Answer:
Power point is a good software to use for slides
I think you have been doing a great job but you haven’t been signing many people up for our new service feature I want you to set a goal of signing up 25% of your new customers for our new service feature if I get 96 new customers that means I have to get how many of them to sign up
Answer:
24 customers
Explanation:
Given
[tex]Customers = 96[/tex]
[tex]p = 25\%[/tex] --- proportion to sign up
Required
The number of customers to sign up
This is calculated as:
[tex]n = p * Customers[/tex]
So, we have:
[tex]n = 25\% * 96[/tex]
[tex]n = 24[/tex]
There are two circular grounds Ground-A and Ground-B. Ground-A is having diameter of 15 meters and Ground-B is having diameter of 20 meters. Mohsin is running in Ground-A and Neetesh is running in Ground-B. Write a program in C++ that asks the user to input the time taken, in seconds, to complete one compete round of the ground by both the friends and displays who is running faster.
Answer:
A
Explanation:
b/c the round of 'A' is less than ruond of'B'
Draw AND, OR, XOR and XNOR gates with truth table and logic gates.
.
Answer:
see picture. let me know if you have questions.
what is programming language?
Answer:
A programming language is a formal language comprising a set of strings that produce various kinds of machine code output. Programming languages are one kind of computer language, and are used in computer programming to implement algorithms. Most programming languages consist of instructions for computers
Answer:
The artificial languages that are used to develop computer programs are called programming language . hope this help!
Which one of the following does not contain information?
1) A weather report
2) A time table
3) A price list displayed in a supermarket
4) An unlabeled chart
Answer:
4
Explanation:
4 is the ans as weather;timtable and price list display information
Consider an Erlang loss system. The average processing time is 3 minutes. The average inter-arrival time is 3 minutes. The number of servers is 3. What is r (sometimes referred to as the offered load)
Answer:
r = 1
Explanation:
Average processing time ( p ) = 3 minutes
Average inter-arrival time ( a ) = 3 minutes
number of servers ( m ) = 3
Determine the value of r
r ( offered load ) = p/a
= 3 / 3 = 1
∴ value of r ( offered load ) = 1
Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message.
Answer:
Sample output:
Enter the number: 25
The square root of 25 is: 5
Enter the number: -25
The square root of 25 is: Nan
Explanation:
Here the code is given as follows,
Which statement is trueBlockchain is often associated with Bitcoin and the financial services industry. However, it is applicable to almost every industry. The term Multi-party Systems better describes how the blockchain system is used.
What is a benefit of a Multi-party System? about blockchain?
Blockchain is sometimes refers to original Bitcoin blockchain.
Answer :
Blockchain is defined as the database system which maintains and also records the data in various ways which allows the multiple organizations.
Blockchain and multiparty systems specializes in the supply chain or digital identity and also financial services.
A multi-party system prevents leadership of the single party from the controlling a single legislative chamber without any challenge.
Learn more :
https://brainly.in/question/43683479
1. Open the start file EX2019-ChallengeYourself-9-3. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
2. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the top of the workbook so you can modify the workbook.
3. Use Consolidate to create a summary of real estate sales for all property types. Place the consolidated data on the Summary worksheet in cells B3: C15. Use the Average function to consolidate the data from cells B2: C14 in the Condo, Townhouse, and Single Family worksheets. Include links to the source data.
4. Import individual sales data from the tab-delimited text file Select Sales Data 2019-2020. Import the data as a table in cell A1 of the Select Sales worksheet.
5. Remove the data connection when the import is complete.
6. In the Select Sales worksheet, add data validation to restrict values in the House Type columns (cells B2: B139) to the values in the cell range named PropertyTypes. Include a drop-down list of values in the cells to assist in data correction.
7. Add the following input message to cells B2:B139: Select a property type from the list.
8. Add the following error alert to cells B2:B139: Not a valid property type.
9. Apply data validation circles to any values that violate the data validation rules you just created.
10. Add a comment to cell B1 in the Select Sales worksheet that reads: This needs to be fixed.
11. Add a hyperlink from cell B1 in the Select Sales worksheet to link to the named range (defined name) PropertyTypes. Test the link.
12. Use Flash Fill to add a new column of data to the Select Sales worksheet to display the number of bedrooms/the number of bathrooms.
a. In the Select Sales worksheet, cell F1, type the heading: BR/BA
b. Complete the column of data using this pattern in cell F2: 1 BR/1 BA
You will need to enter at least two samples in order for Flash Fill to suggest the correct autofill data. Check your work carefully.
Sales Summary 2019-2020
Number of Sales Average Selling Price
1
2
3 One BR, One BA
4 One BR, Two BA +
5 Two BR, One BA
6 Two BR, Two BA
7 Two BR, Two BA +
8 Three BR, One BA
9 Three BR, Two BA
10 Three BR, Three BA +
11 Four BR, One BA
12 Four BR, Two BA
13 Four BR, Three BA+
14 Five BR-. One BA
15 Five BR+ Two BA+
16
17
18
19
20
21
22
23
24
Answer:
Omg what is this
soooo long questionn
i am fainted
what rubbish you written how long the question is of which subject
what's your name
How to create a network of relevant prospects?
Answer:
By connecting with industry-specific and relevant prospects.
Now with 760 million+ people, how can you find the most relevant people to connect with? The answer is: With the help of LinkedIn automation tools.
There are a number of best LinkedIn automation tools that come with advanced search filters to help you refine your target audience. These LinkedIn automation tools have special operators that help users find and reach even the most difficult leads.
However, there is a drawback. These LinkedIn automation tools can cause spam if you send thousands of connection requests or messages in a short time.
Moreover, if you send templated connect notes or messages, you’re likely to get a very low or almost zero acceptance and response rate.
Please draw the dynamic array stack structure (you must mention the size and capacity at each step) after the following lines of code are executed. You should assume that the initial capacity is 2 and a resize doubles the capacity.
values = Stack()
for i in range( 16 ) :
if i % 3 == 0 :
values.push( i )
else if i % 4 == 0 :
values.pop()
Answer:
Explanation:
dxfcgvhb
how did hitles rules in nazi germany exemplify totiltarian rule?
Answer:
hope this helps if not srry
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also be system objects such as shared memory or a linked list data structure. This principle is based in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The only way to access a resource is through the provided interface. Which security principle are we referring to
Answer:
The security principle being referred to here is:
Resource Encapsulation.
Explanation:
Resource Encapsulation is one of the cybersecurity first principles. It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity. Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.
a. Download the attached �Greetings.java� file.
b. Implement the �getGreetings� method, so that the code prompts the user to enter the first name, the last name, and year of birth, then it returns a greetings message in proper format (see the example below). The �main� method will then print it out. Here is an example dialogue with the user:
Please enter your first name: tom
Please enter your last name: cruise
Please enter your year of birth: 1962
Greetings, T. Cruise! You are about 50 years old.
Note that the greetings message need to be in the exact format as shown above (for example, use the initial of the first name and the first letter of the last name with capitalization).
c. Submit the final �Greetings.java� file (DO NOT change the file name) online.
Answer:
Code:
import java.util.*;
public class Greetings
{
public static void main(String[] args)
{
Scanner s = new Scanner(System.in);
System.out.println(getGreetings(s));
}
private static String getGreetings(Scanner console)
{
System.out.print("Please enter your first name: ");
String firstName=console.next();
char firstChar=firstName.toUpperCase().charAt(0);
System.out.print("Please enter your last name: ");
String lastName=console.next();
lastName=lastName.toUpperCase().charAt(0)+lastName.substring(1, lastName.length());
System.out.print("Please enter your year of birth: ");
int year=console.nextInt();
int age=getCurrentYear()-year;
return "Greetings, "+firstChar+". "+lastName+"! You are about "+age+" years old.";
}
private static int getCurrentYear()
{
return Calendar.getInstance().get(Calendar.YEAR);
}
}
Output:-
Give three reasons to use a hard drive as mass storage.
Answer:
Every computer – whether it's a tower desktop or laptop – is equipped with an internal hard drive. The hard drive is where all your permanent computer data is stored. Whenever you save a file, photo, or software to your computer, it's stored in your hard drive
Explanation:
Backups and Archives. ...
Media Libraries. ...
Large Capacity Storage. ...
NAS Drives and Security. ...
RAID Arrays. ...
Other Uses.
Write a program that produces the following output:CCCCCCCCC CC CC CC CC CCCCCCCCC Note: The letter C in the output must be uppercas
Answer:
CCCCCCCCC ++ ++ CC ++ ++ CC ++++++++++++++ +++++++++++++++ CC ++++++++++++++ +++++++++++++++ CC ++ ++ CCCCCCCCC ++ ++
Note: The letter C in the output must be uppercase.
#include <iostream>
using namespace std;
int main()
{
cout<<"CCCCCCCCC ++ ++ CC ++ ++ CC ++++++++++++++ +++++++++++++++ CC +++++++++++++\n";
cout<<"+++++++++++++++ CC ++ ++ CCCCCCCCC ++ ++";
return 0;
}
what are the services offered by web-based email?
Answer:
Web based email is a service that allows to access and use electronic mail via web browser.
It allows clients to login into the email software running on a web server to compose, send and receive, delete mails basically.
Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT changed so rapidly, your article should be no older than 2007 (i.e. Less than 5 years old). Summarize the article using at least 500 words.
Hi, I provided some explanation of key terms.
Explanation:
Wireless hacking: basically the term refers to any unethical activity carried over a radio wave-connected network (eg Internet or Wifi connection) that would provide unauthorized access to information.
Hardware hacking: On the other hand, hardware hacking involves resetting physical hardware with the objective of using it in a way not originally intended by the manufacturer.
Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.
Answer:
c
Explanation:
111+ 11- 1
1111+1111
1101 +1101
1010-11
Answer: 121, 2222, 2202, 999
Explanation:
Answer:
a. 121
b. 2222
c. 2202
c. 999
Write programming code in C++ for school-based grading system. The program should accept the Subject and the number of students from a user and store their details in an array of type Student (class). The student class should have: • studName, indexNo, remarks as variables of type string, marks as integer, and grade as char. • A void function called getData which is used to get students’ details (index number, name, and marks). • A void function called calculate which will work on the marks entered for a student and give the corresponding grade and remarks as give below. Marks Grade Remarks 70 – 100 A Excellent 60 – 69 B Very Good 50 – 59 C Pass 0 – 49 F Fail • Should be able to display the results for all students (index number, name, marks, grade, remarks). 2. Draw a flowchart for the calculate function above. 3. Create a folder with name format ICTJ254_indexnumber (eg
Answer:
Explanation:
// C++ Program to Find Grade of Student
// -------codescracker.com-------
#include<iostream>
using namespace std;
int main()
{
int i;
float mark, sum=0, avg;
cout<<"Enter Marks obtained in 5 Subjects: ";
for(i=0; i<5; i++)
{
cin>>mark;
sum = sum+mark;
}
avg = sum/5;
cout<<"\nGrade = ";
if(avg>=91 && avg<=100)
cout<<"A1";
else if(avg>=81 && avg<91)
cout<<"A2";
else if(avg>=71 && avg<81)
cout<<"B1";
else if(avg>=61 && avg<71)
cout<<"B2";
else if(avg>=51 && avg<61)
cout<<"C1";
else if(avg>=41 && avg<51)
cout<<"C2";
else if(avg>=33 && avg<41)
cout<<"D";
else if(avg>=21 && avg<33)
cout<<"E1";
else if(avg>=0 && avg<21)
cout<<"E2";
else
cout<<"Invalid!";
cout<<endl;
return 0;
}
Write a C program that will load entries from a file containing details of books and prints them.
Program Requirements:
a. Load file containing details of books
b. Print out all the books Required approach:
1. Design a struct/class that can hold the details of an individual book.
2. Dynamically allocate an array of these objects. The size should be the number of book entries from the input file given by the user.
3. Load all of the book entries into this array of objects before printing
Answer:
........
Explanation:
Define a class named Payment that contains an instance variable of type double that stores the amount of the payment and appropriate get and set methods. Also, create a method named paymentDetails that outputs an English sentence to describe the payment amount. Next, define a class named CashPayment that is derived from Payment. This class should redefine the paymentDetails method to indicate that the payment is in cash. Include appropriate constructor(s). Define a class named CreditCardPayment that is derived from Payment. This class should contain instance variables for the name on the card, expiration date, and credit card number. Include appropriate constructor(s). Finally, redefine the paymentDetails method to include all credit card information. Define a class named PaymentTest class that contains the main() method that creates two CashPayment and two CreditCardPayment objects with different values and calls paymentDetails for each. (5 pts)
Answer:
The code is given below:
class Payment
{
private double amount;
public Payment( )
{
amount = 0;
}
public Payment(double amount)
{
this.amount = amount;
}
public void setPayment(double amount)
{
this.amount = amount;
}
public double getPayment( )
{
return amount;
}
public void paymentDetails( )
{
System.out.println("The payment amount is " + amount);
}
}
class CashPayment extends Payment
{
public CashPayment( )
{
super( );
}
public CashPayment(double amt)
{
super(amt);
}
public void paymentDetails( )
{
System.out.println("The cash payment amount is "+ getPayment( ));
}
}
class CreditCardPayment extends Payment
{
private String name;
private String expiration;
private String creditcard;
public CreditCardPayment()
{
super( );
name = " ";
expiration = " ";
creditcard = "";
}
public CreditCardPayment(double amt, String name, String expiration, String creditcard)
{
super(amt);
this.name = name;
this.expiration = expiration;
this.creditcard = creditcard;
}
public void paymentDetails( )
{
System.out.println("The credit card payment amount is " + getPayment( ));
System.out.println("The name on the card is: " + name);
System.out.println("The expiration date is: " + expiration);
System.out.println("The credit card number is: " + creditcard);
}
}
class Question1Payment
{
public static void main(String[ ] args)
{
CashPayment cash1 = new CashPayment(50.5), cash2 = new CashPayment(20.45);
CreditCardPayment credit1 = new CreditCardPayment(10.5, "Fred", "10/5/2010",
"123456789");
CreditCardPayment credit2 = new CreditCardPayment(100, "Barney", "11/15/2009",
"987654321");
System.out.println("Cash 1 details:");
cash1.paymentDetails( );
System.out.println( );
System.out.println("Cash 2 details:");
cash2.paymentDetails( );
System.out.println( );
System.out.println("Credit 1 details:");
credit1.paymentDetails( );
System.out.println( );
System.out.println("Credit 2 details:");
credit2.paymentDetails( );
System.out.println( );
}
}
Output:
What is the advantages and disadvantages of hardware devices and software devices ?
Urgent need for assignment due today 12 o’clock!
Answer:
Advantages of hardware:
Physical existence
Multitasking
Speedy
Disadvantages:
Costly as different equipment cost differently
Time consuming
requires space
Privacy issues
Explanation:
Advantages of Software:
Less costly
Improved privacy controls
Requires no space
Disadvantages:
Does not have physical existence
hacking and cyber attacks may steal important information
Regular updates required
different types of computer and state the major difference between them
Answer:
computers system may be classified according to their size.
four types of computers are;
microcomputers / personal computers- micro computers are also called personal computers which is PC this computer came in different shapes size and colors. a personal computers are designed to be used by one person at a time.some examples of the computer are;
laptopdesktopa palmtopa work station2. mini computers- mini computers are sometimes called mid-range computers which are more powerful than microcomputers and can support a number of users performing different tasks, they were originally developed to perform specific tasks such as engineering calculations.
3. Mainframe computers- Mainframe computers are larger systems that can handle numberous users, store large amounts of data and process transaction at a high rate. these computers are expensive and powerful.
4. super computers- super computers are the most largest, fastest and most powerful computer. this systems are able to process hundreds of million of instructions per second they are used for job requiring and long complex calculation.
What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then compile it b. Create a batch file that copies the program to the user’s computer and then run it c. Copy the executable file to the user’s computer d. Create an installer program and then run it on the user’s computer
Answer:
c. Copy the executable file to the user’s computer
Explanation:
When you run a c++ program, an executable file (.exe) is created in the same directory with the source file.
To deploy this program on another system, you need to transfer the executable file from the original system where the program was executed to the new system.
The program will work fine without errors.
However, do not mistake the executable file for the source file. The source file ends in .cpp.
Explain the purpose of the open() and close() operations.
Answer:
The open() operation notifies the system that the named file is about to become active. The close() operation notifies the system that the named file is no longer in active use by the user who issued the close operation.
Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the DigiFirm Investigation Company. Chris, your team leader, explains that your biggest client, Major Corporation, is evaluating how they back up their data. Chris needs you to write a report that compares traditional backup methods to those provided by a cloud service provider, including the security of cloud services versus traditional forms of on-site and off-site backup. For this assignment: 1. Research both traditional and cloud data backup methods. 2. Write a paper that compares the two. Make sure that you include the security of cloud services versus traditional forms of on-site and off-site backup. Required Resources Course textbook Internet Submission Requirements Format: Microsoft Word Font: Arial, size 12, double-space Citation Style: Follow your school's preferred style guide Length: 1-2 pages If-Assessment Checklist I researched both traditional and cloud data backup methods. I wrote a report that compares the two. I included the security of cloud services versus traditional forms of on-site and off-site backup. I organized the information appropriately and clearly. . I created a professional, well-developed report with proper documentation, grammar, spelling, and nunctuation
Answer:
Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules.
Security Risk Scoring
Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.
Operational Security
Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.
Database Activity Monitoring
Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.
Only by covering both of these areas can organizations have defense in depth and effectively control risk.
Write a program that creates an an array large enough to hold 200 test scores between 55 and 99. Use a Random Number to populate the array.Then do the following:1) Sort scores in ascending order.2) List your scores in rows of ten(10) values.3) Calculate the Mean for the distribution.4) Calculate the Variance for the distribution.5) Calculate the Median for the distribution.
Answer:
Explanation:
The following code is written in Python. It uses the numpy import to calculate all of the necessary values as requested in the question and the random import to generate random test scores. Once the array is populated using a for loop with random integers, the array is sorted and the Mean, Variance, and Median are calculated. Finally The sorted array is printed along with all the calculations. The program has been tested and the output can be seen below.
from random import randint
import numpy as np
test_scores = []
for x in range(200):
test_scores.append(randint(55, 99))
sorted_test_scores = sorted(test_scores)
count = 0
print("Scores in Rows of 10: ", end="\n")
for score in sorted_test_scores:
if count < 10:
print(str(score), end= " ")
count += 1
else:
print('\n' + str(score), end= " ")
count = 1
mean = np.mean(sorted_test_scores)
variance = np.var(sorted_test_scores, dtype = np.float64)
median = np.median(sorted_test_scores)
print("\n")
print("Mean: " + str(mean), end="\n")
print("Variance: " + str(variance), end="\n")
print("Median: " + str(median), end="\n")
A technology company starts a program dedicated to training high school students in the use of the latest computer programming languages. How can the company justify creating and funding such a program since it is not about its primary products
Answer:
The answer is "Spending the money can improve the company's reputation and attract new personnel with the necessary abilities".
Explanation:
In many cases, companies engage in activities tangential to their principal service or brand. As more than just a result, the purpose is to boost the company's reputation and at the same time raising societal awareness.
To strengthen its very own business reputation and to create future employees by teaching necessary skills, a technology organization may be established throughout the given case.
Every one of these initiatives helps to boost the brand's reputation & image, as well as the customer's confidence.