Answers

Answer 1

Answer:

MICR (magnetic ink character recognition) is a technology used to verify the legitimacy or originality of paper documents, especially checks. Special ink, which is sensitive to magnetic fields, is used in the printing of certain characters on the original documents.

Explanation:

Answer 2

Answer:

MICR (magnetic ink character recognition) is a technology used to verify the legitimacy or originality of paper documents, especially checks. Special ink, which is sensitive to magnetic fields, is used in the printing of certain characters on the original documents.

Explanation:


Related Questions

When reading electronic texts, it is important to _____.
a) set a purpose for research before reading
b) evaluate the reliability of the source
c) only read texts that support your own point of view
d) look for texts that have strong opinions on a subject

Answers

Answer:

b) evaluate the reliability of the source

what is syntax?

a. rules for using tags correctly in HTML

b. text containing hyperlinks that can go to other hypertext pages

c. information about how an element should be used by a web browser

d. text used to mark text or images on a webpage

Answers

Answer:

a

(would really appreciate the brainliest)

Answer- A: rules for using tags correctly in HTML.

Explanation: Correct on Edg 2020.

This is a python program.

I managed to get this program to say hello to a user after they input their first and last name, however, I cannot manage to get the program to tell the user how many letters are in the user's name.

Answers

Answer:

word = input("Type your name: ")

print(len(word))

Explanation:

The len function will count all the chars in the string.

A friend tells you that they cannot afford to pay for the standardized tests that need to be taken to apply for college and military academies. How could you respond?

Answers

Answer:

you could respond by giving your money to them.

Explanation:

on hearing my name you may think that i am interative, but i play a vital role in network by boosting the signal strenght to overcome attenuation. who am i?

Answers

Answer: A Network Repeater or Repeater

Explanation:

A Network Repeater also called Signal booster is an electronic device that receives a signal and retransmits the signals in such a way that can cover a wide range of distance without reducing the signal strength or causing Attenuation( a reduction or loss in signal strength which occurs when there is a transmission of signals over long distances).

An example is a Radio repeater.


what does a student use when types text into a word processing program ?

Answers

Answer:

Computer Software

Explanation:

Computer software; s a set of instructions that tells a computer what to do or how to perform a task.

which of the following actions do not contribute to recommedations you see online

Answers

Answer:

All of these actions contribute to recommendations you see online.

1.
When did text messages over cell phones first begin to occur? |
I

Answers

it was first used on December 3rd, 1992

hope this helps

In Asch’s study which of these lowered conformity rates

A.) having on person disagree


B.) having only two people in the group

C.) writing answers down instead of saying them

D.) all of these are correct

Answers

Answer:

D. all of these are correct

Explanation:

option d is correct answer

Pre-Test
Active
2
3
6
7
8
9
In order for a fictionalized story to be based on real events, the author should include
O characters with strong feelings
O historical matenal
O a narrator
O dialogue​

Answers

Some of the options in this question are not correct; here is the correct and complete question:

In order for a fictionalized story to be based on real events, the author should include

A. Characters with strong feelings

B. Historical material

C. A narrator

D. Dialogue​

The correct answer is B. Historical material

Explanation:

Stories, novels, and poems are said to be based on real events if these include or are inspired by real people, settings, or historical events. This includes using any historical material and adapting it to create a story. For example, the play "The Tragedy of Julius Caesar" written by Shakespeare is a play based on real events as it includes real characters such as Julius Caesar and some of the events in it are based on historical events.

According to this, the element that is necessary to make a story to be based on real events is historical material. Also, others such as a narrator, dialogue, or characters with strong feelings can be found in most stories including those that are completely fictionalized.


Which of the following are peripherals?
Rasterize
Sneaker-net
Media access control
None of the above

Answers

Answer:

D

Explanation:

A peripheral or peripheral device is ancillary device used to put information into and get information out of the computer.

Answer: D

Explanation:

what is network topology​

Answers

DescriptionNetwork topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.

Temperature for the month of April 2017 has been recorded by the zambia metrological department as follows : 24.0,17.5,33.0,36.5,36.0,22.5,12.5,44.0,15.5,33.0,41.5,23.5 explain in detail how these temperatures can be accessed and arranged in a 2DA matrix. Write a program to show how they can be arranged in a 3*3 matrix. Find the total sum of all the temperatures using 2DA

Answers

Answer:

The sum of the temperatures is: 336

Explanation:

2-Dimensional Array:

A two dimensional array is defined as

int temp [3] [3]  

This is how a two dimensional array is defined in C++ programming language.

Here we have defined a 2-D array named temp which can store 3*3 = 9 int values

These 9 values are stored in 3 rows and 3 columns as below:

1, 2, 3

4, 5, 6

7, 8, 9

We are given the temperature for the month of April 2017 recorded by the Zambia metro-logical department.

24.0, 17.5, 33.0, 36.5, 36.0, 22.5, 12.5, 44.0, 15.5, 33.0, 41.5, 23.5

The given temperature values are 12 therefore, we would need a matrix of 3 rows and 4 columns ( 4 rows and 3 columns is also valid)

3*4 = 12 values

These 12 values will be arrange as below:

1, 2, 3, 4

5, 6, 7, 8

9, 10, 11, 12

C++ Program:

#include <iostream>

using namespace std;

int main()

{

// initialize the number of rows and columns

   int row = 3;

   int col = 4;

// initialize variable sum to store the sum of temperature values

   int sum = 0;

// initialize 2d array with given temperature values  

   float temp[row][col] = { {24.0, 17.5, 33.0, 36.5}, {36.0, 22.5, 12.5, 44.0}, {33.0, 41.5, 23.5, 15.5} };    

// we need two for loops to keep track of rows and columns

 for(int i = 0; i < row; ++i)

   {

       for(int j = 0; j < col; ++j)

       {

// to display individual temperature values

          cout<< "temp[" << i << "][" << j << "] = " << temp[i][j] <<endl;

// to sum the elements of the 2d array

          sum+=temp[i][j];

       }    

   }

// to display the sum of temperature values

cout<<"The sum of the temperatures is: "<<sum<<endl;

return 0;

}

Output:

temp[0][0] = 24

temp[0][1] = 17.5

temp[0][2] = 33

temp[0][3] = 36.5

temp[1][0] = 36

temp[1][1] = 22.5

temp[1][2] = 12.5

temp[1][3] = 44

temp[2][0] = 33

temp[2][1] = 41.5

temp[2][2] = 23.5

temp[2][3] = 15.5

The sum of the temperatures is: 336

Note:

The index start at 0 not 1 that is why you see rows from 0 to 2 and columns from 0 to 3.

Kali, a python programmer is using the turtle module to write the word hello, which code should she use to indicate the location to begin writing the word? A. # pick up the turtle and move it to it's starting location. B prenup (-100,200) Goto() Pendown() C. Penup() Goto(-100,200) Pendiente D. # pick up the turtle and move it to (-100,200)

Answers

Answer:

C:

penup()

goto(-100, 200)

pendown()

Explanation:

This is the correct syntax.

Option A is just a note since is has a #

Option B doesn't have the correct syntax.

Option C is also just a note

Thus, Option C is the correct option.

Answer:

Answer is C.

Explanation:

penup()

goto(-100, 200)

pendown()

Queries are a very useful object in a database, please explain why.

Answers

Answer:

they tell the producer what to do to make their website better

Explanation:

How was the addition of an improvement over early web design?
Webpages could finally incorporate tables into the design.
Webpage layout could finally format content blocks separately.
Webpage layouts were finally designed using HTML code.
Webpages could finally incorporate images as layout elements.

Answers

Answer- B: Webpage layout could finally format content blocks separately.

Explanation: Found it on Quizlet.

Answer:

Webpage layout could finally format content blocks separately.

Explanation: this the answer on edge.

Ryder has discovered the power of creating and viewing multiple workbooks. ​ ​ Ryder wants to use a layout in which the workbooks overlap each other with all the title bars visible. Ryder opens all of the workbooks, and then he clicks the View tab on the Ribbon and clicks the Arrange All button. What should he do next to obtain the desired layout?

Answers

Answer:

Click the Cascade option button

Explanation:

Based on the description of what Ryder is attempting to accomplish, the next step that he needs to do would be to Click the Cascade option button. This option will cause all the windows of the currently running applications to overlap one another but at the same time show their title bars completely visible in order to let the user know their open status. Which is exactly what Ryder is attempting to make as his desired layout for the workbooks. Therefore this is the option he needs.

Middle question: computer science 7th grade

Answers

Answer:

i don't UNderstand why did they ask such a questions to a 7th grader

But here is the answer:

Brute Force to me is the simplest type of Hacking method.

in my opinion, bruteforcing is more useful when you do it to a person you personaly knows.

Wordlist: Wordlist is a file (made in notepad) that has many password that the attacker have guessed of the target. Wordlist is a dict file.

WIKIPEDIA DEFINES LIKE THIS: In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.

Mark as BRAINLIEST If you are satisfied : )

pls answer asap do not use internet
what are the differences and similarities between windows os and linux based os

Answers

Answer:

key differences between linux and windows operating system linux is free and open resource whereas windows is a commercial operating system whose source code is inaccessible windows is not customizable as against linux is customizable and a user can modify the code and can change it looks and feels

Explanation:

I hope this helps

How does the team know what to work upon during the iteration? (1 correct answer)






1. The team participates in the iteration planning during which the Lead/Onsite coordinator/Facilitator decides who would work on that.





2. Based on the discussions during iteration planning, team members agree on what each would work on.





3. The Facilitator has regular interaction with the Product Owner. He/she guides the team on the tasks to be taken up.





4. Iteration plans are shared by Product Owner beforehand; any spill over from last iteration is taken up by default.

Answers

Answer:

2

Explanation:

In iteration, the entire team participates. A list of backlog and upcoming tasks is made and plan for the execution of these tasks is decided mutually.

Write the importance of cyber law? In point .

Answers

Answer:

Cyber law is important because it covers all aspects of transactions and behavior related to the internet, the worldwide web and cyberspace.it controls crimes that could pose a major threat to the security and financial health of nations.

Answer: Cyber law is important because It covers all the aspects of transactions and behavior by concerning the internet

Explanation:

Explain the term criteria when building a query.

Answers

Answer:

A criteria in query is used to compare to query field values so as to determine whether to include the record that contains each value.

Explanation:

A criteria in query is used to compare to query field values so as to determine whether to include the record that contains each value. Query criteria is used to limit the result from a query retrieving only specific items.

Only when an item matches all the criteria can it be shown as a query results. Query criterias can be simple making use of basic operators and constants while some may be complex, and use functions, special operators,.

Jonah has finished his assignment and now wants to save his work with the title "Renaissance."
Which steps should Jonah follow to accomplish this?
navigate to the Quick Access bar, click the Save icon
navigate to the backstage view, click the Save As icon
click the File tab, click Save, type in the title, click Save
click the File tab, click Save As, type in the title, click Save

Answers

Answer:

Your answer is D.click the File tab, click Save As, type in the title, click Save

Explanation:

Answer:

C

Explanation:

took the quiz

Billy, a network programmer, asked his customer if he was having problems
connecting the node to the Internet. The customer looked confused about the
word "node." What did Billy mean by node?
O A. A new type of computer
O B. The devices connected to a network
O C. A security issue in the network
O D. A new software module

Answers

Answer:

the correct answer is,

B. The devices connected to a network

According to the question, the devices connected to a network are meant by the word "node." Thus, it's B.

What is a network?

A network may be characterized as a series or sequences of computers that are generally sharing resources organized on or delivered by network nodes. Computers significantly utilize common communication protocols over digital interconnections in order to make a connection with each other.

The word "node" that is revealed by Billy to his customer accurately describes a series of devices that are more frequently connected to a network. He asked his customer if he was having problems connecting the node to the Internet. In response to this, his customer was immediately confused by this specific word.

Therefore, according to the question, the devices connected to a network are meant by the word "node." Thus, it's B.

To learn more about Network programmers, refer to the link:

https://brainly.com/question/28465761

#SPJ7

Within a word processing program, predesigned files that have layout and some page elements already completed are called
text boxes
templates.
frames
typography

Answers

Answer:

I think it's B) templates

     

                   Sorry if it's wrong I'm not sure!!

Explanation:

Within a word processing program, predesigned files that have layout and some page elements already completed are called: B. templates.

In Computers and Technology, word processor can be defined as a processing software program that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.

A template refers to a predesigned file or sample in which some of its page elements and layout have already completed by the software developer.

In this context, predesigned files in a word processing program, that have layout and some page elements already completed by the software developer is referred to as a template.

Read more on template here: https://brainly.com/question/13859569

Which instruments do volcanologists use to predict volcanic eruptions?
A: Seismograph
B: Rain Gauge
C: Satellite
D: Airplane Equipped with Weather Devices

Answers

Answer:

A.) Seismograph

Explanation:

Scientists use seismographs to predict ground movement, which can cause earthquakes and volcanic eruptions

Hope this helps! Good luck!

name two components required for wireless networking
(answer fastly)​

Answers

Explanation:

User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...

Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.

or routers, repeaters, and access points

Determine the speed of rotation of a 20- tooth gear when it is driven by a 40-tooth gear and rotating at 10 rpm​

Answers

Answer:

20 rpm

Explanation:

if the lager tooth gear is moving a 10 rpm which will move slower than the smaller 20 tooth gear it will push it faster than the 10 rpm

60 teeth =1/3
the product of the rpm and the gear ratio: 120 rpm *1/3 = 120/3 = 40.

What is output by the code below?

int[] nums = new int[10];

for (int i=0; i < nums.length; i++)

{

nums[i] = i*2;

}

System.out.println(nums[5]);

a.16
b. 10
c. 14
d. 18
e. 12​

Answers

Answer: I think it is a

Explanation:Sorry if it it is worng

How do I add winning conditions to this rock paper scissors code in python? Please keep it simple as I am not allowed to include code we have not learned yet.

import random
choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")
computer = random.randint(1, 3)
if computer == 1:
print("Computer played R.")
elif computer == 2:
print("Computer played P.")
else:
print("Computer played S.")

Answers

Answer:

You wanted simple, but i dodn't know how simple you wanted so I kept it as simple as possible, don't blame me if theres a bug.

Explanation:

import random

choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")

computer = random.randint(1, 3)

if computer == 1 and choice == "R":

   print("Computer played Rock.")

   print("Tie")

elif computer == 2 and choice == "P":

   print("Computer played Paper.")

   print("Tie")

elif computer == 3 and choice == "S":

   print("Computer played Scissors.")

   print("Tie")

elif computer == 1 and choice == "S":

   print("Computer played Rock.")

   print("You Lose")

elif computer == 2 and choice == "R":

   print("Computer played Paper.")

   print("You Lose")

elif computer == 3 and choice == "P":

   print("Computer played Scissors.")

   print("You Lose")

elif computer == 1 and choice == "P":

   print("Computer played Rock.")

   print("You Win")

elif computer == 2 and choice == "S":

   print("Computer played Paper.")

   print("You Win")

elif computer == 3 and choice == "R":

   print("Computer played Scissor.")

   print("You Win")

Other Questions
No quiero esperar ms! Quiero salir de aquA. generalmenteB. inmediatamenteC. posiblementeD. lentamente Two astronauts of equal mass are holding on to each other and moving at a speed of 30 m/s. They push off of each other and one of the astronauts moves in the same direction as the two were initially moving but at 60 m/s. The velocity of the second astronaut is wnIn this passage, Smith equates national identity withart ofsake..nvolvetanda love of country.the rights of citizens.a respect for religion.the importance of power.lentestIs asiments,"m Smith Identify the equation of the line with the given slope and Y intercept, 8. Simon's Toy Co. makes plastic blocks that are in the shapeof cubes 3 inches on each edge. How many blocks can beput in a cube-shaped mailing box that measures 15 incheson each edge? Find the probability of drawing a 8 of Diamonds from a 52-card deck given the deck is properly shuffled. Find the volume of the cone below. Round your answer to the nearest tenth if necessary. Use 3.14 for . * PLS show work plz help meeeeeeeeeeeee Calculate the volume of a gas with a pressure of 100 kPa, if its volume at 120 kPa is 1.50 L. Solve for h.0.8h 11.49 = 5.67 + 12.9 15.9h The cell pictured is in metaphase. Which stage of mitosis will the cell be in NEXT?a) anaphase b) telophase c) cytokinesisd) prophase In a study of cell phone usage and brain hemispheric dominance, an Internet survey was e-mailed to 6965 subjects randomly selected from an online group involved with ears. There were 1330 surveys returned. Use a 0.01 significance level to test the claim that the return rate is less than 20%. Use the P-value method and use the normal distribution as an approximation to the binomial distribution. Identify the null hypothesis and alternative hypothesis. A. Upper H 0: pequals0.2 Upper H 1: pless than0.2 B. Upper H 0: pgreater than0.2 Upper H 1: pequals0.2 C. Upper H 0: pequals0.2 Upper H 1: pnot equals0.2 D. Upper H 0: pnot equals0.2 Upper H 1: pequals0.2 E. Upper H 0: pless than0.2 Upper H 1: pequals0.2 F. Upper H 0: pequals0.2 Upper H 1: pgreater than0.2 The test statistic is zequals nothing. (Round to two decimal places as needed.) The P-value is nothing. (Round to three decimal places as needed.) Because the P-value is Which event in the history of the populist movement happen first 4 (5 points)3Solve 3t - 6 = t - 2a) -46b) 29O c) 112d) -2. What is the area of the shape below Solve the system of equation: y = x + 5 ; y = 2x +2 x= ? , y = ?I need this ASAP It's simple Please!!!!!!! The data in the table represents the value of a savings account at the end of each year for 6 years. The relationship between the increasing years and the increasing value of the account is exponential. There israte of change in an exponential relationship. After each year, the value of the account istimes as large as the previous year. Formal education that involves instruction by specially trained teachers who follow officially recognized policies is called....b. school choice.d. tracking.C.home schooling a.schooling A rectangular prism and a square pyramid were joined to form a composite figure. A rectangular prism with a length of 9 inches, width of 9 inches, and height of 5 inches. A square pyramid with triangular sides with a base of 9 inches and height 4 inches. [Not drawn to Scale] What is the surface area of the figure? 261 in.2 333 in.2 405 in.2 477 in.2 Which of these is the BEST source of stem cells and minimizes the risk associated with stem cell transplantation?Select one:a. Stem cells from rejected grafts that initiated an immune response.b. Stem cells preserved from the umbilical cord of the person.c. Stem cells from a donor having the same blood group.d. Stem cells from a donor who is the same age as the patient.