Answer:
ZIP
Explanation:
ZIP is a type of compression file as Jpg is a picture file, Gif is a picture file, and ODOC stands for Oklahoma Department of Corrections
TBH:
it may be O ZIP but i've never heard of it.
Answer:
Zip (D)
Explanation:
Took The Test
The type of device which is 3 ½ inch floppy drive is
Answer:
That would be known as a floppy disk(literally)
Explanation:
It is a removable magnetic storage medium. They are used for moving information between computers, laptops or other devices.
fast guys can u tell its answer
find the count of value from cells a5 through e12
Answer:
See the bottom status bar of excel, it will show the average, count and sum of values in the selection.
cutting of trees is bad or not bad
Answer:
bad
Explanation:
it gives out air and oxygen
if resistors were 10 times larger what would happen to output voltage
Answer:
is there a picture to go w the question?
Multi-part question:
Part 1:
Use MySQL Workbench to create an EER model for a database that stores information about the downloads that users make. (When you create the EER model, it will be given a default name of mydb. For this exercise, it’s not necessary to change this name.) Define the tables that are necessary to implement this data structure:
Each user must have an email address, first name, and last name.
Each user can have one or more downloads.
Each download must have a filename and download date/time.
Each product can be related to one or more downloads.
Each product must have a name.
When you’re done defining the tables, create a diagram for the database. Then, use the diagram to define the required relationships. When you do that, be sure to use the relationship button that uses existing columns.
Part 2:
Create a view named order_item_products that returns columns from the Orders, Order_Items, and Products tables.
This view should return these columns from the Orders table: order_id, order_date, tax_amount, and ship_date.
This view should return the product_name column from the Products table.
This view should return these columns from the Order_Items table: item_price, discount_amount, final_price (the discount amount subtracted from the item price), quantity, and item_total (the calculated total for the item).
Part 3:
Write a SELECT statement that uses the view that you created in part 2 to get total sales for the five best selling products. Sort the result set by the order_total column in descending sequence.
Answer:
part 1:
Explanation:
A(n) __________ records the activities of computer operators surrounding each event in a transaction.
A. threat analysis
B. audit trail
C. DNA profile
D. expert systems analysis
Answer:
B. audit trail
Explanation:
A(n) audit trail records the activities of computer operators surrounding each event in a transaction.
Show the dynamic and speculation execution for the following code
Add F2,F3,F4
Loop : Lw F2,0(R1)
Subi R1,R1,8
Div F9,F10,F11
Sw F9,5(R2)
Bne R1,Loop
- 1 Fp & 1 Int operation can issue at the same cycle
- 3 execution stage
- 2 commit stage
- FP : 2 cycle
- Lw : 2 cycle
- ALU : 3 cycle
- Two iteration
Answerf9,f10,fll
Explanation:
How many times will line 7 be executed when the following code is run?
String str = "rebellion";
int i = 0;
int j = str.length() - 1;
String result = "";
while (i < j)
{
result = str.substring(i, i + 1) + result + str.substring(j, j + 1);
i++;
j--;
}
System.out.println(result);
(Java)
Answer:
4 times
Explanation:
Required.
How many times will line 7 be executed?
Line 2 initialises i to 0
Line 3 subtracts 1 from the length of "rebellion" , the result of the subtraction is then saved in J
So:
j = 9 - 1
j = 8
From line 2 and line 3, we have that:
i = 0 and j = 8
Line 4 is an iteration that is repeated as long as i is less than j
Line 7 will be executed, for the first time as: i < j because 0 < 8
i is incremented to 1 and j is reduced to 7
Line 7 is then executed again, the second time because 1 < 7
i is incremented to 2 and j is reduced to 6
Line 7 is then executed again the third time because 2 < 6
i is incremented to 3 and j is reduced to 5
Line 7 is then executed again the fourth time because 3 < 5
i is incremented to 4 and j is reduced to 4
At this stage, line 7 will no longer be executed because I is no longer less than as 4 = 4.
Hence, number of execution is 4 times
Helen is working on her colleague’s photos. She came across this particular photo and was confused about which effect the photographer had used in the photo. Can you help her figure out the effect?
The effect used in the photo is
Answer:
it could be Tilt-shift - Tilt-shift effect - or Miniature faking.
Explanation:
Fill in the blank are always hard when the system has a set answer. But photographers commonly use the tilt-shift effect to focus on a certain part of the image while blurring the rest of the photograph. They refer to this as selective focus. You can use the tilt-shift effect and selective focus for miniature faking. This is where the subjects in the photograph appear miniaturized. Hope this helps
Answer: tilt-shift
Explanation:
In a text messaging system, data is sent from one device to another. Devices are recognized by a unique device ID. The format of the message is sent as a string with information about the number of characters in the device ID, the device ID itself, the number of characters in the text message and the text message that is being sent with each part being separated by a space. The system uses this information to send the message to the correct device and the receiving device displays only the text message. The number of words in the text message is also useful. A word is defined by strings separated by spaces.
Here is a sample VALID message:
04 1234 05 hello
The first two digits in the string represent the length of the device ID to follow.
The device ID is the number of characters following the length. Note that the device ID may not be limited to number values.
Following the device ID is the length of the text message and then the text message itself. The text message may be any combination of characters (such as letters, numbers or symbols) and may include spaces.
This message contains one word.
Here is a sample INVALID message:
06 a2b10 09 I’m ready
The first two values 06 indicate the device ID length. The device ID is a2b10 which has a length of 5. This does not match the specified length 06. Thus, this is NOT a valid message.
This message contains two words.
The Message class represents messages in this system. A Message must have a device ID, the length of the ID, the length of the message and the text message being sent in order to be a valid message sent through the system. The Message class must determine if a message is valid in order to send a message. A valid message is one where the device ID length matches the given length in the message string and the text message length matches the length of the supplied text message. The text message consists of one or more words where the length of the text message string is at least one character.
Consider the code below:
Message msg1 = new Message("08 abc123xy 16 Computer Science"); //creates a new message object
boolean msg1Valid = msg1.isValid(); // returns true for a valid message
String text = "11 radio11a287 14";
Message msg2 = new Message(text);
boolean msg2Valid = msg2.isValid(); // returns false for an invalid message
Message msg3 = new Message("04 92a1 16 Computer Science");
Message msg4 = new Message("03 x8r 21 Today is a great day!");
int numWords = msg4.wordCount(); //returns 5, the number of words in the
//text message
Complete the Message class by writing the isValid() and wordcount() methods.
public class Message{
private int idLength;
private String deviceID;
private int msgLength;
private String textMsg;
public Message(String msg){
//implementation not shown
}
public boolean isValid(){
//to be written
}
public int wordCount(){
//to be written
}
Answer:
public int wordCount() {
String[] arr = textMsg.split(" ", 0);
return arr.length();
}
public boolean isValid() {
if (idLength == deviceID.length()) {
if (msgLength == textMsg.length()) {
return true;
} else {
return false;
}
return false;
}
Explanation:
The Java source code defines two methods in a class named Message namely; isValid() and wordCount(). The isValid() method evaluates the validity of a message sent to return a boolean value while the wordCount() counts and returns the number of words in the message.
The material inspection and recieving report the multi-purpose document that serves as evidence of inspection and acceptance, shipping document, receiving document, and contractor invoice is designated as the:________.
Answer:
DD Form 250
Explanation:
DD Form 250 which is an acronym for Department of Defense Form 250.
It is the Material Inspection and Receiving Report that is used for contracts supplies and services including acquiring noncommercial commodities such as:
1. Acknowledgment of equipment by the Government
2. Contractor's invoice for expense.
3. loading record for hauling and acquiring.
4. Proof of Government Quality assessment.
Hence, in this case, the correct answer is DD Form 250.
How much data can a flash drive store?
Answer:
depends on which flash drive
Explanation:
32GB-1000 photos
Well, It just depends on which size you get. You could get a 512 MB or 10 GB. I prefer somewhere in the middle because I don't need to store a lot of stuff in my Flash drive.
Create a Java program that takes input of a list of integers from the user, stores them into an array and then finally uses the array contents to output the list of integers in reverse. The user's input begins with the number of integers to be stored in the array. For coding simplicity, follow each output integer by a space, including the last one. Assume that the list will always contain fewer than 20 integers.
Answer:
This question is answered using Java
import java.util.*;
public class Main{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Length of array: ");
int len = input.nextInt();
int[] intArray = new int[len];
for(int i = 0; i<len;i++){
intArray[i] = input.nextInt();
}
for(int i = len-1; i>=0;i--){
System.out.print(intArray[i]+" ");
}
}
}
Explanation:
This line prompts user for length of array
System.out.print("Length of array: ");
This gets the length of the arrau
int len = input.nextInt();
This declares the array as integer
int[] intArray = new int[len];
The following iteration gets input to the array
for(int i = 0; i<len;i++){
intArray[i] = input.nextInt();
}
The following iteration prints the array in reversed order
for(int i = len-1; i>=0;i--){
System.out.print(intArray[i]+" ");
}
A junior account manager owns an account and creates a new opportunity to manage a complex deal. She needs the help of the product specialist and solution engineer.
Given the size of this deal, she knows the account is likely to be reassigned to a senior Account manager in the near future.
What is the optimal way for the Junior Account manager to share the opportunity, given the private sharing model?
Manual share on the account
Opportunity Team
Manual share on the opportunity
Create owner-based sharing rule
Answer: I'd say She should share by Email, Text, or call.
PLS HELP ASAP- Select the correct text in the passage.
Which concept explained in the paragraph below means that data always remains consistent?
Specific programs have some tasks that a computer must perform in parallel with others. These tasks (such as the performance of the same set of operations on different data sets) often work in parallel clusters. In such cases, a separate thread of execution handles each separate task. You can think of a thread as a sequence of instructions that computers can manage independently.
It is possible for different threads to access the same data elements and change their values, and this can lead to an inconsistent state of information. For instance, if multiple programs access a shared variable x and change its value, the variable will not contain the correct value at the end of the programs. We can prevent such inconsistencies by using locks. A thread puts a lock on shared data, and releases this lock only after completing its operations.
Answer:
reread the text
Explanation:
I do it it helps
Answer:
A thread puts a lock on shared data, and releases this lock only after completing its operations.
The last sentance
Explanation: TRUST ME ISTG THATS THE ANSWER
Select the correct answer. Which type of computer application is Apple Keynote? OA. word processor O B. spreadsheet O C. presentation OD. database O E. multimedia
Answer:
Apple Keynote is presentation Software
The correct option is C
Explanation:
Now let explain each option
Word processor:
Word processor is incorrect because it is used to type text, format it add tables and figures, For example MS Word
Spread Sheet:
Spread Sheet is incorrect as it is used for calculation. Like MS Excel
Presentation:
Key tone is a presentation software. it is used to make presentation and add animation and transition to it.
Database
Database is incorrect because databases are used for storing data. Not for presentation.
The OpenMP critical-section compiler directive is generally considered easier to use than standard mutex locks, because
Complete question
A) management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors.
B) programmers don't need to worry about race conditions.
C) a thread cannot block inside a critical section.
D) deadlock cannot occur.
Answer:
A. Management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors
Explanation:
This is a multiple choice question and this is the answer because:
1. OpenMp is inclusive of an APL/compiler directives:
2. any code which follows #pragma omp parallel is a parallel region and it is performed by large number of threads that are same as the number of processing cores that are in the system.
3. The critical-section compiler directive acts more like a binary semaphore or mutex lock,it makes sure that only one thread is active in the critical section at the same time.
What is the name of the variable in the
following code?
Answer:
Lift
Explanation:
When coding, you use a variable name for an object, and assign it to move up, down, and/or sideways.
explain the major innavotions made from the establishment of abacus
Answer:
The abacus is one of many counting devices invented to help count large numbers.
Explanation:
how do you evaluate the use of the navigational aids and technology
Explanation:
A navigational aid or AtoN or navaid is any sort of marker that guides to mark safe waters and also help mariners in determining their position with respect to land or any navigational hazard or hidden danger. Traditionally aids to navigation have been physical aids such as lighthouses, buoys and beacons
Which of the following are risks to a network?
a Sending emails
b. Granting administrator access to a non-administrator
c. Opening files from unknown senders
d. Unwanted advertisements
Answer:
option b and c are correct answers.
Explanation:
Let see each option in detail.
a) Sending email is not a risk.
b) Granting access is a problem because the other person can undermine the network
c) Unknow senders can send virus or other malicious code to corrupts you data.
d) Unwanted advertisement is not a big deal.
Answer:
Granting administrator access to a non-administrator
Opening files from unknown senders
Explanation:
Psst those are the answers
What does Stand for in web design
Answer:
g
Explanation:
h
A value chosen by the responder to identify a unique IKE SA is a _________.
A. Initiator SPI
B. Responder SPI
C. Flag
D. Message identifier
Answer:
Responder SPI
Explanation:
Responder SPI : Cookie of an individual referring to an application from the SA organization, a message from the SA, or a delete from the SA.
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.
The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.
Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!
Coding portion:
public class Password
{
public static void main(String[] args)
{
// Prompt the user to enter their password and pass their string
// to the passwordCheck method to determine if it is valid.
}
public static boolean passwordCheck(String password)
{
// Create this method so that it checks to see that the password
// is at least 8 characters long and only contains letters
// and numbers.
}
}
Answer:
import java.util.regex.*;
import java.util.Scanner;
public class Password
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.println("Please enter the Password. \n");
String passwordString = input.next();
System.out.println(passwordCheck(passwordString));
}
public static boolean passwordCheck(String password){
if(password.length()>=8 && password.matches("[a-z0-9A-Z]+")){
return true;
}
else{
return false;
}
}
}
Explanation:
The Java class "Password" is used by the program to make an instance of the password object and check its validity with the passwordChecker method defined within the Password class. The passwordChecker method only matches alphanumeric passwords, that is, passwords with alphabets and numbers. If a non-alphanumeric character is encountered, the boolean value false is returned.
Having too much b-roll footage is often a problem for editors
True
False
verdade pois tem muita filmagem e é dificil escolher a melhor imagem
A device is sending out data at the rate of 1000 bps. How long does it take to send
out (a)10 bits, (b) a single character (8 bits) and (c)100,000 characters?
Answer:
0.01 second ; 0.008 seconds; 800 seconds
Explanation:
Given that:
Sending rate = 1000 bps
Rate of 1000 bps means that data is sent at a rate of 1000 bits per second
Hence, to send out 10 bits
1000 bits = 1 second
10 bits = x
1000x = 10
x = 10 / 1000
x = 0.01 second
2.)
A single character 8 - bits
1000 bits = 1 second
8 bits = (8 / 1000) seconds
= 0.008 seconds
3.)
100,000 characters = (8 * 100,000) = 800,000
1000 bits = 1 second
800,000 bits = (800,000 / 1000)
= 800 seconds
write a an algorithm to find out volume?
who here plays overwatch or paladins ps4? I'm getting overwatch soon and need people to play with. please don't report this.
Answer:
I'm down to play
Explanation:
The attenuation of a signal is -10 dB. What is the final signal power if it was originally
5 W?
Answer:
P₂ = 0.5 W
Explanation:
It is given that,
The attenuation of a signal is -10 dB.
We need to find the final signal power if it was originally 5 W.
Using attenuation for signal :
[tex]dB=10\text{log}_{10}(\dfrac{P_2}{P_1})[/tex]
Put dB = -10, P₁ = 5 W
Put all the values,
[tex]-10=10\text{log}_{10}(\dfrac{P_2}{5})\\\\-1=\text{log}_{10}(\dfrac{P_2}{5})\\\\0.1=\dfrac{P_2}{5}\\\\P_2=5\times 0.1\\\\P_2=0.5\ W[/tex]
So, the final signal power is 0.5 W.
The final signal power if it was originally 5W is; 0.5 W
Signal PowerWe are given;
Attenuation signal; dB = -10 dBOriginal signal power; P1 = 5 WFormula for attenuation signal is;
dB = 10log_10_ (P2/P1)
Where P2 is final signal power
Thus;
-10 = 10log_10_(P2/5)
-10/-10 = log_10_(P2/5)
-1 = log_10_(P2/5)
0.1 = P2/5
P2 = 0.1 × 5
P2 = 0.5 W
Read more about signal power at; https://brainly.com/question/13315405
8. T/F: At the bottom of a slide you are working on you can enter notes to indicate what yo
True
False
« BACK
LESSON 8.1 - INTRO TO PRESENTATIONS
Answer: True. Hope it helps!