of sending and receiving information to and from every other computer. What security concerns do you have about this type of network

Answers

There are lot of computer network. The security concerns do you have about this type of network is that;

They are not really secure this is because in simple installations, data and other resources are shared by network users and this can be easily seen and used by individuals who have not been authorized.

Peer-to-Peer Network This is known as a type of network where every computer are able to communicate directly with every other computer.

All computer on this network has equal. but, each computer are configured to share only some of its resources. It is known for its security risk of data been not safe in this network.

Learn more about network from

https://brainly.com/question/1172049

what is the entity relationship model?

Answers

also known as an entity relationship model, its a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.

How To Approach Data Center And Server Room Installation?

Answers

Answer:

SEE BELOW AND GIVE ME BRAINLEST

Explanation:

Make a plan for your space: Determine how much space you will require and how it will be used. Consider power requirements, cooling requirements, and potential growth.

Choose your equipment: Based on your unique requirements, select the appropriate servers, storage devices, switches, routers, and other equipment.

Create your layout: Determine the room layout, including rack placement, cabling, and power distribution.

Set up your equipment: Install the servers, storage devices, switches, and other equipment as planned.

Connect your equipment: Connect and configure your servers and other network devices.

Check your systems: Check your equipment to ensure that everything is operating properly.

Maintain and monitor: To ensure maximum performance, always check your systems for problems and perform routine maintenance.

4.9 Code Practice: Question 4 Edhisive

Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values.

Sample Run
Enter Temperature: 27.6
Enter Temperature: 29.5
Enter Temperature: 35
Enter Temperature: 45.5
Enter Temperature: 54
Enter Temperature: 64.4
Enter Temperature: 69
Enter Temperature: 68
Enter Temperature: 61.3
Enter Temperature: 50
Sum = 504.3

Answers

i = 0

total = 0

while i < 10:

   temp = float(input("Enter Temperature: "))

   total += temp

   i += 1

print("Sum: {}".format(total))

I wrote my code in python 3.8. I hope this helps!

The program accepts 10 temperature inputs from the user, and takes the sum of the inputs gives before displaying the total sum of the temperature. The program is written in python 3 ;

temp_count = 0

#initialize the number of temperature inputs given by the user and assign to temp_count variable

sum = 0

#initialize the sum of the temperature inputs given

while(temp_count < 10):

#loop allows 10 inputs from the user

values = eval(input('Enter temperature : '))

#prompts user to input temperature values

sum+= values

#adds the inputted values to sum

temp_count+=1

#increases count of input by 1

print('sum of temperature : ', sum)

#displays the total sum

Learn more :https://brainly.com/question/18253379

4.9 Code Practice: Question 4 EdhisiveWrite a program that asks the user to enter ten temperatures and

explain the structure of c program with example

Answers

Answer:

A C program typically consists of a number of components, including preprocessor directives, function prototypes, global variables, functions, and a main function.

Explanation:

Here's an explanation of each component, followed by an example C program that demonstrates their usage:

Preprocessor Directives: Preprocessor directives are instructions to the C preprocessor, which processes the source code before compilation. They usually start with a '#' symbol. Some common directives are #include for including header files and #define for defining constants.

Function Prototypes: Function prototypes provide a declaration of functions that will be used in the program. They specify the function's name, return type, and the types of its parameters.

Global Variables: Global variables are variables that can be accessed by any function in the program. They are usually defined outside of any function.

Functions: Functions are blocks of code that can be called by name to perform specific tasks. They can accept input parameters and return a value. Functions are generally declared before the main function.

Main Function: The main function is the entry point of the program. It's where the execution starts and ends. It has a return type of int and typically takes command-line arguments via two parameters: argc (argument count) and argv (argument vector).

Here's an example C program that demonstrates the structure:

// Preprocessor directives

#include <stdio.h>

// Function prototypes

void print_hello_world(void);

// Global variable

int global_var = 10;

// Functions

void print_hello_world(void) {

   printf("Hello, World!\n");

}

// Main function

int main(int argc, char *argv[]) {

   // Local variable

   int local_var = 20;

   printf("Global variable value: %d\n", global_var);

   printf("Local variable value: %d\n", local_var);

   print_hello_world();

   return 0;

}

This simple C program demonstrates the use of preprocessor directives, a function prototype, a global variable, a function, and the main function. When run, it prints the values of a global and a local variable, followed by "Hello, World!".

Cristina works in the sales department of a company that provides security services to businesses. She is writing a proposal to persuade a shopping mall to hire her company. She is using the most recent version of Microsoft word but just learned that the customer has an older version. What word-processing function will let her provide a document her customer's software can read?

Answers

In such a situation, Cristina must save the document in a format that the customer's software can read.To ensure compatibility, Cristina can use the "Save As" function to save the document in an earlier version of Microsoft Word format. When using this function, she must choose the earliest version that is compatible with the customer's software.

When writing a proposal to persuade a shopping mall to hire a company that provides security services to businesses, the writer must ensure that the proposal is compatible with the software the customer uses. Cristina works in the sales department of such a company, and she is using the most recent version of Microsoft Word. However, she just learned that the customer has an older version.

In such a situation, Cristina must save the document in a format that the customer's software can read.To ensure compatibility, Cristina can use the "Save As" function to save the document in an earlier version of Microsoft Word format. When using this function, she must choose the earliest version that is compatible with the customer's software.

In this case, she must save the document in a format that is compatible with the older version of Word used by the customer.The "Save As" function in Microsoft Word is used to create a new version of the same document with a different name and file format. It is used to save the document in a different location and to save it in a different format from the original. The function is useful when a document must be saved in a different file format to be compatible with other software programs.

For more such questions on Microsoft Word, click on:

https://brainly.com/question/25813601

#SPJ8

Ms. Lawson, a primary school teacher, told her students that a photograph of the president is in the public domain. What does she mean by this?

Answers

Answer:

He belongs to the nation

Using the concepts of public and private domains, it means that the photograph of the president can be used by anyone without asking for permission.

---------------

Public and private domains:

If an image is of private domain, there is the need to ask the owner for the right to use the image.If it is of public domain, there is no need, as is the case for the president photo in this question.

A similar question is given at https://brainly.com/question/12202794

What is the main difference between the ICD-10 annual revision released by the WHO and the ICD-10-CM/PCS annual revision released by CMS and NCHS? ISENTIFY WHICH addendaCMS publishes and which addenda along with the overall connection to the WHO.

Answers

Answer:

The U.S. also uses ICD-10-CM (Clinical Modification) for diagnostic coding. The main differences between ICD-10 PCS and ICD-10-CM include the following: ICD-10-PCS is used only for inpatient, hospital settings in the U.S., while ICD-10-CM is used in clinical and outpatient settings in the U.S.

Explanation:

QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin

Answers

Answer:

Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.

Explanation:

Which of these statements performs real number quotient division using type casting?

double x = 35 % 10:
double x = 35 / 10;
double x = 35.0 / 10.0;
double x = (double) 35 / 10;
double x = 35.0 % 10.0;

Answers

Answer:

Double x = 35 / 10;

Explanation:

Java provides simple data types for representing integers, real numbers, characters, and Boolean types. These types are known as _ or fundamental types.

<3

which of the following is not the correct definition of an operating system

A.

it controls all other execution in a computer

B.

interface between hardware and application programs

C.

its a platform for ensuring that other executions has taken place

D.

maintains consistency of data loss during execution

Answers

The correct answer is C. An operating system is not a platform for ensuring that other executions have taken place. An operating system is a software program that manages the hardware and software resources of a computer and provides common services for computer programs. It acts as an interface between the hardware and application programs and controls all other execution in a computer. It also maintains consistency of data during execution.

Many real world problems that we encounter including Information Systems problems are wicked in nature. The following statements are TRUE of the wickedness of these problems EXCEPT….

Answers

They have clear avenues for solutions that are simple to identify. Wicked problems lack precise problem descriptions, making them ambiguous, complex, and challenging to resolve.

What are some instances of wicked dilemmas in real life?

Some of the most difficult and intricate problems of our time—many of which endanger human health—are referred to as "wicked." Examples of such wicked challenges include climate change, biodiversity loss, persistent poverty, the growing obesity pandemic, and food insecurity.

What constitutes a wicked example?

adjective a cruel and evil deed In the play, she took on the role of the evil stepmother. After winning, she grinned viciously. Her caustic sense of humour is well recognised. She was a bad case.

To know more about Wicked problems visit:-

https://brainly.com/question/29854616

#SPJ1

Question:

Many real-world problems that we encounter, including Information Systems problems, are wicked in nature. The following statements are TRUE of the wickedness of these problems EXCEPT:

a) They have unclear problem definitions and no definitive solutions.

b) They have multiple and changing constraints.

c) They have well-defined solution paths that can be easily determined.

d) They require a unique approach to every problem instance.

consider the pre- and postplanning needs of a film production, as well as what you will need to do during the actual filming of the video. Your action plan should be at least 150 words in length.

Answers

During the initial stages of a movie-making process, you must craft a script, formulate a financial blueprint, obtain funding, employ vital staff members like the director and film crew, search for ideal filming spots, and organize a shooting calendar.

What is postplanning?

Postplanning refers to the process of arranging post-production tasks, such as refining, sound manipulation, and enhancing visual elements.

Additionally, it involves developing and implementing promotional and delivery tactics.

While filming, your role would involve supervising the setting, collaborating with the cast and crew, handling intricate technicalities such as lighting and camera work, ensuring adherence to the script, and tackling any unforeseen obstacles that surface on set to facilitate a seamless production experience.

Read more about postproduction here:

https://brainly.com/question/31651152

#SPJ1

In this lab, you use what you have learned about searching an array to find an exact match to complete a partially prewritten C++ program. The program uses an array that contains valid names for 10 cities in Michigan. You ask the user to enter a city name; your program then searches the array for that city name. If it is not found, the program should print a message that informs the user the city name is not found in the list of valid cities in Michigan.

The file provided for this lab includes the input statements and the necessary variable declarations. You need to use a loop to examine all the items in the array and test for a match. You also need to set a flag if there is a match and then test the flag variable to determine if you should print the the Not a city in Michigan. message. Comments in the code tell you where to write your statements. You can use the previous Mail Order program as a guide.

Instructions
Ensure the provided code file named MichiganCities.cpp is open.
Study the prewritten code to make sure you understand it.
Write a loop statement that examines the names of cities stored in the array.
Write code that tests for a match.
Write code that, when appropriate, prints the message Not a city in Michigan..
Execute the program by clicking the Run button at the bottom of the screen. Use the following as input:
Chicago
Brooklyn
Watervliet
Acme

Answers

Based on your instructions, I assume the array containing the valid names for 10 cities in Michigan is named michigan_cities, and the user input for the city name is stored in a string variable named city_name.

Here's the completed program:

#include <iostream>

#include <string>

int main() {

   std::string michigan_cities[10] = {"Ann Arbor", "Detroit", "Flint", "Grand Rapids", "Kalamazoo", "Lansing", "Muskegon", "Saginaw", "Traverse City", "Warren"};

   std::string city_name;

   bool found = false;  // flag variable to indicate if a match is found

   std::cout << "Enter a city name: ";

   std::getline(std::cin, city_name);

   for (int i = 0; i < 10; i++) {

       if (city_name == michigan_cities[i]) {

           found = true;

           break;

       }

   }

   if (found) {

       std::cout << city_name << " is a city in Michigan." << std::endl;

   } else {

       std::cout << city_name << " is not a city in Michigan." << std::endl;

   }

   return 0;

}

In the loop, we compare each element of the michigan_cities array with the user input city_name using the equality operator ==. If a match is found, we set the found flag to true and break out of the loop.

After the loop, we use the flag variable to determine whether the city name was found in the array. If it was found, we print a message saying so. If it was not found, we print a message saying it's not a city in Michigan.

When the program is executed with the given input, the output should be:

Enter a city name: Chicago

Chicago is not a city in Michigan.

Enter a city name: Brooklyn

Brooklyn is not a city in Michigan.

Enter a city name: Watervliet

Watervliet is a city in Michigan.

Enter a city name: Acme

Acme is not a city in Michigan.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

The best method to prevent information on a disk from being discovered is to: A) use DOD overwrite protocols in wiping information from the disk. B) put the disk and the computer under water. C) melt the plastic disk contained within a hard drive container. D) smash the drive with a stout hammer

Answers

Answer:

C) Melt the plastic disk contained within a hard drive container

Explanation:

Data protection is very necessary from keep saving information from those that are not eligible to access it. It helps to avoid phishing scams, and identity theft.Alot of information are stored on the harddisk daily which can be read by disk drive, as situation can warrant prevention of third party from discovering information on it.There is hard platter used in holding magnetic medium in hard disk which make it different from flexible plastic film used in tapes.The disk drive container helps to hold as well power the disk drive.

It should be noted that The best method to prevent information on a disk from being discovered is to firstly

Melt the plastic disk contained within a hard drive container.

Can someone give me an example of code of any cartoon character using java applet please help me i need to make my project please☹️​

Answers

The Java code for a cartoon character using java applet is

import java.applet.Applet;

import java.awt.*;

public class CartoonCharacter extends Applet implements Runnable {

   Thread t;

   int x = 0;

   int y = 100;

   

   public void init() {

       setSize(500, 500);

       setBackground(Color.white);

   }

   

   public void start() {

       if (t == null) {

           t = new Thread(this);

           t.start();

       }

   }

   

   public void run() {

       while (true) {

           x += 10;

           repaint();

           try {

               Thread.sleep(100);

           } catch (InterruptedException e) {}

       }

   }

   

   public void paint(Graphics g) {

       g.setColor(Color.red);

       g.fillOval(x, y, 50, 50);

   }

}

How does the code work?

Note that the cartoon character is made like a red circle that navigates accross the screent.

The init() method sets the size of the applet and its background color,    while the      start( ) method creates a new thread and starts the animation loop in the run() method

Learn more about Java Code at:

https://brainly.com/question/29897053

#SPJ1

Other Questions
3) A manufacturing system is shown belowM1Processingtime = 35secondsM2Processingtime = 25secondsM3Processingtime =40secondsM4Processingtime = 41secondsM5Processingtime =50secondsFor an item to be fully processed it has to go through all machines in the sequence that is shown above. The items are moved synchronously and automatically with a transfer time of 20 seconds. Determine (a) the production line cycle time (b) time to process one work unit through all machines (c) the average production rate (d) time to produce 9,000 units.4) If the average mean time between failures for the production line in problem 3 is 25 hours, and the mean time to repair is 2 hours. Determine (a) the average hourly production rate. Find the value of a.38(2a + 24) A Circular pool has diameter of 24 feet what's the area of the cover - 452.16 square feet - 75.36 square feet - 150.72 square feet - 1,808.64 square feet At Delta Corp. the manufacturing and design department frequently consults with the research and development department and the marketing and sales department regularly interacts with the manufacturing and design department. This scenario illustrates _____ at Delta. Question 2 (2 points)Charles is paid $3.75 per hour plus time and a half on holidays and makes an average of 15% tips on his food sales as a server at the localseafood restaurant.This is modeled by the expression 3.75(x) +3.75(1.5)(y) +0.15(z).What is Charles' gross pay if he worked 25 regular hours and 5 holiday hours and had $1,915 in food sales?O aObOcOd$121.88$399.75$409.13$446.63 For each equation, determine whether it represents a direct variation, an inverse variation, or neither.Find the constant of variation when one exists and write it in simplest form. If B = (8, 145, 287, 7005). Find the outer measure of B, i.e *(B). a person mailing postcards earns a fixed amount for each postcard he mails yesterday his hourly wage was $14 an hour if he worked 5 hours yesterday and mailed 300 postcards how much does he earn for each postcard mailed? show you work question 7 options: activity f is preceded by activity d and activity e. what is the es time for activity f? Identify the relationship between the variable:_____ is a function of __Ps need asap What is Federalism in simple terms? For the IR Spectra of 4-Aminophenol and Acetaminophen, label the following on the provided IR samples (if they are available): O-H peak, C-H (SP2), C-H (SP3), C=C, C=O, C-O, C-C, N-H, and C-N. Hint: it would be helpful to first identify the functional groups present in each compound. please explain your answer and please make sure you don't make a mistake that will confuse me thankyou Dissolved substances such as glucose and sodium ions exert apressure at cell membranes called :A. Oncotic pressureB. Hydrostatic pressureC. Osmotic pressureD. Interstitial fluid pressure In an all boys school, the heights of the student body are normally distributed with a mean of 67 inches and a standard deviation of 3.5 inches. Out of the 793 boys who go to that school, how many would be expected to be taller than 6 inches tall, to the nearest whole number? 4. Which of the following differences could not give a distance between two points on a number line? Explain why. a. 19-7 c. -12-(-7) b. -3 - (-18) d. 14-(-6) write the value of atmosphere pressure at sea level . The difference of a number and 6 is less than 1. Must be a inequality Hi how do i formulate but not solve this problem? which earthquake was used as an example for liquefaction destruction on the pnsn website?