The style or appearance of text is called

Answers

Answer 1
font or typeface, defines the appearance and shape of the letters, numbers, and special characters. font size. specifies the size of the characters and is determined by a measurement system called points. format.
Answer 2

Answer: Font

Explanation:


Related Questions

Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say "You have a dog with a total of 1 pet(s)" if they enter dog, and so on.
Sample Run:
User enters:
lemur parrot cat rock
Outputs:
You have a lemur with a total of 1 pet(s)
You have a parrot with a total of 2 pet(s)
You have a cat with a total of 3 pet(s)

Answers

Answer:

Check the explanation

Explanation:

The Python program that frequently asks the user what pets the user has,

until the user enters "rock", in which case the loop ends can be analysed in the written codes below.

'''

# count of pets

count = 0

# read the user input

pet = input()

# loop that continues till the user enters rock

# strip is used to remove the whitespace

while pet.strip() != 'rock':

  # increment the count of pets

  count += 1

  # output the pet name and number of pets read till now

  print('You have a %s with a total of %d pet(s)' %(pet.strip(),count))

  pet = input() # input the next pet

#end of program

Following are the python program to use the loop to count the number of pets until the user enters the "rock":

Program:

c = 0#defining a variable c that initilzes with 0

p = input()#defining a variable p that input value

while p != 'rock':#defining a loop that check p value not equal to rock

  c += 1#using c variable for counts total number of pets

  print('You have a %s with a total of %d pet(s)' %(p,c))#print total number of pet

  p = input() #input value

Output:

Please find the attached file.

Program Explanation:

Defining a variable "c" that is initialized with 0, which is used to count input values.In the next line, a "p" variable is declared as the input value from the user end.A while loop is declared to check that the p-value is not equal to 'rock'.Inside this loop, the "c" variable is used for counting the total number of pets, and a print method is used to print the total number of pets.Another input method is used that works until the user inputs the value that is "rock".

Find out more about the loop here:

brainly.com/question/17067964

Which three statements about RSTP edge ports are true? (Choose three.) Group of answer choices If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status. Edge ports can have another switch connected to them as long as the link is operating in full duplex. Edge ports immediately transition to learning mode and then forwarding mode when enabled. Edge ports function similarly to UplinkFast ports. Edge ports should never connect to another switch.

Answers

Answer:

Edge ports should never connect to another switch. If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status.

Create a simple program that calls a function call gradeCalculated, in the main area the user is asked to enter their grade from 0-100. (Python)

Answers

Answer:

def gradeCalculated(score):

   if score < 60:

       letter = 'F'

   elif score < 70:

       letter = 'D'

   elif score < 80:

       letter = 'C'

   elif score < 90:

       letter = 'B'

   else:

       letter = 'A'

   return letter

def main():

   grade = int(input("enter your grade from 0-100: "))

   print("Letter grade for ",grade,"is:",gradeCalculated(grade))

   if(grade>80):

       print("You are doing good! keep it up!!")

   else:

       print("You have to get work hard")

main()

Explanation:

See attached image for output

what term defines inventiveness uncertainty and futuristic ideas typically deals with science and technology

Answers

Answer:

Innovation.

Explanation:

Innovation can be considered the ideal term, because an innovative idea arises from the set of a new technique, method or invention that aims to improve an existing method, standard, or product.

However, added to an innovative idea is the risk, since innovation breaks an already established standard, so it is through science and technology that an invention will gain greater foundation and recognition, which increases its credibility and acceptance.

Create a single list that contains the following collection of data in the order provided:
[1121, "Jackie Grainger", 22.22,

1122, "Jignesh Thrakkar", 25.25,

1127, "Dion Green", 28.75, False,

24.32, 1132, "Jacob Gerber",

"Sarah Sanderson", 23.45, 1137, True,

"Brandon Heck", 1138, 25.84, True,

1152, "David Toma", 22.65,

23.75, 1157, "Charles King", False,

"Jackie Grainger", 1121, 22.22, False,

22.65, 1152, "David Toma"]


The data above represents employee information exported from an Excel spreadsheet. Whomever typed the data in originally didn't give much care to how the information was formatted, unfortunately. Each line of data has in it employee information (the whole number), the name of the employee (the string), and the employee's hourly wage (the decimal number). Some rows have extra information in them from a column in the spreadsheet that no one can remember what its purpose was.

Note that the presence of a couple of new data types in the above - "float" values (the numbers with the decimals in them) and "bool" [short for boolean] values (True and False).
Assume that the above information is a small sample of the company's data. Programmatically sort the information into three different lists: one for employee numbers, one for employee names, and one for employee salary information.
No duplicate data should make its way into the new lists.
For each value in the list containing hourly wage information, multiply the current value by 1.3 (since benefits are about 30% of a person's salary) and store each value in a list called total_hourly_rate. Programmatically determine the maximum value in the list and if it's over over 37.30, throw a warning message that someone's salary may be a budget concern.
Determine if anyone's total hourly rate is between 28.15 and 30.65. If they are, add the hourly rate a new list called underpaid_salaries.
For each value in the list that contains unmodified salary information, calculate a raise in dollars according to the following rules:

If the hourly rate is between 22 and 24 dollars per hour, apply a 5% raise to the current rate. If the hourly rate is between 24 and 26 dollars per hour, apply a 4% raise to the current rate. If the hourly rate is between 26 and 28 dollars per hour, apply a 3% raise to the current rate. All other salary ranges should get a standard 2% raise to the current rate.

Add each new value you calculate to a new list called company_raises.
Design your own complex condition with no fewer than four different truth tests in it (all conditions must be on one line, in other words). Above your condition, write out in comments the exact behavior you are implementing with Python.

Answers

Answer:

A code was created to single list that contains the following collection of data in the order provided

Explanation:

Solution

#list that stores employee numbers

employeee_numbers=[1121,1122,1127,1132,1137,1138,1152,1157]

#list that stores employee names

employee_name=["Jackie Grainger","Jignesh Thrakkar","Dion Green","Jacob Gerber","Sarah Sanderson","Brandon Heck","David Toma","Charles King"]

#list that stores wages per hour employee

hourly_rate=[22.22,25.25,28.75,24.32,23.45,25.84,22.65,23.75]

#list that stores salary employee

company_raises=[]

max_value=0

#list used to store total_hourly_rate

total_hourly_rate=[]

underpaid_salaries=[]

#loop used to musltiply values in hourly_wages with 1.3

#and store in new list called total_hourly_rate

#len() is used to get length of list

for i in range(0,len(hourly_rate)):

#append value to the list total_hourly_rate

total_hourly_rate.append(hourly_rate[i]*1.3)

for i in range(0,len(total_hourly_rate)):

#finds the maximum value

if(total_hourly_rate[i]>max_value):

max_value=total_hourly_rate[i] #stores the maximum value

if(max_value>37.30):

print("\nSomeone's salary may be a budget concern.\n")

for i in range(0,len(total_hourly_rate)):

#check anyone's total_hourly_rate is between 28.15 and 30.65

if(total_hourly_rate[i]>=28.15 and total_hourly_rate[i]<=28.15):

underpaid_salaries.append(total_hourly_rate[i])

for i in range(0,len(hourly_rate)):

#check anyone's hourly_rate is between 22 and 24

if(hourly_rate[i]>22 and hourly_rate[i]<24):

#adding 5%

hourly_rate[i]+=((hourly_rate[i]/100)*5)

elif(hourly_rate[i]>24 and hourly_rate[i]<26):

#adding 4%

hourly_rate[i]+=((hourly_rate[i]/100)*4)

elif(hourly_rate[i]>26 and hourly_rate[i]<28):

#adding 3%

hourly_rate[i]+=((hourly_rate[i]/100)*3)

else:

#adding 2% for all other salaries

hourly_rate[i]+=((hourly_rate[i]/100)*2)

#adding all raised value to company_raises

company_raises.extend(hourly_rate)

#The comparison in single line

for i in range(0,len(hourly_rate)):

 For this exercise i used ternary

operator hourly_rate[i]= (hourly_rate[i]+((hourly_rate[i]/100)*5)) if (hourly_rate[i]>22 and hourly_rate[i]<24) else (hourly_rate[i]+((hourly_rate[i]/100)*4)) if (hourly_rate[i]>24 and hourly_rate[i]<26) else hourly_rate[i]+((hourly_rate[i]/100)*2)

Use computer software packages, such as Minitab or Excel, to solve this problem. The owner of Showtime Movie Theaters, Inc., used multiple regression analysis to predict gross revenue () as a function of television advertising () and newspaper advertising (). Values of , , and are expressed in thousands of dollars. Weekly Gross Revenue ($1000vs) Television Advertising ($1000in) Newspaper Advertising ($1000s) 96 5 1.5 90 2 2 95 4 1.5 92 2.5 2.5 95 3 3.3 94 3.5 2.3 94 2.5 4.2 94 3 2.5 The estimated regression equation was a. What is the estimated gross revenue for a week where thousand is spent on television and thousand is spent on newspaper advertising (to 3 decimals)

Answers

Answer:

a. Gross revenue

b. 95% P.I ( 91.774, 95.400)

Explanation:

Please check the file attached below to see the solution to given question using minitab

Given the following Java code:
public static boolean f(int [] arr) {
for (int i = 0; i < arr.length - 1; i++) {
for (int j = i + 1; j < arr.length; j++) {
if (arr[i] < arr[j]) // *HERE*
return false;}
return true;}
(i) Find the number of times the comparison marked by *HERE* will be evaluated for each input:
{1, 2}
{10, 20, 30}
{30, 20, 10}
{-4, 7, 1}
(ii) For an array of size ????, what is the big-oh runtime of this code in the worst case?

Answers

Answer:

See explaination

Explanation:

{1, 2}

Runs only once for 1 < 2

{10, 20, 30}

Runs 1 for 10 < 20

Runs 1 for 10 < 30

Runs 1 for 20 < 30

Total 3 times

{30, 20, 10}

Runs 1 for 30 < 20

Runs 1 for 30 < 10

Runs 1 for 20 < 10

Total 3 times

{-4, 7, 1}

Runs 1 for -4 < 7

Runs 1 for -4 < 1

Runs 1 for -7 < 1

​​​​​​​Total 3 times

Generalizing it will run for n*(n-1)/2 so for 2 element it will run for 2*1/2 = 1

For 3 element it will run for 3*2/2 = 3 times

(ii) (3 points) For an array of size , what is the big-oh runtime of this code in the worst case?

Time complexity in Worst case is O(n^2). Reason being it uses two for loop where first loop runs for n time and the second loop runs for n*n time in worst case hence its O(n^2)

Ronaldo wants to determine if employees would prefer having bagels or
donuts at morning meetings. Which method would be best to collect this
information?

Answers

Answer:

surveys and questionnaires

Answer:

Survey

Explanation:

What happens in the process represented by the flowchart ?

A) The person drinks water if the answer to “Thirsty?” is no.
B) The person always drinks water.
C) The person drinks water if the answer to “Thirsty?” is yes.
D) The person never drinks water.

CORRECT ANSWER: C!!!

Answers

Answer:

the person drinks water if the answer to “thirsty?” is yes

Answer:

C

Explanation:

For this problem, use a formula from this chapter, but first state the formula. Frames arrive randomly at a 100-Mbps channel for transmission. If the channel is busy when a frame arrives, it waits its turn in a queue. Frame length is exponentially distributed with a mean of 10,000 bits/frame. For each of the following frame arrival rates, give the delay experienced by the average frame, including both queueing time and transmission time.
a. 90 frames/ sec.
b. 900 frames/ sec.
c. 9000 frames/ sec

Answers

Answer:

(a). 0.1 × 10^-3 = 0.1 msec.

(b). 0.11 × 10^-3 = 0.11 msec.

(c). 1 × 10^-3. = 1 msec.

Explanation:

So, in order to solve this problem or question there is the need to use the Markov queuing formula which is represented mathematically as below;

Mean time delay, t = /(mean frame length,L) × channel capacity, C - frame arrival rate, F. ---------------------------------(1).

(a). Using equation (1) above, the delay experience by 90 frames/sec.

=> 1/(10^-4× 10^8 - 90). = 0.1 × 10^-3= 0.1 msec.

(b). Using equation (1) above, the delay experience by 900 frames/sec.

=> 1/(10^-4× 10^8 - 900). = 0.11 × 10^-3= 0.11 msec.

(c). Using equation (1) above, the delay experience by 90 frames/sec.

=> 1/(10^-4× 10^8 - 9000). = 1 × 10^-3= 1 msec.

Hence, the operating queuing system is; 900/10^-4 × 10^8 = 0.9.

Consider the following relational schema, where the primary keys are Bold,
Students(sid, sname, address, dept_id)
Courses(cid, cname, dept_id)
Departments(dept_id, dname, college)
Grades(sid, cid, year, semester, grade)
Write the following queries in SQL. Only use the tables that are absolutely needed for the corresponding query.
1. Find the sids and snames of students who took "Database" course (i.e., cname = ‘Database’) in Fall 2019.
2. Find the average grade of all the students who took "CS327" (i.e., cid=‘CS327’) in Fall 2019. You can assume grade is a numerical attribute.
3. Find the number of distinct courses offered by each department in Fall 2019.
4. Find the sids of students who have taken at least 10 different courses offered by "Computer Science" department (i.e., dname = ‘Computer Science’).

Answers

Answer:

The queries for each question are explained.

1. Find the sids and snames of students who took "Database" course (i.e., cname = ‘Database’) in Fall 2019.

 The columns sid and sname are taken from students table.

The course name belong to the courses table.

The semester and year belong to the grades table.

To get the final query, all these tables need to be joined in the FROM clause using JOIN ON keywords.

select s.sid, sname

from students s join grades g on g.sid = s.sid

join courses c on g.cid = c.cid

where cname like 'database%'

and semester like 'Fall'

and year=2019

2. Find the average grade of all the students who took "CS327" (i.e., cid=‘CS327’) in Fall 2019. You can assume grade is a numerical attribute.

The grade column is taken from grades table.

The course id belongs to the grades table.

The semester and year also belong to the grades table.

The final query is formed using the grades table only.

 select avg(grade)

from grades

where cid like 'CS327'

and semester like 'Fall'

and year=2019

 3. Find the number of distinct courses offered by each department in Fall 2019.

 The department id belongs to the courses table.

The course id belongs to the grades table.

The semester and year also belong to the grades table.

To get the final query, the courses and the grades tables are joined in the FROM clause using JOIN ON keywords.

select dept_id, count(distinct g.cid)

from courses c join grades g on c.cid = g.cid

where semester like 'Fall'

and year=2019

group by dept_id

can a +2 management studnet from nepal study computer engineer in UK?​

Answers

Answer: The UK government offers a global scholarship programme called “Chevening”. It is open to all international students who meet the Chevening eligibility criteria, which states you must have applied for at least three degree courses in the UK, usually one-year Master's courses

Explanation: So yes that should be fine

Consider the code fragment below. Show the values stored at each location in memory and as they change while the code executes. Use the memory addresses given in the comments following each statement. Assume all integer and pointer sizes are four bytes and each box in the memory representation is 4 bytes.

int x; // x is at memory address 5000
int *y; // *y is at memory address 5004
int *z; // *z is at memory address 5008
int *a; // a is at memory address 5012
z=&x;
y=malloc(5 * sizeof(int)); // malloc returns
// address 6000
X = 10;
y[1] = 15;
y[2] = *z; x=*(y + 1);
a = malloc(sizeof(int)); // malloc returns // address 6020
*a = *y; a = z; *z= 25; *a = 12; y[3] = *z; y[4] = x; y[0] = x;

Answers

Answer:

see explaination

Explanation:

Final value :-

Memory => value = reference in code

5000 => 12 = x

5004 => 6000 = *y

5008 => 5000 = *z

5012 => 5000 = *a

6000 => 12 = y[0]

6004 => 15 = y[1]

6008 => 10 = y[2]

6012 => 12 = y[3]

6016 => 12 = y[4]

6020 =>

as a sales person which size hard disc would you recommend a customer who needs to use Microsoft PowerPoint application?

Answers

Answer:

Not very big - maybe 64 GB or 128 GB

Explanation:

PPT doesn't take up much space

Write a program that will ask for the user to input a filename of a text file that contains an unknown number of integers. And also an output filename to display results. You will read all of the integers from the input file, and store them in an array. (You may need to read all the values in the file once just to get the total count) Using this array you will find the max number, min number, average value, and standard deviation. These results will be reported to both the screen and placed into the output file that the user choose. Output to screen and file could look like this: Read from file: 12 values Maximum value

Answers

Answer: Provided in the explanation section

Explanation:

Code provided below in a well arranged format

inputNos.txt

70

95

62

88

90

85

75

79

50

80

82

88

81

93

75

78

62

55

89

94

73

82

___________________

StandardDev.java

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

public class StandardDev {

public static void main(String[] args) {

//Declaring variables

String filename;

int count = 0, i = 0;

Scanner sc1 = null;

int min, max;

double mean, stdDev;

int nos[] = null;

/*

* Creating an Scanner class object which is used to get the inputs

* entered by the user

*/

Scanner sc = new Scanner(System.in);

//Getting the input entered by the user

System.out.print("Enter the name of the filename :");

filename = sc.next();

try {

//Opening the file

sc1 = new Scanner(new File(filename));

//counting no of numbers in the file

while (sc1.hasNext()) {

sc1.nextInt();

count++;

}

sc1.close();

sc1 = new Scanner(new File(filename));

//Creating an Integer based on the Count

nos = new int[count];

//Populating the values into an array

while (sc1.hasNext()) {

nos[i] = sc1.nextInt();

i++;

}

sc1.close();

//calling the methods

min = findMinimum(nos);

max = findMaximum(nos);

mean = calMean(nos);

stdDev = calStandardDev(nos, mean);

//Displaying the output

System.out.println("Read from file :" + count + " values");

System.out.println("The Minimum Number is :" + min);

System.out.println("The Maximum Number is :" + max);

System.out.printf("The Mean is :%.2f\n", mean);

System.out.printf("The Standard Deviation is :%.2f\n", stdDev);

} catch (FileNotFoundException e) {

e.printStackTrace();

}

}

//This method will calculate the standard deviation

private static double calStandardDev(int[] nos, double mean) {

//Declaring local variables

double standard_deviation = 0.0, variance = 0.0, sum_of_squares = 0.0;

/* This loop Calculating the sum of

* square of eeach element in the array

*/

for (int i = 0; i < nos.length; i++) {

/* Calculating the sum of square of

* each element in the array    

*/

sum_of_squares += Math.pow((nos[i] - mean), 2);

}

//calculating the variance of an array

variance = ((double) sum_of_squares / (nos.length - 1));

//calculating the standard deviation of an array

standard_deviation = Math.sqrt(variance);

return standard_deviation;

}

//This method will calculate the mean

private static double calMean(int[] nos) {

double mean = 0.0, tot = 0.0;

// This for loop will find the minimum and maximum of an array

for (int i = 0; i < nos.length; i++) {

// Calculating the sum of all the elements in the array

tot += nos[i];

}

mean = tot / nos.length;

return mean;

}

//This method will find the Minimum element in the array

private static int findMinimum(int[] nos) {

int min = nos[0];

// This for loop will find the minimum and maximum of an array

for (int i = 0; i < nos.length; i++) {

// Finding minimum element

if (nos[i] < min)

min = nos[i];

}

return min;

}

//This method will find the Maximum element in the array

private static int findMaximum(int[] nos) {

int max = nos[0];

// This for loop will find the minimum and maximum of an array

for (int i = 0; i < nos.length; i++) {

// Finding minimum element

if (nos[i] > max)

max = nos[i];

}

return max;

}

}

_____________________

Output:

Enter the name of the filename :inputNos.txt

Read from file :22 values

The Minimum Number is :50

The Maximum Number is :95

The Mean is :78.45

The Standard Deviation is :12.45

cheers i hope this helped !!!

In this lab, you will design a die game called 15. The object of the game is to score exactly 15 points in as few rolls of the die as possible. After each roll, the player can choose to add the current die value to his or her score or not, unless the die value is six, in which case it is automatically added to the player’s score. If the player’s score exceeds 15, the player loses. If the player’s score is equal to 15, the player wins. Play continues until the player reaches or exceeds 15 points.
Description:
To start the game, the player presses the reset switch. The score will be set to zero and both the Win and Lose LEDs will be turned off. The player then rolls the die by toggling the Rb switch to the Roll position. The die counter should operate with a clock frequency of 27 MHz or 50 MHz so that the player cannot control the outcome of a roll. After about a second or more, the player toggles the Rb switch back to the Off position to end the roll. The Turn Counter should be incremented to indicate that the player has taken a roll. If the player rolled a six, it is automatically added to his or her score. Otherwise, the player can press the Add button to add the die value to his or her score or the player can press the Pass button to leave the score unchanged. After each roll, the score will be greater than, less than or equal to 15. If the score is equal to 15, the player wins – the Win LED should be turned on and remain on until the system is reset for a new game. If the score is greater than 15, the player loses – the Lose LED should be turned on and remain on until the system is reset. Once the player has won or lost, the player cannot roll the die again until the system is reset. (The Rb switch will not have any effect in these states.) If the score is less than 15, the player will roll again. After each roll, the player presses either the Add button or the Pass button (unless a six is rolled) before the die can be rolled again. Play continues until the player’s score equals or exceeds 15.
1) Draw a state diagram for the game as a Moore finite state machine.
2) Draw a state diagram for the game as a Mealy finite state machine.

Answers

Answer:

Explanation:

Check the file attached below to see the diagram that is drawn for the question being answered

Exact Target was acquired by Salesforce, which in turn was converted to __________.

Answers

Answer:

Salesforce Marketing Cloud.

Explanation:

Exact Target was founded by Peter McCormick, Chris Baggott and Scott Dorsey on the 15th of December, 2000 in Indianapolis, Indiana, United States of America and was later acquired by Salesforce in the year 2013 for $2.5 billion. Salesforce in turn converted Exact Target to Salesforce Marketing Cloud in the year 2014.

The Salesforce Marketing Cloud is a company that provide services such as digital marketing automation and analytics software. Salesforce Marketing Cloud softwares are sold primarily on a multi-year subscription basis and based on number of users, features enabled, and level of customer service. It is a hosted, online subscription model that provides users with services such as, consulting, mobile, implementation, email, social and digital marketing.

This assignment deals with Logical Equivalences. Review section 1.7 of the text before completing the assignment. The assignment may be handed in twice before it is graded. Consider the statements in the left column of the tables below. Translate each into a propositional statement. In the box below, indicate which two statements are logically equivalent. The gray shaded box is the Equation editor that should be used to enter the propositional expression.
Question 1
Statement Reason
Whenever there is a puppy in the house, I feel happy
If I am happy, then there is a puppy in the house
If there is not a puppy in the house, then I am not happy.
If I am not happy, then there is no puppy in the house
Question 2
Statement Reason
If I am in school today, then I am in CSC231 class
If I am not in school today, then I am not civics class
If I am not in CSC231 class, then I am not in school today
If I am in CSC231 class, then I am in school today

Answers

Answer:

Question (1) the statements (i) and( iv) are logically equivalent and statements (ii) and (iii) are logically equivalent. Question (2) the statements (i) and (iii) are logically equivalent.

Explanation:

Solution

Question (1)

Now,

Lets us p as puppy in the house, and q as i am happy

So,

p : puppy in the house,  and q : i am happy

Thus,

The Statements

(i) so if there is a puppy in the house, I feel happy :  p -> q

(ii) If I am happy, then there is a puppy in the house : q -> p

(iii) If there is no puppy in the house, then I am not happy.   : ~ p -> ~q

(iv) If I am not happy, then there is no puppy in the house : ~q -> ~p

Hence, the statements (i) and( iv) are logically equivalent and statements (ii) and (iii) are logically equivalent.

Question (2)

Let us denote p as i am in school today, and q as i am in CSC231 class, and r as i am in civics class,

So,

p: i am in school today, q: i am in CSC231 class, r: i am in civics class,

Now,

(i) if I am in school today, then I am in CSC231 class  :p -> q

(ii) If I am not in school today, then I am not civics class  :~p -> ~r

(iii) If I am not in CSC231 class, then I am not in school today  :~q -> ~p

(iv) If I am in CSC231 class, then I am in school today  : q -> p

Therefore, the statements i) and iii) are logically equivalent.

Chemical equations of Carbon + water​

Answers

Answer:

Aqueous carbon dioxide, CO2 (aq), reacts with water forming carbonic acid, H2CO3 (aq). Carbonic acid may loose protons to form bicarbonate, HCO3- , and carbonate, CO32-. In this case the proton is liberated to the water, decreasing pH. The complex chemical equilibria are described using two acid equilibrium equations.

PLS MARK AS BRAINLIEST

What kind of testing is basically checking whether a game or feature works as expected by the developers?
acceptance
functional
compatibility
load

Answers

Compatibility testing or functional testing I believe. I’m guessing functional

Joe, Kate and Jody are members of the same family. Kate is 5 years older than Joe. Jody is 6 years older than Kate . The sum of their ages squared is 961 years. What are their ages?

Answers

Answer:

5, 10 and 16

Explanation:

The sum of their ages is √961 = 31

If Joe is x years old, the equation that follows is:

x + (x+5) + (x+5+6) = 31

This simplifies to

3x = 31 - 11 - 5 = 15

so x=5

From that you can find

Joe = x = 5

Kate = x+5 = 10

Jody = x+5+6 = 16

Translate We get up at 8 o'clock into Spanish in the box below:​

Answers

Answer:

nos despertamos a las ocho

Explanation:

A potential danger of social media is that

Answers

It can cause users to want to live up to standards that they see on social media platforms and want to change their appearances because of things and people that they see on the platforms.

Answer: information can be viewed my strangers

Explanation:

Apex

Write a procedure named Str_find that searches for the first matching occurrence of a source string inside a target string and returns the matching position. The input parameters should be a pointer to the source string and a pointer to the target string. If a match is found, the procedure sets the Zero flag and EAX points to the matching position in the target string. Otherwise, the Zero flag is clear and EAX is undefined.

Answers

Answer: Provided in the explanation section

Explanation:

Str_find PROTO, pTarget:PTR BYTE, pSource:PTR BYTE

.data

target BYTE "01ABAAAAAABABCC45ABC9012",0

source BYTE "AAABA",0

str1 BYTE "Source string found at position ",0

str2 BYTE " in Target string (counting from zero).",0Ah,0Ah,0Dh,0

str3 BYTE "Unable to find Source string in Target string.",0Ah,0Ah,0Dh,0

stop DWORD ?

lenTarget DWORD ?

lenSource DWORD ?

position DWORD ?

.code

main PROC

  INVOKE Str_find,ADDR target, ADDR source

  mov position,eax

  jz wasfound           ; ZF=1 indicates string found

  mov edx,OFFSET str3   ; string not found

  call WriteString

  jmp   quit

wasfound:                   ; display message

  mov edx,OFFSET str1

  call WriteString

  mov eax,position       ; write position value

  call WriteDec

  mov edx,OFFSET str2

  call WriteString

quit:

  exit

main ENDP

;--------------------------------------------------------

Str_find PROC, pTarget:PTR BYTE, ;PTR to Target string

pSource:PTR BYTE ;PTR to Source string

;

; Searches for the first matching occurrence of a source

; string inside a target string.

; Receives: pointer to the source string and a pointer

;    to the target string.

; Returns: If a match is found, ZF=1 and EAX points to

; the offset of the match in the target string.

; IF ZF=0, no match was found.

;--------------------------------------------------------

  INVOKE Str_length,pTarget   ; get length of target

  mov lenTarget,eax

  INVOKE Str_length,pSource   ; get length of source

  mov lenSource,eax

  mov edi,OFFSET target       ; point to target

  mov esi,OFFSET source       ; point to source

; Compute place in target to stop search

  mov eax,edi    ; stop = (offset target)

  add eax,lenTarget    ; + (length of target)

  sub eax,lenSource    ; - (length of source)

  inc eax    ; + 1

  mov stop,eax           ; save the stopping position

; Compare source string to current target

  cld

  mov ecx,lenSource    ; length of source string

L1:

  pushad

  repe cmpsb           ; compare all bytes

  popad

  je found           ; if found, exit now

  inc edi               ; move to next target position

  cmp edi,stop           ; has EDI reached stop position?

  jae notfound           ; yes: exit

  jmp L1               ; not: continue loop

notfound:                   ; string not found

  or eax,1           ; ZF=0 indicates failure

  jmp done

found:                   ; string found

  mov eax,edi           ; compute position in target of find

  sub eax,pTarget

  cmp eax,eax    ; ZF=1 indicates success

done:

  ret

Str_find ENDP

END main

cheers i hoped this helped !!

A company with a large number of hosts creates three subdomains under a main domain. For easier management of the host records, how many zones should be used

Answers

Answer:

4

Explanation:

For easier management of the host records of the company 4 zones should be used because

subdomain is part of a larger domain and the main domain which is the primary domain is the name which the company have decide to use which will represent the company website address and in a situation where the company

have different domain names in which they had registered, they will need to choose one among the domain which will inturn be their main domain.

Therefore for easier , efficient and effective management of the host records 4 zones will be the best zones to be used.

Example of sub domain is north.example.com

For easier management of the host records, 4 zones should be used

Host record or a DNS host, is simply known as record in one's domain's DNS zone file that is said to create the connection between one's domain and its matching IP address.

It is also called an A or Address record. It is said to links a domain to the physical IP address of a computer hosting that has the domain's services.

4 zones in the subdomain is good because a subdomain is part of a larger domain and the main domain and therefore having four will cater for all.

Its gives a creative approach to the management of DNS, DHCP, and IPAM data.

Conclusively, the use of host records helps to manage multiple DNS records, DHCP and IPAM data.

Learn more from

https://brainly.com/question/19281141

What process is used to convert numbers between the binary system and the decimal system?

ANSWER: D) Look up the number on a binary-to-decimal conversion table

Answers

Answer:

The method is easy . Divide the binary number by 2 and write the remainder . Again divide by 2 and write remainder and continue till remainder becomes 1 . Then write all the remainders (0 , 1) in the order . The decimal is converted into binary

If you wanna convert binary into decimal , number the digits of a binary number from right to left and from 0 to how much digits are there. Then the digit 1 or 0 is multiplied by the corresponding power of 2 , which comes after numbering . Add all them and you get them into decimal

Answer:

The answer is D) Look up the number on a binary-to-decimal conversion table.

Explanation:

It is only likely for a guest to receive outstanding service at luxury brands. That's why Ritz-Carlton, Mandarin Oriental, Four Seasons, and others are the best at what they do.

Answers

Answer:

FALSE

Explanation:

Assume variables SimpleWriter out and int n are already declared in each case. Write a while loop that printsA. All squares less than n. For example, if n is 100, print 0 1 4 9 16 25 36 49 64 81.B. All positive numbers that are divisible by 10 and less than n. For example, if n is 100, print 10 20 30 40 50 60 70 80 90C. All powers of two less than n. For example, if n is 100, print 1 2 4 8 16 32 64.

Answers

Answer:

This program has been written using JAVA. The code is written beloe:

// import library

import java.util.Scanner;

public category Main operate

public static void main(String[] args)

{

// scanner category

Scanner scan=new Scanner(System.in);

System.out.println("Enter Number:");

int n=scan.nextInt();

//All squares but n

System.out.println("All squares but n are: ");

int temp=0,square=0,i=0;

while(square

range

square=i*i;

if(square>=n)break;

System.out.print(square+" ");

i++;

}

//All positive numbers that are divisible by 10 but less than n

System.out.println(" ");

System.out.println(" ");

System.out.println("All positive numbers are divisible by 10 and less than n are: ");

i=1;

while(i

{

if(i%10==0)

System.out.print(i+" ");

if(i>=n)break;

i++;

}

System.out.println(" ");

System.out.println(" ");

System.out.println("All powers of 2 that are less than n are: ");

//All powers of 2 less than n

i=0;

while(i

mathematics.pow(2, i);

if(num_power

System.out.print(num_power+" ");

i++;

}

}

}

Explanation:

With SimpleWriter out and int n already declared in each case this program makes use of a while loop condition to satisfy the following;

1. All squares less than n

2. positive numbers that are divisible by 10 and less than n.

3. All powers of two less than n.

Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside attack on the internal network. They specialize in building secure firewalls as well as complex intrusion detection systems designed to keep intruders out. They watch and monitor the incoming message traffic very closely. But no matter how well they protect the private network from outside access without proper authority, they do not help prevent an attack by a malicious or disgruntled employee from the inside. And they cannot prevent breaches due to a simple lack of understanding of security policy by internal employees.When do YOU think an organization needs information systems security policies? Why?

Answers

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

It defines what is required from organization’s employees for the security of the IT systemsInformation security policies provide a means to secure the organization against external and internal threats Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities Information security policies are created to hold each employee responsible with regard to information security

Must be completed in JAVA

Complete SortedTableMap. The SortedTreeMap from the final lecture uses an AVLTree to implement the SortedMap interface so that the essential methods run in O(log n) time, which is relatively quite good. For this problem, complete the empty SortedTableMap class by using an ArrayList to implement the SortedMap interface. It will not be possible to implement all of the essential methods so that they run in O(log n) time, but your implementation should be as runtime efficient as possible. Specifically, the get method can be done in O(log n) time; some other methods can be done in O(n), some can be done in O(1).

package Class;

/*
* This file should not be modified
*/

public interface SortedMap extends Map {

Entry firstEntry();
Entry lastEntry();
Entry floorEntry(K key);
Entry ceilingEntry(K key);
Entry lowerEntry(K key);
Entry higherEntry(K key);
Iterable> subMap(K fromKey, K toKey);

}

package Class;

import java.util.ArrayList;
import java.util.Comparator;

/*
* Complete this file for part 3 of the assignment
*
* No additional classes should be imported
*/

public class SortedTableMap extends AbstractMap implements SortedMap {


}

Answers

Answer:

What is your question?

Other Questions
Graph the line with slope 1/2 passing through the poin Choose the transition metal among the following which has only single ionic charge ?A. Silver (Ag)B. Chromium (Cr)C. Iron (Fe)D. Copper (Cu)Please tell what is the answer and if possible explain me... A company mixes two kinds of cleansers to get a blend they sell for 59 cents a liter. One of the cleansers costs 50 cents per liter, and the other 80 cents per liter. How much of each kind should be mixed to get 2,000 liters of the blend? 12/19*.............................= -12/19 Which purpose might a political persuasive speech serve? What is the rule about ending a sentence with a proposition? Which type of RNA is matched with its correct function? *2 pointsmRNA - makes a copy of the DNA and carries it to the RibosomerRNA - carries amino acids to the Ribosome to build a proteintRNA - links the amino acids together with peptide bonds to create a proteinDNA: Stores energy Now this is Part B. The second part of the equation. If you answer this right you will win Brainliest. Dont tell me what you think the answer is and if you cant see zoom in, dont answer the question saying you cant seem. How does Thomas Jefferson support the argument that all people are born with specific rights? evaluate 8 j - k + 14 when j = 0.25 and k = 1 Sunland Co. has the following transactions related to notes receivable during the last 2 months of the year. The company does not make entries to accrue interest except at December 31. Nov. 1 Loaned $63,600 cash to C. Bohr on a 12-month, 9% note. Dec. 11 Sold goods to K. R. Pine, Inc., receiving a $5,400, 90-day, 8% note. 16 Received a $14,400, 180-day, 6% note to settle an open account from A. Murdock. 31 Accrued interest revenue on all notes receivable.Journalize the transactions for Sunland Co. (Omit cost of goods sold entries.) (Credit account titles are automatically indented when amount is entered. Do not indent manually. Record journal entries in the order presented in the problem. Use 360 days for calculation.)Date Account Titles and Explanation Debit Given the function f(x)= x^2-7 and g(x) = 2x-x^3 what is the value of f(g(2)) Use the right triangle ABC. The figure is for reference only and is not drawn to scale. If AC = 16 cm and AB = 34 cm what is the length BC? there are two identical fridges for desserts. one of the fridge has 5/8 of its room left and the other fridge is only 1/8 full. how much room is left? Malcolm and Ravi raced each other.The average of their maximum speeds was km/h260 if doubled Malcolm's maximum speed would be km/h80 more than Ravi's maximum speed.What were Malcolm's and Ravi's maximum speeds? A motorcycle starting from rest covers 200 metre distance in 6 second. Calculate final velocity and acceleration of the motorcycle. Robert stayed with me. "You want me to bring you something, Paul?" he asked. "No," I said, going down the steps. "Well, then come on back in the kitchen and get yourself something. There's a lot of good food in there - ham and fried chicken, dumplings, sweet-potato pie and -" "Don't want any," I replied, and started across the yard. "Where you going?" Robert called. "Your mama told George and me you were to stay on this porch!" "Well, that's between my mama and me!" "You leave, you gonna miss out on all this good food!" I stopped long enough to turn and shout, "Last thing I want is my daddy's food from a table he doesn't even want me to sit at when his company comes calling!" As I finished my words, I saw that Hammond was standing at the corner of the house. I knew he saw me too, but I didn't care. I turned and ran toward the woods with Robert calling after me to come back. The Land, Mildred D. Taylor Which word best describes Pauls feelings in this passage? What causes Paul to feel the way he does? Which actions are evidence that a chemical reaction has occurred? Select five options. a change in color the formation of a precipitate a clear liquid becoming cloudy a change in shape the formation of bubbles the formation of smoke help please place the ph test papers In order from most acidic to most alkaline PLZ SOMEONE ANSWER QUICK, A packing company is in the planning stages of creating a rectangular prism box that includes a three-dimensional diagonal support inside the box. The box has a width of 5 feet, a length of 6 feet, and a height of 8 feet. To the nearest tenth, how long is the diagonal support?