Answer:
It includes Word, to create, polish, and share documents; Excel, to analyze and visualize data; PowerPoint, to create, collaborate, and effectively present ideas; OneNote, to organize ideas into a digital notebook; Outlook, to organize email, coordinate schedules, and stay up to date with contacts; Access, to create .Hope this helps you XD ✌️Write a Boolean expression that tests if the value stored in the variable num1 is equal to the value stored in the variable num2.
Answer:
num1 = int(input("Enter value: "))
num2 = int(input("Enter value: "))
if num1 == num2:
print("Equals.")
else:
print("Unequal.")
Explanation:
The Boolean expression that tests if the value stored in the variable num1 is equal to the value stored in the variable num2 can be found in explanation.
What is boolean expression?A logical statement that could be either true or false is referred to as a Boolean expression.
As long as both parts of the expression have the same basic data type, Boolean expressions can compare data of any type. Data can be tested to see if it is the same as, greater than, or less than other data.
A Boolean expression is a type of expression used in programming languages that produces a Boolean value when evaluated. A Boolean value can only be true or false.
The boolean expression for the given scenario can be:
num1 = int(input("Enter value: "))
num2 = int(input("Enter value: "))
if num1 == num2:
print("Equals.")
else:
print("Unequal.")
Thus, above mentioned is the program for the given code.
For more details regarding boolean expression, visit:
https://brainly.com/question/13265286
#SPJ5
Write a python program to calculate the sum of three numbers and as well require the user to input the numbers.
Answer:
numbers = []
for i in range(3):
numbers.append(eval(input("Enter number: ")))
print('Sum is:', sum(numbers))
Explanation:
You want to use a loop to prevent repeating your code.
Answer:
numbers = []
for i in range(3):
numbers.append(eval(input("Enter number: ")))
print('Sum is:', sum(numbers))
How to do or create a shepard tone using additive synthesis in Pure Data. Please help, desperate!!
Answer:
Creating a Shephard Tone
Step 1: Choose a steady with constant pitch and volume and edit it to a 12 second long clip.
Step 2: Duplicate your track so that a copy plays simultaneously with your first.
Step 3: Statically pitch the entire duplicated clip down one full octave (or -12 semitones)
a
2 A car is fitted with the latest GPS navigation system. This device is controlled
by an embedded system in the form of a microcontroller.
Describe the inputs needed by the embedded system and describe which
outputs you would expect it to produce.
b Since updates to the GPS device are required every six months, explain how
the device is updated without the need to take the car to the garage every six
months.
Answer:
It probaly connected to the internet in some way to resieve updates
Hope This Helps!!!
- Are you interested in modern technology? Why/why not?
Answer:
yes
Explanation:
cause it is very intrested
LIKE sitting in the house and turning on your car and alexa all the stuff
Compare and contrast the android and windows operating systems
An input statement is used to interact with the user of a program.
True False
Answer:
True.
Explanation:
An input statement asks a user a question, where the user has to input a value for the program to move forward. This means that yes, the program does interact with the user.
_____ are extremely _____ data structure’s, used all the time, and there are so many _____ that can handle them to do useful things.
A _____ can be thought of as an array of arrays
•versatile
•functions
•arrays
•matrix
Answer:
arrays are extremely versatile data structure’s, used all the time, and there are so many functions that can handle them to do useful things.
A matrix can be thought of as an array of arrays
Answer:
Arrays are extremely versatile data structure's, used all the time, and there are so many functions that can handle them to do useful things.
A matrix can be thought of as an array of arrays.
Happy Holidays
Explanation:
A hybrid data mart ________ data from a data warehouse as well as other data collection systems. It incorporates a top-down approach, end-user inputs, and enterprise-level integration. g
Answer:
Hybrid Data Marts
A hybrid data mart allows you to combine input from sources other than a data warehouse. This could be useful for many situations, especially when you need ad hoc integration, such as after a new group or product is added to the organization.
We can use a hybrid data mart to mix data from sources other than a data warehouse, and the further discussion can be defined as follows:
Hybrid Data Marts:It could be useful in a variety of scenarios, particularly when informal integration is required, like when a new group or product is added to the organization.
We can use a hybrid data mart to combine data from various sources other than a data warehouse. It's a structure or access pattern that retrieves client-specific data in data warehouse environments. This data mart is a subset of a data warehouse that is typically focused on a particular business line or functional area.Therefore, the final answer is "separates".
Find out more about the Hybrid Data Marts here:
brainly.com/question/13989635
VPN or Proxy is safer?
explain the use of mail merge feature.
pls help
I wake up the computer and remind it what to do
Answer:
what's the question or answer you want or is it a joke?
Explanation:
write down the application areas of an ICT?
Answer:
These are internet, telephone, mobile phone, TV, radio and office automation systems such as word-processing, fax, audio conferencing, video conferencing, computer conferencing, multimedia, etc, through the use of networks of satellite and fiber optics..
Explanation:
hope its help
Which type of transaction cannot be tagged at this time within Quickbooks online
The type of transaction cannot be tagged at this time within Quickbooks online is "Invoice Delayed Credit". The correct option is 4.
What is Invoice Delayed Credit?A delayed credit is a non-posting transaction that you can add to a client's invoice at a later time.
Reimbursing a customer's money involves posting a transaction known as a refund. The use of credit notes to reduce an outstanding customer amount follows from this. Delayed Credits are only permitted on invoices.
In QuickBooks Online, "Invoice Delayed Credit" transaction types cannot currently be tagged.
To aid with organization and tracking, QuickBooks Online users can assign labels or categories to bank deposits, purchase orders, journal entries, and other transactions.
The transaction type "Invoice Delayed Credit" cannot be labeled in QuickBooks Online, nevertheless. Instead, you can change the amount owed by applying a credit memo to an invoice.
Thus, the correct option is 4.
For more details regarding Invoice, visit:
https://brainly.com/question/28566570
#SPJ6
Which type of transaction cannot be tagged at this time within QuickBooks Online?
Bank deposit O Purchase order O Journal entry O Invoice Delayed creditwrite a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.
Answer:
Public and private keys form the basis for public key cryptography, also known as asymmetric cryptography. In public key cryptography, every public key corresponds to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can decode it using their matching private key.
Explanation:
Change up the wording.
Which type of research source lets a technical writer observe how a product works?
Answer:
Research to Support Your Technical Communication
As a buyer for a clothing retailer, for example, you might need to conduct research to help you determine whether a new line of products would be successful in your store. As a civil engineer, you might need to perform research to determine whether to replace your company's current surveying equipment with 3D-equipped stations. And as a pharmacist, you might need to research whether a prescribed medication might have a harmful interaction with another medication a patient is already taking
Explanation:
Hope it helps
Please mark as brainliest
what is the relationship between interrupt and buffer
Answer:
Operating systems have some code called an 'interrupt handler', which prioritises the interrupts and saves them in a queue. Buffers are used in computers as a temporary memory area, and they are essential in modern computers because hardware devices operate at much slower speeds than the processor.
If a client must wait too long for software that works, he might attempt to add requests for more and more features to be added to the program. This is known as ________.
Answer:
scope creep
Explanation:
How do I open a letter doc in my documents in my documents folder?
What is a shell programming? Write a shell program to get the following details from the student: NAME, AGE, USN and GENDER. Output all the details to the terminal and also display message whether the student is eligible to vote or not
Shell programs are computer programs designed to run on the Unix/Linux shell
The shell program where comments are used to explain each line is as follows:
#This gets input for NAME
read NAME
#This gets input for AGE
read AGE
#This gets input for USN
read USN
#This gets input for GENDER
read GENDER
#This prints the name
echo "Name: $NAME"
#This prints the age
echo "Age: AGE"
#This prints the usn
echo "USN: USN"
#This prints the gender
echo "GENDER: $GENDER"
#The following if condition determines, if the user is eligible to vote or not
if [ $USN -gt 50 ] then
echo "You are not eligible"
else
echo "You are eligible"
Read more about computer programs at:
https://brainly.com/question/13795586
what is operating system?
The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
I really need help with this question! Please help!
Answer:
(C) Emma goes to sleep late and does not set an alarm.
Explanation:
Decomposing a problem is setting a back drop inference as to (WHY?) something happens . So Emma woke up late , the only reasonable (WHY?) in this question would be (C)
Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that apply.
It should be noted that data can be secured when working in the following way:
Establishing a cyber security policy.Using two-factor authentication.Keeping passwords strong.Using secure internet connections.Your information is incomplete. Therefore, an overview relating to the topic will be given. It should be noted that as telecommuting becomes a standard practice, the challenge regarding data security increases.
Employers should educate their employees about data security. The workers should know that data security is a priority and that all the internet connections are secure.
Learn more about data security on:
https://brainly.com/question/10091405
Consider that a man is watching a picture of a Black Horse. He receives an external stimulus from input channel. Man gains some information about the picture from external environment and stores it in the memory. Once the initial information is gained, it is compared with the memory and then stores it. Finally upon perceiving and storing the information in memory Man says that the picture contains Black horse.
Based on the information-processing model, cognition is conceptualized as a series of processing stages where perceptual, cognitive, motor processors are organized in relation to one another.
You are required to identify and elaborate that which cognitive processes i.e. Perceptual system, Cognitive system, and motor system are involved when man interacts with the picture and also that which input channel is responsible in taking information to the brain.
The first Cognitive Process that was in play according to the excerpt is Perceptual System. It is also called Perceptual Representation and Intelligence.
This function of the brain is responsible for the sensory input which may be auditory (sounds), visual (pictures), and kinesthetic (emotions or feelings).
So the Perceptual Cognitive system (visual) relays the input (image of the horse to his brain, then it is stored.
This next stage is handled by the memory. Memory (a crucial process for learning) is a cognitive function that enables us to code, store, and recover information from the past.
Notice that the man perceived the information, and as the input interacts with the memory, he is able to say that the image or picture contains a black horse because there is a recall function.
Learn more about cognitive functions in the link below:
https://brainly.com/question/7272441
Write a program to repeatedly read integers from the standard input until it reads "-1" and exits. For each number before "-1," if it is positive and odd, do the following:
Answer:
#include <stdio.h>
int main() {
int p=0, n=0, z=0, inp=0;
printf("How do I write a C program to read numbers until -1 "
"is encountered and also count the number of positive, negative, "
"zeroes encountered by users using a while loop?\n\n\n");
printf("Enter an integer (-1 to quit): ");
scanf("%d",&inp);
while(inp != -1) {
if(inp > 0) p++;
else if(inp < 0) n++;
else z++;
printf("\nEnter next integer (-1 to quit): ");
scanf("%d",&inp);
}
n++; /* -1 is also a -ve number */
printf("You have entered ...\n");
printf("\t\tPositive numbers: %d\n",p);
printf("\t\tNegative numbers: %d\n",n);
printf("\t\t Zeroes: %d\n",z);
}
Explanation:
how to download film
Your job is to protect your company's information assets. What security objectives
should you address?
1) Assets, liabilities, and threats
2) Common vulnerabilities and exposures
3) Confidentiality, integrity and availability
4) Risks, threats and vulnerabilities
Answer:3
Explanation: The CIA Triangle is the basis of all Security related needs.
Additional rows and columns are inserted into a table using the
tab.
o Table Tools Design
o Insert Table
o Table Tools Layout
o Table Tools Insert
When using wildcards and the matching case option, which of the following would not be found by entering on in the Find dialog box?
1. den
2. down
3.Dayton
4. documentation
There are different types of Wildcard. The option that would not be found by entering on in the Find dialog box is called Dayton.
Wildcard is commonly known wild character or wildcard character. It is known as a symbol that is often used in place of or to stand for one or more characters.
Some wildcards are;
The asterisk (*)The question mark (?) Percent ( % )Wildcards are said to be universally used. Dayton cannot be found because it is not a wildcard but a name of a person.
Learn more about Wildcard from
https://brainly.com/question/7380462
BEBE
What options does the Table Tools Layout contextual tab contain? Select three options.
O modify text direction
change font
insert rows and columns
O add border and shading
O split table
Answer:
Modify text direction.change font, and insert row and coulumns
Explanation:
Answer:
What options does the Table Tools Layout contextual tab contain? Select three options.
modify text direction
insert rows and columns
split table
Explanation: