In C#
Please as soon as possible ​

In C# Please As Soon As Possible

Answers

Answer 1

Answer:

I'm not hundred percent sure but I believe it is going up by 100 the scale each number for the total quantity

Explanation:


Related Questions

What position should you hand be on the steering wheel? yuyuyhj

Answers

Answer:

9 and 3

Explanation:

its the right way and njcs wdhiqgua wdiu posef

Freeze column A and rows 1 through 3 in the worksheet

Answers

The question tells us that we are dealing with an Excel Worksheet task.

The most popular workbooks are:

"MS Excel" and "G-Sheets"

The purposes of this question we will consider both.

Columns in either of the two types of worksheets mentioned above refer to the Vertical Grids which run through the sheets.

Rows on the other hand refer to the Horizontal Grids which run through the sheets. Both Columns and Rows comprise Cells.

Freezing in this sense refers to the act of ensuring that regardless of which direction the worksheet is scrolled, the frozen parts remain visible on the screen.

How to Freeze Column A and Rows 1 to 3

In "MS Excel":

Open Microsoft Excel Click on Blank WorkbookClick on Cell B4 to highlight itOn the ribbon above, click on view to display its sub-functionsselect Freeze Panes

This action will freeze the entire column A as well as Row 1 to 3. To increase the number of rows from 1-3 to 1 to 5 for instance, you'd need to return to the View Function, Unfreeze the Panes, select Cell B6 then select Freeze Panes.

In "G-Sheets"

Ensure that your computer is online, that is, connected to the internetOpen "G-Sheets"Place your mouse cursor on cell B3 and click to highlight itWith your click on View in the ribbon above. This will display the Freeze function in "G-Sheets" along with its subfunctionsSelect the "Freeze + Up to row 3".  This action will freeze Rows 1 to 3.Next, click anywhere in Column ACarry out step 4 above and select "Freeze + Up to column A"

For more about Freezing Work Sheets click the link below:

https://brainly.com/question/17194167

WHAT DO YOU KNOW?
Why would you want to change your Table
Properties?

Answers

read the slides ;  Table Properties are the way the table appears or looks.

Cho lược đồ CSDL “Quản lý BÁN HÀNG” có các bảng như bên dưới. (Thuộc tính in đậm và
gạch chân là khóa chính, gạch CHÂN NÉT ĐỨT là khóa ngoại. Kiểu dữ liệu và độ rộng của
các thuộc tính tự chọn sao cho phù hợp.

Answers

sorry i donnt speak chinese

rearrange the following procedures in there proper order. use numbers (1-8) to indicate their order of precedence.
.___________crimp
.___________strip cable end
.___________test
.___________untwist wire ends
.___________trim wires to size
.___________check
.___________arrange wires
.___________attach connector​

Answers

Answer:

6 - crimp

1 - strip cable end

8 - test

2 - untwist wire ends

4 - trim wires to size

7 - check

3 - arrange wires

5 - attach connector​

Explanation:

Step 1. Strip cable by inserting into the stripping tool. Rotate the cable in a smooth and even motion to create a clean cut and pull away towards the end of the wire to remove the sheathing.

Step 2. Untwist wire ends. Separate the twisted wires and straighten them out to easily sort in the right order.

Step 3. Arrange wires. Put the wires in the correct order so they can be properly crimped.

Step 4. Trim wires to size. Use the cutting section of the crimping tool to cut them into an even line.

Step 5. Attach connector. Insert the connector so that each of the small wires fits into the small grooves in the connector.

Step 6. Crimp. Insert the connector in the crimping tool. Squeeze the handles to crimp the connector and secure the wires.

Step 7. Check. Take the connector our of the tool and look at the pins to see that they're all pushed down.

Step 8. Test. Lightly tug at the connector to make sure it's attached to the cable.

Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state). The analyst wants to combine the two columns into a single column named location, with the city and state separated by a comma. What code chunk lets the analyst create the location column

Answers

The programing language, R has a unite unite function in the tidyr package. Hence, the code chunk which let's the analyst create the location column is; unite (stores, "location”, city, state, sep=",")

The syntax for the unite function is ; unite(data,col,..., sep)

data = dataframe from which data is to be extracted `; stores col = name of the new column ;" location"... = dataframes to be merged ; city, statesep = seperator ; ","

Hence, the required syntax goes thus :

unite (stores, "location”, city, state, sep=",")

Learn more : https://brainly.com/question/25534959

Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system

Answers

Answer:

he various advantages that can be associated with a password generator software are as follows: Any arbitrary long password can be generated using the complete set of symbols and not just a subset (usually the subset which is easier to type on a key

Explanation:

True or False. A range has an address called a range address.
True
False

Answers

Answer:

im not sure so i apoligize, but i think its true

Explanation:

It’s false
Hope that helps!

i will send you money

Answers

Answer:

..................................................................................................................................................

Explanation:

Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what types of applications and tools

Answers

Answer:

Q10. Performing a vulnerability assessment on PCI DSS production systems, servers, and applications requires what applications and tools? Answer:----------- Assessment tools, firewall applications Q11. Refer to the PCI DSS Self-Assessment

Explanation:

Microcomputer hardware consists of three basic categories of physical equipment _____a. System unit, Input/output, Memory b. System unit, input/output, secondary c. Keyboard, monitor, hard_drive d. System unit, primary storage, secondary storage.​

Answers

Answer:

c

Explanation:

Hope it helps!!

sure po ako dyaan

What is the difference between Background and Watermark?​

Answers

Background is the very back of a photo, watermark is an overlay to the photo

Create a raptor program that asks to user to enter 10 numbers into an array. Then display all the numbers, the smallest and the largest. Be sure to add prompts and labels to your input and display.

Answers

This is the raptor program written in Python 3.8:

########################################################

ten_numbers = [ ]

# get the ten numbers

print("Enter 10 numbers")

for i in range(1, 11):

   num = int(input("[{ }] (Enter number and press enter to accept): ".format(i)))

   ten_numbers.append(num)

# get the smallest and the largest

smallest = min(ten_numbers)

largest = max(ten_numbers)

# display the results

print("The list of numbers is: { }".format(ten_numbers))

print("The smallest number in the list is { }, and the largest is

           { }.".format(smallest, largest))

########################################################

The raptor program

Uses a for loop to get the 10 numbers into a list. Then, it uses the in-built Python min and max functions to get the smallest and largest numbers in the list.

Learn more about Python lists here: https://brainly.com/question/24941798

Technician A says stepped resistors are made from one or more wire-wound resistors.
Technician B says a common application for this type of resistor is in a blower motor speed
control circuit. Who is correct?
Select one:
O a. Technician A
O b. Technician B
O C. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

Your answer is both A & B
I hoped this helped <33

Discuss how to enhance the security of a Linux computer in a systematic manner.

Answers

Answer:

So here are five easy steps to enhance your Linux security.

1. Choose Full Disk Encryption (FDE) No matter which operating system you are using, we recommend that you encrypt your entire hard disk.

2. Keep your software up-to-date.

3. Learn how to use Linux’s firewall.

4. Tighten up security in your browser.

5. Use anti-virus software.

Explanation:

Linux has five steps for enhanced security.

What are the five layers of security in Linux?

A Linux is an operating system and has a Linux kernel that is based on the system and consists of five-layer of enhanced security.

These are FDE that is chosen full disk encryption, followed by keeping software up to date and learning how to make use of a firewall. It also tightens the browser's security plus the use of anti-virus.

Fin dout more infimation about the linux.

brainly.com/question/25480553

Do you trust machine learning application?

Answers

Answer:

Trusting a machine learning model, in general, can be interpreted as creating a robust model which gives largely accurate results and has a high generalization ability. Classification models learn from past experience, so the robustness of a model primarily depends on the given training set

Explanation:

Hope it helps

                         Please mark as brainliest

g Deliverables: 1.Referencing the Arduino attachInterrupt() documentationand the provided code, what does the attachIntterupt() function call on line 19 do, and how does that work with the magnet_detected() function

Answers

Answer:software routine that hardware invokes in response to an interrupt.

Explanation:

While discussing the testing procedures for relays, Technician A says that if a relay does not
click or activate a circuit it is intended to operate, it can be comprehensively tested using a
voltmeter, test light, or ohmmeter. Technician B says that electronic relay testers do not
require a voltage source. Who is correct?
Select one:
O a. Technician A only
O b. Technician B only
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

Answer:

Socratic app

Explanation:

it will help you

Answer C is correct
Hope this helped <33

three types of keys on the keyboard​

Answers

letter symbols letters

write down the color code for straight-through cabling. write your answer on the space provided​
1.
2.
3.
4.
5.
6.
7.
8.

Answers



White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown

Mark Brainliest please

Answer:

1White/Green

2Green

3White/Orange

4Blue

5White/Blue

6Orang

7White/Brown

8Brown

Explain how navigation aids work.

Answers

Answer:

VOR facilities allow the pilot to follow a designated flight path by using the aircraft's cockpit gauges to indicate their positions. ILS transmits guidance beams to allow the pilot to land safely and efficiently.

Explanation:

GThe transmiter must beresolved in order to guide the transmission to arcraft

Write two statements to assign numApples with 10 and numOranges with 3. Sample output for given program: Apples: 10 Oranges: 3

Answers

numApples = 10

numOranges = 3

print(f"Apples: {numApples}")

print(f"Oranges: {numOranges}")

The statements should assign numApples with 10 and numOranges with 3.

The code is written in python.

The variable numApples is used to assign the number of apples and numOranges is used to assign the number of oranges.

The number of apples and oranges were outputted with the print statement in python.  

I used the f strings in python to concatenate strings and integers.

The bolded values in the code are python key words.

read more: https://brainly.com/question/13785329?referrer=searchResults


Steve Jobs


Born
Feburary 24, 1955


Death
October 5, 20122


Steven Paul Jobs was an American inventor, designer and entrepreneur who was the co-founder, chief executive and chairman of
Apple Computer.

Apple's revolutionary products, which include the



  • iPod

  • iPhone

  • iPad


Apple Computer


In 1976, when Jobs was just 21, he and Wozniak started Apple Computer in the Jobs’ family garage. They funded their entrepreneurial
venture by Jobs selling his Volkswagen bus and Wozniak selling his beloved scientific calculator. Jobs and Wozniak are credited with
revolutionizing the computer industry with Apple by democratizing the technology and making machines smaller, cheaper, intuitive and
accessible to everyday consumers.


Wozniak conceived of a series of user-friendly personal computers, and — with Jobs in charge of marketing — Apple initially marketed
the computers for $666.66 each. The Apple I earned the corporation around $774,000. Three years after the release of Apple's second
model, the Apple II, the company's sales increased by 700 percent to $139 million.


In 1980, Apple Computer became a publicly-traded company, with a market value of $1.2 billion by the end of its very first day of
trading. Jobs looked to marketing expert John Sculley of Pepsi-Cola to take over the role of CEO for Apple.


The next several products from Apple suffered significant design flaws, however, resulting in recalls and consumer disappointment.
IBM suddenly surpassed Apple in sales, and Apple had to compete with an IBM/PC-dominated business world.


In 1984, Apple released the Macintosh, marketing the computer as a piece of a counterculture lifestyle: romantic, youthful,
creative. But despite positive sales and performance superior to IBM's PCs, the Macintosh was still not IBM-compatible.


Sculley believed Jobs was hurting Apple, and the company's executives began to phase him out. Not actually having had an
official title with the company he co-founded, Jobs was pushed into a more marginalized position and thus left Apple in 1985.


Answers

Answer:

what Is your question it is not clearly stated

Synthesize (15 points)
Determine the practical steps for delivering a presentation, and apply the principles
of good communication to a slide presentation. Critique the style of two different
presentations shown on the second page of this activity.
1. Delivering a successful presentation is difficult, and often it comes down to the
details. Watch Video A, which is on the second page of this activity. List three things
you think this presenter is doing successfully
2. Watch Video B. Compare the two presenters and identify two things this presenter
could do better.

Answers

Answer:

Perfection: When you make a mistake, no one cares but you.

Even the most accomplished public speaker will make a mistake at some point. Just keep in mind that you’ll notice more than anyone in your audience. The most important thing you can do after making a mistake during a presentation is to keep going. Don’t stop and—unless the mistake was truly earth shattering—never apologize to the audience for a minor slip. Unless they are reading the speech during your delivery, the audience won’t know if you left out a word, said the wrong name, or skipped a page. Because “to err is human,” a mistake can work for you, because it allows you to connect with your audience. People don’t want to hear from someone who is “perfect;” they will relate much more easily to someone who is real.

Master the art of public speaking and crush your next presentation with one of our public speaking seminars, available online and in a classic classroom format.

Effective Executive Speaking

Take your public speaking to the next level! Speak, present and communicate with poise, power and persuasion.

Visualization: If you can see it, you can speak it.

Winners in all aspects of life have this in common: they practice visualization to achieve their goals. Sales people envision themselves closing the deal; executives picture themselves developing new ventures; athletes close their eyes and imagine themselves making that basket, hitting that home run, or breaking that record.

The same is true in public speaking. If you’ve read “10 Powerful Body Language Tips” then you know how anxiety can impact presentation skills. The best way to fight anxiety and to become a more comfortable speaker is to practice in the one place where no one else can see you—your mind. If you visualize on a consistent basis, you’ll prepare your mind for the prospect of speaking in public, and pretty soon you’ll conquer any feelings of anxiety.

Discipline: Practice makes perfectly good.

Your goal is not to be a perfect public speaker. There is no such thing. Your goal is to be an effective public speaker. Like anything else in life, it takes practice to improve those public speaking skills. We too often take communication for granted because we speak to people everyday. But when your prosperity is directly linked to how well you perform in front a group, you need to give the task the same attention as if you were a professional athlete. Remember, even world champion athletes practice every day. Try taking a class where you practice giving speeches.

calculate the speed when given the amount of 1TB to be transfer in 5hrs.

Answers

Answer:

Data transfer rate is the speed that a certain amount of data is transferred over a given period of time. You might want to know the transfer rate if you’re downloading something online or transferring data from one source to another. First, convert your units so the file size and transfer speed are in either bits or bytes with the same prefix (kilo, mega, giga, or tera). Then, plug your numbers into the equation S = A ÷ T in which A is the amount of data and T is the transfer time to solve for S, the speed, or rate, of transfer. You can also determine the amount of data or the transfer time if you know one of the variables plus the speed of transfer.

Explanation:

To classify wireless networks by coverage, which of the following are wireless networks?
A- WPAN
B-WLAN
C- WMAN
D- WWAN

Answers

Answer:

B -WLAN

Explanation:

Use the edit icon to pin, add or delete clips.

Write a program to grade an n-question multiple-choice exam (for n between 5 and 50) and provide feedback about the most frequently missed questions. Your program will take data from the file examdat.txt. The first line of the file contains the number of questions on the exam followed by a space and then an n-character string of the correct answers. Write a function fgets Answers that inputs the answers from an open input file. Each of the lines that follow contain an integer student ID followed by a space and then that stu dent's answers. Function fgets Answers can also be called to input a student's answers. Your program is to produce an output file, report.txt, containing the answer key, each student's ID, and each student's score as a percentage, and then information about how many students missed each question. Here is a short sample input and output files. examdat.txt 5 dbbac 111 dabac 102 dcbde 251 dbbac

Answers

Answer:

I was able to create script however it was not in the correct language, sorry.

Explanation:

Which famous British physicist wrote A Brief History of Time?​

Answers

Answer:

Stephen Hawking

Q1. What is animation?

Answers

Answer:

The act of animating, or giving life or spirit.

Explanation:

HOPE IT HELPS............

Anyone watch anime what's y'all race

Answers

I'm starting to. Right now I'm watching Mob Psycho 100 and HxH.

I'm mixed.
Other Questions
Russell is eating at a restaurant. His total bill comes to $44.85. If Russell decides to leave a tip that is approximately 20% of the total bill, how much should he leave for the tip? $9.00 $0.09 $54.00 $8.00 4.A recipe for 12 cookies calls for 15 cups of milk, 2 cups of flour, and 1 cups of otheringredients. How many total cups of milk, flour, and other ingredients are needed to make24 cookies?a) 103 cupsb) 116 cupsC) 11 cupsd) 103 cups (x-4)2 = 36Which of the following expressions represents the solutions to the given equation?0-4+ V(36)O4 + V(36)16+ (36) Help!!!!! I will give out brainiest to best answer!!! Solve the linear systems using multiplication 6x - 12y = 15;2x - 4y = 6 - a large tire manufacturing facility tracks numerous safety indicators and provides frequent safety training. each month, if no incidents or unsafe conditions occur, the employees receive a small bonus. the tire manufacturer is using controls to According to the map above, which of the following statements is true?A. The Middle East is the only region in the world with a large Muslim population.B. Islam is the most commonly practiced religion in every Middle Eastern country.C. The majority of people in the Middle East are Muslim.D. Only one Middle Eastern country has a Muslim population of 50% and above.Please select the best answer from the choices provided A B C D find the length of fencing required to go all the way around the rectangular field that is 136000mm wide and 425m long Can some help me plzzzz Questions. [Factorial]3 + (2! 2!) = ...... help me with this pls asap I need to know the answers to what the solutions are. 4. FGH - MNP. Solve for x. From 2000 to 2010, which continent or region did the most people come from? From which country did the most immigrants come? 17. Which of the following numbers is the largest. Explain why you made the choice you did.-3/4, -3/2,-1, -2/3 how did cotton cultivation transform the physical landscape of the south? ANSWER ONLY IF U KNOW, OR THINK U KNOW.(ILL MARK U BRAINLIEST) Raven can walk 2. 4 miles in 36 minutes. At this rate, how far can she walk in 1 hour?. simplify, (xy+yz) - 2xyz and find the value when x=-1, y=2 and z=1plz answer this fast plz u will give you brainly plz help me fast only 5min left to answer Who did the Susquehannock surrender to?IroquoisWampanoagMaklakPowhatan