what is the pager feature on the yaesu ft-70dr called?

Answers

Answer 1

The FT-70D receiver frequency coverage is from 108MHz to 579.995MHz and offers a wide variety of monitoring excitement in addition to full performance on the 144 MHz and 430 MHz Amateur bands.

What radio frequency is ideal for amateur use?

You'll use the frequency band between 420 and 450 MHz for ham radio operators. UHF radio waves, in contrast to the dependability of VHF radio waves, have a far shorter wavelength and are susceptible to interference from virtually any solid object.

What frequency do people speak?

For men, the fundamental frequency of the complex speech tone—also known as the pitch or f0—ranges from 100 to 120 Hz, while deviations outside of this range are possible. About one octave higher is where you'll find the f0 for females. F0 is roughly 300 Hz for kids.

To know more about frequency coverage visit :-

https://brainly.com/question/10140426

#SPJ4


Related Questions

a dvd is an excellent example of an item with a high value-to-weight ratio. group of answer choices true false

Answers

It is much simpler to sell a product online that is not branded than one that is. A DVD is an excellent example of an item with a high value-to-weight ratio. --- True .

DVD :

Because their pits are smaller and closer together, digital versatile discs (DVDs) can store more data than compact discs (CDs). The 1s and 0s that a player converts into sound or images are encoded by the pattern of these pits that are burned onto the surface of a disc.

What purpose does DVD serve?

The term "Digital Versatile Disc" stands for DVD. Information that can be read by a laser on a computer is stored on a DVD. Movies, television shows, and computer programs like games are the primary uses for DVDs. Although DVDs and compact discs are the same size and shape, they store significantly more data in a different way.

Learn more about DVD's :

brainly.com/question/14177087

#SPJ4

the project planning committee for an outpatient center is planning to conduct a needs assessment prior to implementing wireless technology to enhance its computer system. which source should the committee identify as most valuable to assess? select one:

Answers

Interviews with managers and a representative group of staff members from each outpatient programme is the source that  the committee should identify as most valuable to assess.

The project planning committee for an outpatient center should identify interviews with administrators and representative employees from all of the outpatient services as the most valuable source to assess in their needs assessment prior to implementing wireless technology. This is because these individuals have first-hand experience of the day-to-day operations of the outpatient services and can provide valuable insights into the specific needs and requirements for the new technology. By gathering input from these stakeholders, the committee can ensure that the new wireless technology aligns with the operational needs and enhances the overall efficiency and quality of care for the patients.

Furthermore, gathering input from the representative employees can help the committee identify any potential challenges or roadblocks to the implementation of wireless technology, and develop plans to address them, ensuring a smoother implementation process and a more successful outcome.

Learn more about wireless technology here:

https://brainly.com/question/3738170

#SPJ4

The complete question is:

Before deploying wireless technology to improve its computer system, the project planning committee for an outpatient centre plans to carry out a needs analysis. Which source should the committee choose as the most important to evaluate? select one:

Guidelines provided by the Joint Commission,

interviews with the chief executive officer, the director, and the administrators of the outpatient services units,

Regulations under the Health Insurance Portability and Accountability Act (HIPAA),

interviews with managers and a representative group of staff members from each outpatient programme.

what concerns would you have if you accept a job as a dba and discover that the database users are entering one common password to log on to the database each morning when they arrive for work?

Answers

To keep up with staffing changes or shifting duties within their organization, a DBA can update permissions for database access.

What does a DBA do?

A database management system's control, upkeep, coordination, and operation are the duties of a database administrator (DBA). One of the main responsibilities is managing, protecting, and maintaining the database systems.

What qualifications are needed for database administrators?

Most database administrators hold a bachelor's degree in a field linked to computers or information, such as computer science. A bachelor's degree in computer and information technology or a related discipline is often required for database administrators (DBAs) and architects.

To know more about  database visit:-

https://brainly.com/question/6447559

#SPJ4

give an example of a tool or virtual community that enables a large, global, informal network. what is the value of this tool to a participant and the participant's firm?

Answers

A virtual community is a social network of people who converse with one another on an unique social media platform. potentially going beyond geographical and political borders.

What sort of community exists online?

The most popular kind of virtual community is one that uses social networking platforms. They are either a website or a software platform with a relationship-building and upkeep as their primary goals.

What role do virtual communities play in e-commerce?

Virtual communities are excellent for extending projects, growing businesses, and building stronger relationships in addition to exchanging ideas, facts, and information. It draws people interested in e-commerce since it offers a better and more efficient way for them to grow their business.

To know more about virtual community visit:

https://brainly.com/question/14363454

#SPJ4

marco is working for itunes and needs to have a database that can store complex data. which type of database will be the best choice for him?

Answers

The best choice for Marco would be a relational database. Relational databases are capable of storing complex data, and provide an efficient way to access and manipulate data.

They also enable the user to create relationships between different data sets, allowing for more powerful querying capabilities.

Relational databases are the best choice for Marco because they are designed to store and manage complex data. They offer efficient ways to access and modify data, as well as create relationships between different data sets. By creating these relationships, Marco can take advantage of powerful querying capabilities. This allows him to search and access data quickly and easily, while maintaining data integrity.

Learn more about databases: https://brainly.com/question/518894

#SPJ4

Which app is used to transfer all data from one phone to another?

Answers

Apps used to transfer all data from one phone to another include G Drive, Samsung Smart Switch, Apple's Move to iOS, SHAREit, Xender, CLONEit, and AirDrop.

Here are several apps that can be used to transfer data from one phone to another, including:

G Drive: G Drive is a cloud storage service that allows you to backup and transfer data between devices, including contacts, photos, and other files.

Samsung Smart Switch: Samsung Smart Switch is a proprietary app that allows you to transfer data between Samsung devices, including contacts, photos, music, and other files.

Apple's Move to iOS: Apple's Move to iOS app allows you to transfer data from an Android device to an iOS device, including contacts, photos, and other data.

SHAREit: SHAREit is a free app that allows you to transfer data between devices over Wi-Fi, including photos, music, videos, and other files.

Xender: Xender is a free app that allows you to transfer data between devices over Wi-Fi, including photos, videos, music, and other files.

CLONEit: CLONEit is an app that allows you to transfer data between Android devices, including contacts, photos, videos, music, and other files.

AirDrop: AirDrop is a feature built into Apple's iOS and macOS operating systems that allows you to transfer data wirelessly between devices, including photos, videos, and other files.

These are some of the most popular apps used for transferring data between phones. The specific app you choose will depend on the operating systems of the devices you're transferring data between, as well as the type of data you need to transfer.

Learn more about Wi-Fi here:

https://brainly.com/question/19538224

#SPJ4

you are working with a team to compile student and teacher information. this information will be used to connect teachers to students based on classes taken and home addresses. which software would be the best choice to help with this compilation task?

Answers

The best software choice for compiling student and teacher information depends on the specific requirements and constraints of your project. Some popular options include are Microsoft Excel, G**gle Sheets , Microsoft Access, FileMaker Pro.

What is Excel?

Excel is a spreadsheet software developed by Microsoft Corporation. It is widely used for data organization, analysis, and visualization. With Excel, users can create and manipulate spreadsheets, which consist of cells arranged in rows and columns. Each cell can contain text, numerical values, or formulas.

Excel is used in many industries and is a popular tool for tasks such as budgeting, bookkeeping, and project management. Its versatility and robust feature set make it a popular choice for businesses, individuals, and educational institutions.

The best software choice for compiling student and teacher information depends on the specific requirements and constraints of your project. Some popular options include:

Excel - This is a widely used spreadsheet software that is well-suited for organizing and managing large amounts of data. It can be used to create a database-style layout and perform various types of data analysis.

G**gle Sheets - This is a cloud-based spreadsheet software that can be used to collaborate with team members in real-time. It has many of the same features as Microsoft Excel and is accessible from any device with an internet connection.

Access - This is a relational database software that is well-suited for organizing and managing large amounts of structured data. It can be used to create forms and reports, as well as perform complex data analysis.

FileMaker Pro - This is a cross-platform relational database software that is well-suited for creating custom database solutions. It has a graphical user interface and can be used to create forms, reports, and dashboards.

Learn more about excel click here:

https://brainly.com/question/23501096

#SPJ4

how can the number of devices on an analog addressable circuit and the overall distance requirements from the control panel to the farthest device in the loop be determined?

Answers

The number of devices on an analog addressable circuit is determined by the number of available addresses on the addressable loop. For example, a 10-address loop can have up to 10 devices connected.

The overall distance requirements from the control panel to the farthest device in the loop can be determined by calculating the total length of the loop, including the distance from the control panel to the farthest device. This is typically done by measuring the physical length of the loop, including the distance traveled between each device. The total length of the loop should not exceed the maximum loop length specified by the manufacturer.

Learn more about overall distance: https://brainly.com/question/14335655

#SPJ4

warm-up - imagine you are interested in finding out how much time it takes on average to walk from one end of your school to the next. you've decided to figure this out on your lunch break, and are able to complete the walk 20 times. what would your algorithm look like? where could a loop show up?

Answers

The given situation relates to the concept of a loop.

As we have decided to figure this out on your lunch break, and are able to complete the walk 20 times. Hence, the algorithm will be as follows:

Repeat 20 times:

1. Stand at the entry doors to the school.

Start the timer.Walk at a steady pace to the end of the hallway.Turn off the timer.Record the time in a notebook.Walk back to the entry doors.

2. Add all times together.

3. Divide by 20 to find the average.

Therefore, the use of a loop will simplify the code.

Learn more about the algorithm here-

brainly.com/question/15802846

#SPJ4

routing protocols calculate the best path to a destination based on the distance to that destination, while routing protocols focus less on the number of hops between routers and more on the state of a connection, and hybrid routing protocols exhibit characteristics of both

Answers

Routing protocols determine best path to destination, divided into distance-vector, link-state, and hybrid types.

Routing protocols are used by routers to determine the best path for forwarding data packets to their destination. Distance-vector and link-state routing protocols are the two primary categories.

Distance-vector routing protocols calculate the best path based on the distance to the destination. The distance is usually represented by a metric, such as the number of hops between routers. Distance-vector routing protocols are simple to implement, but can suffer from slow convergence and routing loops if the network topology changes. Routing Information Protocol (RIP) and Interior Gateway Routing Protocol are two examples of distance-vector routing protocols (IGRP).

Link-state routing protocols focus less on the number of hops and more on the state of a connection. They maintain a map of the entire network and calculate the best path based on the state of the links between routers. Link-state routing protocols are typically more accurate and faster to converge than distance-vector protocols, but are more complex to implement.The Open Shortest Path First (OSPF) and Intermediate System to Intermediate System link-state routing protocols are examples (IS-IS).

Hybrid routing protocols exhibit characteristics of both distance-vector and link-state protocols. They combine the best features of both to provide a more efficient and accurate routing solution. Examples of hybrid routing protocols include Enhanced Interior Gateway Routing Protocol (EIGRP) and Border Gateway Protocol (BGP).

Learn more about Border Gateway Protocol (BGP) here:

https://brainly.com/question/29349611

#SPJ4

can you set your default file permissions to 644 and at the same time have your default directory permissions set to 744? why or why not?

Answers

644 - The owner can read and write, but the group/others can only read. Here are some instances of directory permissions: 777 - everyone may read/write/search. 755 - The owner has the ability to read/write/search, whereas others and groups can only search.

What are the file permissions by default on a system with umask 471?

The system sets the permissions on a text file to 666, which enables read and write access to the user, group, and others, and to 777 on a directory or executable file by default. Permissions of 644 indicate that the file's owner has read and write access, whereas group members and other system users only have read access. rw-r—r— (644) — Only the user has read and write access; the group and others can only read. -rwx——— (700) — Read, write, and execute rights are only granted to the user. -rwxr-xr-xr-x (755) The user has the ability to read, write, and execute; the group and others can only read and execute. The root user's default umask is 022, which results in default directory permissions of 755 and default file permissions of 644. The default permissions for directories are (rwxrwxrwx) 0777, while for files they are 0666. (rw-rw-rw).

Learn more about directories  from here;

https://brainly.com/question/7007432

#SPJ4

given the initial tables in our example database, the organization would like to remove a playlist. what order should the table data be deleted from?

Answers

The name of the table, the column's name, the column's data type, and the size are all necessary for creating tables ( size is used to define the maximum length of data that can be input into the column).

Which of the following scenarios would benefit from an outer join?

When you want the output of the query to include both the matching and nonmatching rows from both tables, a full outer join is helpful.

How are all the records from the left and right tables joined together?

All records that match either in the left (Table1) or right (Table2) table are returned by the Full Join or Full Outer Join.

To know more about data visit:-

https://brainly.com/question/29774443

#SPJ4

you want to get a list of all ports on your switch that are currently trunking. which command should you use?

Answers

To view a list of all switch ports that are presently trunking, use the show interface trunk command.

What command creates a port to trunk port?

The switchport mode trunk command can be used to setup a switch port at one end of a trunk link. This command switches the interface into permanent trunking mode.

In a Cisco switch command, how can I check the trunk port?

Check whether the peer and local native VLANs match using the show interfaces trunk command. VLAN leaking happens if the native VLAN on both sides is different. If a trunk has been established between switches, you can verify it with the show interfaces trunk command. Configure trunk links statically if possible.

To know more about trunk command visit :-

https://brainly.com/question/29315119

#SPJ4

What is a potential benefit of modeling an organization using paas

Answers

PaaS, or Platform as a Service, is a cloud computing model that provides customers with a platform for developing, running, and managing their applications and services.

What is PaaS?

PaaS, or Platform as a Service, is a cloud computing model that provides customers with a platform for developing, running, and managing their applications and services. PaaS is designed to abstract the underlying infrastructure and provide a platform for customers to focus on their application development and deployment without having to worry about managing and maintaining the underlying hardware and software.

PaaS, or Platform as a Service, is a cloud computing model that provides customers with a platform for developing, running, and managing their applications and services.

One of the potential benefits of modeling an organization using PaaS is that it can help organizations save time and resources by eliminating the need for them to manage and maintain the underlying infrastructure required for running their applications. This can be especially beneficial for organizations that are just starting out or are operating with limited resources, as they can leverage the expertise of the PaaS provider to manage the infrastructure, freeing up their own resources to focus on developing and running their applications.

Another benefit of using PaaS is that it can provide organizations with a more flexible and scalable infrastructure. This is because PaaS is typically built on top of a cloud infrastructure, which allows organizations to dynamically scale their resources as needed, without having to invest in additional hardware or software. This can help organizations quickly and easily adapt to changing demands and growth, without having to worry about the cost and complexity of managing their own infrastructure.

Learn more about Paas click here:

https://brainly.com/question/28128247

#SPJ4

wlan access points act as a between wireless and wired networks? 1 point router gateway bridge switch

Answers

An access point is a component that establishes a WLAN, or wireless local area network, typically in a workplace or sizable structure.

Do wireless access points function as modems or routers?

To access the Internet, a modem is required. A router is positioned between a modem and a switch or hub and serves as a gateway to the computer network. A switch connects the router to devices like a desktop, laptop, and access point.

A router or a WLAN?

Computers can connect to the WLAN using WLAN ports, which are hardware. One might imagine WLAN ports as a router.

To know more about access point visit :-

https://brainly.com/question/29743500

#SPJ4

Answer:

Bridge

Explanation:

What are the three main purpose of an operating system?

Answers

An operating system is a piece of software that controls how apps, programs, and hardware components engage with one another and with computer hardware.

What are an operating system's three essential roles?

All of the hardware and software are under the jurisdiction of the computer's operating system (OS). It serves core tasks such addressing input and output, manipulating files, memory, and processes, and controlling peripheral devices like disk drives and printers.

What three different operating systems are there?

Examples of operating systems that let users utilize services like Microsoft Office, Notepad, and games on a computer or mobile device include Windows, Linux, and Android. To execute simple programs like browsers, at least one operating system must be installed on the computer.

To know more about operating system visit:

https://brainly.com/question/14789682

#SPJ4

the cards used with mobile phones today are a special type of smart card. a. nas b. raid c. san d. sim

Answers

The SIM cards used with mobile phones today are a special type of smart card. In this case Option D is correct

Except when you get a new phone and the card needs to be transferred from the old one to the new one, along with the phone's stored data, IM (Subscriber Identity Module) cards are probably not something you think about very often.

The cards themselves are plain plastic pieces with silicone chips on them, similar to those found in credit cards and hotel key cards, which contain processor and memory circuits that enable them to store up to 256 KB of digital information.

An essential function of SIM cards in mobile and telecommunications technology is as follows: Phone companies can accurately measure usage and charge because they can route calls to the appropriate device for each person and link a physical device with the owner's account.

To know more about  SIM cards here

https://brainly.com/question/14100139

#SPJ4

what is the name for an electronic module that responds to requests from the central processor, by sending device-specific control signals to an i/o device?

Answers

Input/ output regulators admit input and affair requests from the central processor, and also shoot device-specific control signals to the device they control.

They also manage the data inflow to and from the device.

What's an IO device regulator?

An I/ O regulator connects input and affair( I/ O) bias to the machine system of a central processing unit( CPU). It generally communicates with the CPU and with the system memory over the system machine and can control numerous bias.

What's the part of device regulators and device motorists for input affair device operation?

Device motorists are software modules that can be plugged into an zilches to handle a particular device. Operating System takes help from device motorists to handle all I/ O bias. The Device Controller works like an interface between a device and a device motorist.

Learn more about input /output controller:

brainly.com/question/30116313

#SPJ4

X = (((A AND B) OR (NOT (B OR C))) NAND C)
Draw this logic gates

Answers

Answer:

A B C

\ / \ /

O O

| |

\___/

|

O

|

X

Which command is used to uninstall the Telnet Server Service?

sc delete tlntsvr
sc stop tlntsvr
sc end tlntsvr
sc exit tlntsvr

Answers

Answer:

The command used to uninstall the Telnet Server Service is "sc delete tlntsvr".

describe how an e-mail gets transferred from the sender to the receiver, including the architecture of emails. illustrations are recommended, and make sure to explain each stage in detail - do not copy the whole textbook.

Answers

The process of sending and receiving an email is a complex one.

It starts when a user composes an email and sends it. The email is then sent to the recipient’s email server, which identifies the recipient and sends the email to them.

The architecture of emails involves three parts:

The first part is the user’s email client. This is the software that the user uses to create and send the emails. The second part is the mail server. This is a computer that routes emails from one user to another. The third part is the message transfer agent. This is the software responsible for transferring the emails from one server to another.Once the email arrives at the recipient’s mail server, the recipient’s mail client will then check for new messages and download them. The email is then ready for the recipient to read.

In conclusion, the architecture of emails involves three components, the user’s email client, the mail server, and the message transfer agent.

To know more about email visit:

https://brainly.com/question/28087672

#SPJ4

Question 1:

Define what they do?

Command + B

Command + D

Command G


Question 2:

Select any of the five tools from the toolbar in adobe illustrator.
Explain what the do..

Answers

Answer 1:

Command + B: In Adobe Illustrator, Command + B is a keyboard shortcut used to apply bold formatting to selected text.

Command + D: In Adobe Illustrator, Command + D is a keyboard shortcut used to repeat the last action or command. This can be useful for quickly duplicating elements or repeating a complex series of steps.

Command + G: In Adobe Illustrator, Command + G is a keyboard shortcut used to group selected objects together. Grouping objects allows you to treat them as a single object, making it easier to move, rotate, or manipulate them as a unit.

What is Answer 2?

One of the five tools from the toolbar in Adobe Illustrator is the Selection tool. The Selection tool is used to select, move, and manipulate objects within the document. It is represented by the black arrow icon in the toolbar.

Therefore, When an object is selected with the Selection tool, you can perform actions such as moving, resizing, rotating, or modifying the shape or appearance of the object. The Selection tool is a basic and essential tool for working in Adobe Illustrator, and is used frequently throughout the design process.

Learn more about adobe illustrator at:

https://brainly.com/question/15169412

#SPJ1

write a function that takes a list of numbers (amounts in euros), and returns them converted to dollars. use your answer to the previous question in your answer to this question.

Answers

Some countries like US, Canada, Australia, and a few other nations utilize the dollar($) as their primary form of currency.

The European Union's official money is the Euro, denoted by the symbol .

What is Exchange rate?

An exchange rate is the price at which one currency will be exchanged for another, and it has an impact on international trade and money transfers.

Following is the Python function that takes a list of numbers (amounts in euros) and returns them converted to dollars, assuming an exchange rate of 1 euro to 1.20 dollars:

def euroTodollar(amountsInEuros):

   exchangeRate = 1.20

   amountsInDollars = [amount * exchangeRate for amount in

                                     amountsInEuros]

   return amountsInDollars

To know more about EuroCurrency, visit: https://brainly.com/question/15236898

#SPJ4

according to rfc 2460 guidelines, which ipv6 extension header should appear first when present? question 3 options: hop-by-hop options routing destination options flow label authentication

Answers

RFC 1883 RFC 1883, published in 1995, was the first RFC to specify IPv6, while RFC 2460, published in 1998, replaced it. It was replaced by RFC 8200 in July 2017 though.

What was the purpose of the IPv6 base header's hop limit?

a hop limit The IPv6 packet's maximum allowed hop count before being deleted is indicated by the Hop Limit field. Eight bits make up the size of this field.

What is RFC for IPv6?

Autoconfiguration of IPv6 Stateless Addresses is the outcome. In addition to the technique that combines an interface identification with a prefix to produce a globally scoped address, the RFC also addresses the interaction between routers and hosts utilizing Router Solicitations and Router Advertisements as defined in Neighbor Discovery.

To know more about RFC visit :-

https://brainly.com/question/15570067

#SPJ4

which command will always change the working directory to the parent of the current location?

Answers

The provided directory is replaced as the current working directory by this command. Root, or the first functioning directory, is You receive a list of instructions.

The foundation of command words is what we refer to as "imperative verbs." These are often known as "bossy verbs" since they order another person to perform a task. For instance, the verb eat is used as an imperative in the instruction "Eat your food." When an imperative verb is present, a statement is referred to be an imperative. The provided directory is replaced as the current working directory by this command. The root command, which switches the current working directory to the provided one, is the initial working directory. Root, or the first functioning directory, is You receive a list of instructions. There. As a result, this command switches to the chosen working directory from the current one.

Learn more about Command here:

https://brainly.com/question/29539396

#SPJ4

when converting a photograph from print to digital, it can be helpful to clean the original print or film before scanning. how should this cleaning be done?

Answers

Clean print before scanning: dust with brush/cloth, remove smudges with alcohol/water-soap solution, avoid water. Film negatives: seek professional cleaning.

When converting a photograph from print to digital, it is recommended to clean the original print or film before scanning to ensure that the resulting digital image is of the best quality possible. The cleaning should be done gently and with care to avoid damaging the original print.

Here are some steps for cleaning a print:

Dust the print with a soft brush or microfiber cloth to remove loose dirt and debris.If there are smudges or fingerprints on the print, use a soft, clean cloth and a small amount of isopropyl alcohol to gently remove them.For tougher stains, a solution of distilled water and a small amount of dish soap can be used on a soft cloth to gently clean the print.Avoid using water on the print as it may cause damage.

For cleaning film negatives, it is recommended to seek the assistance of a professional film cleaning service, as attempting to clean the negatives yourself can result in damage.

Learn more about digital image here:

https://brainly.com/question/17239524

#SPJ4

Answer: C.) by using canned air or a soft cloth

Explanation: edge 2023

6. what part of the computer holds data for long periods of time, even when there is no power to the computer?

Answers

In order to store and retrieve data fast, hard disks are nonvolatile storage devices. Physical medium that can store data even in the absence of electricity is known as nonvolatile storage.

What kind of memory has a lengthy retention time for data?

The term "non-volatile memory" (NVM) or "non-volatile storage" refers to a type of computer memory that can continue to hold data even after the power is turned off. Volatile memory, on the other hand, requires ongoing power in order to preserve data.

Where does data reside in a computer?

All of the data, including applications, music, videos, images, and files that the user wants to keep is stored on a hard drive or solid state drive. Additionally, secondary storage can be read/write CDs, DVDs, and other removable, external media storage devices like flash drives.

To know more about nonvolatile storage devices visit :-

https://brainly.com/question/13361466

#SPJ4

it is generally more difficult to make changes to the of an information system than to the database itself. group of answer choices programs software memory procedures hardware

Answers

Changes to an information system's procedures are typically more complex to implement than changes to the database itself.

Which of the following elements of an information system causes the most organizational disturbance and is the most difficult to change?

The arrangement of an information system's components is done thus to minimize organizational disturbance and ease of change. Data, software, hardware, processes, and people. The easiest things to alter are on the computer side, whereas the most difficult are on the human side.

Is ordering additional hardware harder than getting or creating new programs?

It is more challenging to acquire or create new programs than to purchase more hardware. The least amount of organizational disturbance occurs when more hardware is ordered compared to when the other four elements of an information system are changed.

To know more about information system's  visit :-

https://brainly.com/question/28945047

#SPJ4

Question :-

It is generally more difficult to make changes to the ________ of an information system than to the database itself.

A) software

B) hardware

C) programs

D) procedures

E) memory

In cell H6, use the IF function to create a formula that will subtract $50 from the cost of the instrument on the same row is percussion, and will return the full cost if it isn’t percussion

Answers

The IF function in Microsoft Excel allows you to perform a logical test and return a result based on whether the test evaluates to TRUE or FALSE.

How you can use the formula in cell H6?

In this case, you want to subtract $50 from the cost of the instrument if it is percussion, and return the full cost if it isn't. To do this, you can use the following formula in cell H6:

=IF(G6="Percussion", F6-50, F6)

Here's what each part of the formula does:

   G6 is the cell that contains the type of instrument, which we are testing to see if it is "Percussion".

   F6 is the cell that contains the cost of the instrument.

   If G6 is "Percussion", the formula subtracts 50 from F6, giving us the discounted cost.

   If G6 is not "Percussion", the formula returns the full cost in F6 without any discount.

To learn more about Microsoft Excel, visit: https://brainly.com/question/24749457

#SPJ4

cd-rom discs and dvd-rom discs are optical discs that come prerecorded with commercial products. a. rewritable b. read-only c. recordable d. write-only

Answers

The correct option is (b) read only

CD-ROM (Compact Disc Read-Only Memory) and DVD-ROM (Digital Versatile Disc Read-Only Memory) discs are optical discs that come pre-recorded with commercial products. These discs are designed to be read-only, which means that the data on them cannot be changed or erased. The information on a CD-ROM or DVD-ROM disc is permanently recorded onto the disc during the manufacturing process, and once the disc is created, the data cannot be modified. This makes CD-ROM and DVD-ROM discs ideal for distributing large amounts of data, such as software applications, games, and video content, as they provide a reliable and cost-effective way to distribute and store digital information. The read-only nature of these discs also makes them more durable and resistant to wear and tear, as they cannot be damaged or erased through normal use.

To know more about compact discs visit:

https://brainly.com/question/29340792

#SPJ4

Other Questions
Equation that represents the graph below: What implies that congress has powers beyond those expressed in the first 17 clauses of article i, section 8? How fast must a 20.0kg child be moving on her tricycle to have the same momentum as a 1.20 x 103 kg car traveling at 2.00m/s? A model rocket is launched with an initial upward velocity of67m/s . The rocket's height h (in meters) aftert seconds is given by the following. h=67t-5t^(2)Find all values of for which the rocket's height is 30 metersRound your answer(s) to the nearest hundredth.(If there is more than one answer, use the "or" button.) What was the three types of vault that were used What are five things you want to convey about yourself in your personal statement?Be specific and this is about college. when would we expect to see undesired or unplanned inventory decumulation? Your company has a Microsoft 365 E5 subscription that contains a user named Admin1. Admin1 is a global administrator.You need to ensure that Admin1 can create insider risk management policies.What should you do?Select only one answer.1. From the Microsoft 365 admin center, deploy an add-in.2. From the multi-factor authentication (MFA) settings, enable MFA for Admin1.3. From the Microsoft Purview compliance portal, add Admin1 to another role group.4. From the Microsoft 365 admin center, configure the Security & privacy org settings. a mission statement answers which of the following questions? group of answer choices what business are we in? what are our goals? how can we serve our target markets? what do we want to become? which is our market position? On the grid, draw the graph of y+2x=6 for values of x from -2 to 4 producer tina has recently received many requests for cell phone coverage from auto insurance customers. she feels that this type of coverage could be inexpensive for the insurer to develop but could possibly attract youthful policyholders. tina should discuss her product innovation ideas with the insurer's i need someone help with this assignment its due tomorrow please help Consider the points A = (0, 0), B = (1, 0) and C = (0, 1). Now choose a random point (X, Y ) uniformly from the union of the line segments AB and AC. Find Cov(X, Y ) if fuel consumption is 80 pounds per hour and groundspeed is 180 knots, how much fuel is required for an airplane to travel 460 nm? The research paper is to be 6 pages in length, written in APA style with a cover sheet and references. In this paper you should explain the development of a nursing informatics program which you would like to use in your work environment, to expedite your workplace function and/or hospital function for nurses to battle COVID-19. When doing this paper you may pick some of the following 8 items as topics for your paper. Remember these are only suggestions. Please ensure that your topic will be in relation to COVID-19. If you have another topic, please let your instructor know.Suggestions:1. The future of nursing and health care informatics following COVID-19.2. Patient confidentiality: Problems with security and nursing informatics.3. Potential of changing HIPAA Laws in relation to Nursing Informatics.4. Emerging knowledge and Nursing Informatics surrounding COVID-19.5. Nursing informatics utilized in nursing roles, skills and competencies.6. Utilizing Nursing informatics in evidence-based practice.7. Nursing informatics, patients and nurses roles in Telehealth during and post COVID-19.8. Potential loss of privacy and hacking of Electronic Medical Records (EMR) The following dot plots show the number of hours of sleep employees got before a major sale at two stores. Each dot represents a different employee.Complete the comparison of the typical hours of sleep.In general, the employees at got more sleep, with of sleep per employee. What is the role and influence of the news media in American politics? What were some of the reasons on why Egypt became a colony of the British Empire during the Age of Imperialism in World History? 11. Mr. Lee made finding the zeros of the polynomial function h(x) = x(x-4) (x + 2). He stated thatthe zeros of this polynomial are x = 1, x = 4, x = -2. Explain his error. (DOK3) a father wants to buy toys for his daughter and his son. he wants to spend at least $25 on each child. if his overall budget to spend on both kids no more than $1 50, what is one possible combination of money the father can spend on each of his children for toys?