When is a table the most effective way to present information?
A. When you want to show the parts of a whole.
B. When you want to make many details available in an organized
way.
OC. When graphs are more expensive to create.
D. When you want to show how parts fit together.

Answers

Answer 1

The most effective way to present information in a table is when you want to make many details available in an organized way. (Option B)

What is a table in database management?

Tables are database objects that hold all of the information in a database. Tables logically arrange data in a row-and-column structure comparable to spreadsheets. Each row represents a distinct record, and each column represents a record field.

A table in Excel is a rectangular range of data that has been defined and designated in a certain way. To demonstrate, consider the following two rectangular data ranges. Both ranges contain identical data, but neither has been classified as a table.

Learn more about table  at:

https://brainly.com/question/12151322

#SPJ1


Related Questions

describe at least two different ways to initialize a single dimensional array of size 4. give an example.

Answers

A group of identically data-typed elements that are stored in a linear arrangement under a single variable name constitute a one-dimensional array.

What is single dimensional array example?

One of Array's most straightforward forms is this one. Both its definition and application in programs are fairly simple. A One Dimensional Array is a very practicable sort of Data structure since the values it stores may be initialized and changed with ease.

where,

Array name is equal to the 1D array's name.

Determines how many elements are in the array using array size

The syntax of initialization

The declaration syntax of the 1D Array is simply modified by adding a list on the right side. In plain English, we just allocate values to the defined 1D array according to the array size supplied.

To Learn more About one-dimensional array Refer To:

https://brainly.com/question/12976375

#SPJ4

capture the screen shots of connecting to the chinook database and listing the tables. each command must have /* your name today's date */ proceeding each command

Answers

INSERT INTO table name, indicating both the column names and the values to be added (column1, column2, column3, ...).

A systematic collection of electronically accessible data is referred to as a database in computing. Small databases can be kept on a file system, whereas large databases are kept on computer clusters or in the cloud. Database design takes into account a variety of factors, including data modeling, efficient data representation and storage, query languages, security and privacy of sensitive data, and distributed computing difficulties including concurrent access and fault tolerance. A database management system (DBMS) interacts with applications, end users, and the database itself in order to gather and manage data. The DBMS software also contains the main management tools for the database. The term "databases" refers to both the collection of applications and the database management system.

Learn more about Databases here:

https://brainly.com/question/29763725

#SPJ4

while entering information into blockworks, the input screen for 1099-div can easily be added to the forms list by:\

Answers

1. Navigate to the Forms Library in the Blockworks dashboard.

2. Select the "Add Form" button.

What is Navigate?

Navigate is an online platform that provides students with personalised learning resources and guidance. It helps students to develop the skills they need to succeed in their studies and to build a successful career. It provides access to an extensive library of learning resources, including online courses, tutorials, and practice tests. It also provides tools to track progress and manage study schedules, as well as access to mentors and career advisors.

3. Select the 1099-DIV form from the list of available forms.

4. Complete any additional information requested (e.g. the form year, filing instructions, etc.)

5. Click "Save" to save the form.

6. The 1099-DIV form is now added to the Forms Library and is ready for use.

To learn more about Navigate

brainly.com/question/20380753

#SPJ4

Two motors m1 and m2 are controlled by three sensors s1,s2 and s3 one motor s2 is to run any time all three sensors are on the other motor is to run whenever sensor s2 or s1 but not both are on and s3 is off for all sensor combinations where m1 is on m2 is to be off except when all three sensors are off and then both motors must remain off. Design a logic circuit for this problem and all steps

Answers

Answer:
s1 -> OR gate -> AND gate (with s3 as the other input) -> m2 s2 -> OR gate (with s1 as the other input) -> AND gate (with s3 as the other input) -> m2 s3 -> AND gate (with output of OR gate as the other input) -> m2 s1,s2,s3 -> AND gate -> NOT gate -> AND gate (with output of AND gate for m2 as the other input) -> m1

Explanation:

let's design a logic circuit for controlling motors m1 and m2 based on the sensor inputs s1, s2, and s3.

First, let's start with the first condition: motor m1 must run whenever all three sensors s1, s2, and s3 are on. To do this, we can use an AND gate with all three sensor inputs as inputs. The output of this AND gate will be the control signal for motor m1.

Next, let's move on to the second condition: motor m2 must run whenever sensor s2 or s1 are on, but not both, and s3 is off. To accomplish this, we can use an OR gate for sensor s1 and sensor s2, with an AND gate having the output of OR gate and s3 as inputs. The output of this AND gate will be the control signal for motor m2.

Finally, the third condition: for all sensor combinations where m1 is on, m2 is to be off except when all three sensors are off and then both motors must remain off.

To accomplish this, we can use a NOT gate on the output of the AND gate for motor m1. The output of this NOT gate will be connected to an AND gate with the output of the AND gate for motor m2 and an OR gate with s1, s2, and s3 as inputs.

So, the final logic circuit will look like: s1 -> OR gate -> AND gate (with s3 as the other input) -> m2 s2 -> OR gate (with s1 as the other input) -> AND gate (with s3 as the other input) -> m2 s3 -> AND gate (with output of OR gate as the other input) -> m2 s1,s2,s3 -> AND gate -> NOT gate -> AND gate (with output of AND gate for m2 as the other input) -> m1

And that's it! A fun and easy way to control motors m1 and m2 based on sensor inputs s1, s2, and s3.

Hi, I'm doing Code HS right now and I need someone who understands python to help me write a working code, I've tried numerous times and it keeps showing incorrect on CodeHS.

These are the directions for "Exclamation Points"

Words are way more edgy when you replace the letter i with an exclamation point!

Write the function exclamations that takes a string and then returns the same string with every lowercase i replaced with an exclamation point. Your function should:

Convert the initial string to a list
Use a for loop to go through your list element by element
Whenever you see a lowercase i, replace it with an exclamation point in the list
Return the stringified version of the list when your for loop is finished

Thank you for your time!!

Answers

Answer:

Here's a Python code that should accomplish the task described in the directions:

Copy code

def exclamations(s):

   s = list(s)

   for i in range(len(s)):

       if s[i] == 'i':

           s[i] = '!'

   return ''.join(s)

This code first converts the input string to a list so that individual characters can be accessed and modified. Then, it uses a for loop to go through each element of the list (in this case, each character of the original string). If the current character is a lowercase i, it is replaced with an exclamation point. Finally, the modified list is converted back to a string and returned.

The key is to know that the string type in python is immutable and you can't modify it by index like you do with list, you need to convert it into a list to be able to modify its elements.

It's also good to check if the string is converted to lowercase before the comparision, this way you could replace all the possible 'i' that could be in uppercase too.

Explanation:

What import option should you choose when you want to import a premiere profile and create a sequence with each of the premiere pro layers as individual tracks

Answers

The import option that  you choose when you want to import a premiere profile and create a sequence with each of the premiere pro layers as individual tracks is Import As: Sequence

What is Import As: Sequence?

This option allows you to import a Premiere Pro project or sequence into another project and have the layers automatically separated into individual tracks in the new sequence. This allows you to have more flexibility in editing and manipulating the individual elements of the imported sequence.

Therefore, In Premiere Pro, to import a project or sequence as a sequence, you can go to File>Import and then select the project or sequence file. In the options, you will see an "Import As" dropdown menu. You should select "Sequence" from the options.

Learn more about  import from

https://brainly.com/question/23639237

#SPJ1

What information does Gregory's team need to have on hand as they're setting prices for each item in their company's new line of shoes? Choose all that apply.

Answers

Answer:

Gregory's team need to have on hand:

Explanation:

The cost of materials and labor to produce each shoeThe desired profit margin for the companyThe prices of similar products offered by competitorsThe target demographic and their willingness to pay for the productThe expected demand for the productThe marketing and promotional expenses associated with the productAny additional costs such as taxes, duties, or tariffs that will affect the final price.

The information that the Gregory's team will need to have on hand as they are the setting prices for each item in their company's new line of shoes are the current level of the market's familiarity and preference for his company's brand.

What is price?

Price could be described as the means of the exchange the value of goods or the services in terms of the money. Perceived value of the differentiating factors for his company's shoes that the competitors' prices on similar items.

It must be noted that the Price of the product or the service serves as the thing that the seller compare with the value of the product or the service just before making the decision of making the purchase from the seller.

Therefore, The information which the Gregory's team has been need to have on hand is that the prices of company increased.

Learn more about price on:

https://brainly.com/question/19091385

#SPJ2

The question seems to be incomplete the complete question will be

What information does Gregory's team need to have on hand as they're setting prices for each item in their company's new line of shoes? Choose all that apply.

a. Payment systems currently available at retailer locations

b. Current level of the market's familiarity and preference for his company's brand

c. Perceived value of differentiating factors for his company's shoes

d. Competitors' prices on similar items

1 Write the stops to insert a new slide in power point 2 Write the steps to select a layout for a slide 3. What is the use of font box 4. What is the use of paragraph box 5. What is the use of editing box. 6 Write at least four font box member 7. Write three alignment name that is found on paragraph box. S. Write at least three name of ready-made shapes that is found under drawing box. 9 What is insen menu and its use in power point 10 Write the steps to add header and lonter to the selected slide​

Answers

Answer:

1.In the slide thumbnail pane on the left, click the slide that you want your new slide to follow.

On the Home tab, click New Slide.

In the New Slide dialog box, select the layout that you want for your new slide. Learn more about slide layouts.

Select Add Slide.

As a cybersecurity consultant, you were part of a team hired to conduct pen testing to evaluate the security of your client’s IT infrastructure. Why is it critical to perform pen testing on the internal network of your client prior to production implementation?

Answers

Penetration Testing also known as Ethical hacking is a proactive measure taken by companies or organizations to protect their systems from hackers.

What happens in the process?

In this process, they generally attacks has been launched against the system by the professionals to the ascertain the weaknesses, vulnerabilities, and strengths of the software.

Recommendations on the areas just to improve are now made to the clients. Calming client's fears would entail making them understand the scope of testing.

Therefore, Penetration Testing also known as Ethical hacking is a proactive measure taken by companies or organizations to protect their systems from hackers.

Learn more about organizations on:

https://brainly.com/question/16296324

#SPJ1

What is the name of the method used to start a thread execution? Select one:
a. Init();

b. Resume();

c. Start();

d. Run();?

Answers

The name of the method used to start a thread of execution is Start();. The correct option is c.

What is a thread of execution?

A thread of execution in computer science is the shortest series of programmed instructions that may be controlled independently by a scheduler, which is usually part of the operating system. Threads and processes are implemented differently in different operating systems.

The start() method instructs this thread to start execution; the Java Virtual Machine invokes the thread's run method.

Therefore, the correct option is c. Start();

To learn more about the thread of execution, refer to the link:

https://brainly.com/question/8817970

#SPJ1

a network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. to prevent users from circumventing the firewall rules, which of the following windows settings should the administrator locks to prevent them from being changed?

Answers

Failure of the data server is another frequent reason for connectivity issues. Router issues could possibly be to fault.

Any piece of equipment malfunctioning could cause a full network breakdown. In the absence of a backup or redundant system to take over, operations that depend on connectivity may stop working entirely. The arduous process of connecting several network components together, which may need the use of routers, switches, and gateways, is referred to as "network connection." More details are available in Future Opportunities for Personalized Online Global Learning. What common causes of poor network quality exist? Poor network quality may be caused by the following elements: network is slow. Hardware used for networking, such as routers, is overworked. Failure of the data server is another frequent reason for connectivity issues. Router issues could possibly be to fault.

Learn more about Network connection here:

https://brainly.com/question/30260223

#SPJ4

find transformation matrix to rotate the line which is parallel to y-axis and passing through point (0, 4, 0), by an angle 0 = 45°

Answers

The transformation matrix to rotate the line which is parallel to y-axis and passing through point (0, 4, 0), by an angle 0 = 45° is

| cos(45) 0 sin(45) |

| 0 1 0 |

|-sin(45) 0 cos(45) |

How do you find transformation matrix to rotate the line which is parallel to y-axis?

A rotation matrix can be used to rotate a point or vector in a 3D space. To rotate a line, you would need to rotate the points on that line.

To find the transformation matrix for a 45-degree rotation about the x-axis, you can use the following matrix:

Copy code

| 1 0 0 |

| 0 cos(45) -sin(45) |

| 0 sin(45) cos(45) |

This matrix can be applied to a point (x, y, z) by multiplying it as follows:

Copy code

| x' | | 1 0 0 | | x |

| y' | = | 0 cos(45) -sin(45) | * | y |

| z' | | 0 sin(45) cos(45) | | z |

However, this matrix will rotate the point about x-axis, but you need to rotate about y-axis.

To find the transformation matrix for a 45-degree rotation about the y-axis, you can use the following matrix:

Copy code

| cos(45) 0 sin(45) |

| 0 1 0 |

|-sin(45) 0 cos(45) |

This matrix can be applied to a point (x, y, z) by multiplying it as follows:

Copy code

| x' | | cos(45) 0 sin(45) | | x |

| y' | = | 0 1 0 | * | y |

| z' | |-sin(45) 0 cos(45) | | z |

Keep in mind that this matrix will rotate the point about y-axis, if you want to rotate about x or z axis you need to use different matrix.

Therefore, the correct answer is as given above

learn more about transformation matrix: https://brainly.com/question/16736738

#SPJ1

3. In relationship to the four ways of knowing, explain how "authority" and "science" may simultaneously operate.

Answers

Answer:

The summary of given question is summarized in the below segment.

Explanation:

Authority was among the most prevalent means of information acquisition. It entails the development of innovative concepts that the appropriate authorities have said are correct.

Individuals prefer to trust knowledge like this one that no one has any time to investigate every deep understanding we choose to gain via authoritative autonomously.

Numerous scientists' hypotheses were affirmed to be true. But when such statements are proven to be incorrect, they merely lead to misconceptions and therefore also impede the growth of these kinds of fields.

A fileless malicious software can replicate between processes in memory on a local host or over network shares. What other behaviors and techniques would classify malware as fileless rather than a normal virus? (Select all that apply.

Answers

Malware that is fileless as opposed to a typical virus would exhibit the behaviors and methods listed below. uses thin shell code and low-observability attack methods

What type of malware replicates over a network?Worms. Worms, one of the most popular forms of malware, spread across computer networks by taking advantage of flaws in the operating system. A worm is a standalone application that copies itself to infect further computers without any human intervention.Worms are computer programs that can copy themselves from one system to another without using a host file. The spread of a host file that is infected by a virus is necessary for its infection. A self-replicating program is referred to as a worm. Without a host program, it is self-contained. Without any assistance from the user, the application makes the copy and makes it run. For the purpose of spreading to other computer systems, worms frequently use network services.

To learn more about worm refer to :

https://brainly.com/question/23463888

#SPJ1

wans connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single organization's network, whereas lans use networking devices, such as routers and modems, to connect networks spread over a wide geographical area.

Answers

Wans connect nodes on a single network in a limited area, including workstations, servers, printers, and other devices.

A server is a piece of hardware or software (computer program) used in computing that provides functionality to other applications' "clients," which are other programs or devices. This design is known as the client-server model. Commonly referred to as "services," the tasks that servers might provide include things like doing computation for a client or transferring data or resources among numerous clients. A single client or server can accommodate a large number of clients. A client process may run on a single device or may connect over a network to a server process running on a different device. Database servers, file servers, and mail servers are the three most used types of servers.

Learn more about Client-server model here:

https://brainly.com/question/30019595

#SPJ4

7.2.5 height in meters
Can someone tell me what’s wrong and the correct code please

Answers

Answer:

72.5 m

Explanation:

7.2.5 is wrong

because every possible number can't have each decimal

You are designing a high availability solution for a business-critical web app that will be deployed to multiple Azure regions.

You need to recommend a high availability solution that meets the following requirements:

Provides users a single hostname to access the web app.

Load balances HTTP traffic across regions.

Route users to the web app instance that has the lowest latency.

Which high availability solutions should you recommend?

Select only one answer.

Azure Front Door

Azure Traffic Manager

Azure Application Gateway

Azure Load Balancer

Answers

Azure Front Door should be recommended as a high availability solution that meets the following requirements:

1. Provides users a single hostname to access the web app.

2. Load balances HTTP traffic across regions.

3. Route users to the web app instance that has the lowest latency.

What is the Azure Front Door about?

Azure Front Door is a global, scalable, and secure service that provides a single entry point for web applications. It supports global load balancing, automatic failover, and custom routing rules, making it an ideal solution for a business-critical web app that needs to be deployed across multiple Azure regions.

Therefore, Azure Traffic Manager, Azure Application Gateway, and Azure Load Balancer are also high availability solutions that can be used to load balance traffic and route users to the web app instance that has the lowest latency, but Azure Front Door is more suited for this scenario as it provides a single hostname and it's a more comprehensive service that includes global load balancing and custom routing rules.

Learn more about Azure   from

https://brainly.com/question/29433704

#SPJ1

Tabble Convert
Question 6 (1 point) ✓ Saved
When working together on a group project, rather than editing someone elses work then
you can add
so that the reader can take note of your thoughts on
their work.

Answers

Since nearly all co-authored projects require participants to agree on what should be written and how to execute this writing, collaborative writing by its very nature necessitates more communication than solitary work.

How does co-author analysis work?

A technical document's co-authorship is an acknowledged indication that two or more authors or organisations were involved. Co-authorship analysis is still frequently employed to comprehend and evaluate scientific collaboration patterns in spite of the controversy around its meaning and interpretation.

To share the workload, many writers choose to collaborate. Having a partner with whom to brainstorm and share ideas with might be beneficial.

For some people, co-authoring works brilliantly as a solution. The definition of collaboration is "to cooperate with another individual or group to achieve or do something." Be a co-author of (a book, paper, or report) is the definition of co-authoring.

To learn more about communication,

https://brainly.com/question/28082230

#SPJ1

I am used to relocate the steering wheel to a more comfortable position for driving. What
am I? How does it help me as the driver?

Answers

You are likely a person with a physical disability, and you are using a steering wheel knob or spinner.

This device is an attachment that attaches to the steering wheel of a vehicle, allowing the driver to use their hands to steer the wheel more easily. The knob or spinner is typically located at the top of the steering wheel, and the driver can grip it with one hand to turn the wheel. This can make it easier for the driver to steer the vehicle, especially if they have limited hand strength or mobility.

What is the steering wheel  about?

It can help you in many ways, it can make it easier to steer the vehicle if you have limited hand strength or mobility, it can also help you to avoid discomfort or pain while driving, it can also help to improve the overall control of the vehicle and it can also make it easier to perform maneuvers such as parallel parking or making tight turns.

Therefore, It's important to note that, before installing or using this device, you should check the laws in your country and region to make sure that it is allowed, and also you should check with the vehicle manufacturer or a qualified mechanic to ensure that the device is compatible with your vehicle and it is installed properly.

Learn more about  steering wheel from

https://brainly.com/question/14183688

#SPJ1

Which balance shows the amount of money you can use now

Answers

Kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk is informant to duck

Hi, I'm working on "How many Names" in CodeHS(python) right now and am stuck on some code. Is there anything I need to add or change or remove?

Here are the directions:

Some people have just a first name and a last name. Some people also have a middle name. Some people have five middle names.

Write a program that asks the user how many names they have. (If they have a first name, two middle names, and a last name, for example, they would type 4.) Then, using a for loop, ask the user for each of their names. Store the names in a list.

Then, use slices to separately print the person’s first name, middle name(s), and last name.

My Code is this:

fullname = " "
names = int(input("how many names do you have: "))
for i in range (names):
cheese = input("what is your name: ")
fullname = fullname +" "+ cheese
print ("First name:" + str(cheese))
print ("Middle names:" + str(cheese))
print ("Last name:" + str(cheese))

Answers

Your code correctly prompts the user for the number of names they have and then uses a for loop to collect their names and store them in the variable "fullname". However, you will have to do some adjustments to print each of the user's names as their first name, middle name(s), and last name.

One way to do this is to store each name as an element in a list and then use list slicing to access the first, middle, and last elements. Here's an example of how you can modify your code to achieve this:

names = int(input("how many names do you have: "))

name_list = []

for i in range (names):

cheese = input("what is your name: ")

name_list.append(cheese)

print("First name: " + name_list[0])

print("Middle names: " + " ".join(name_list[1:-1]))

print("Last name: " + name_list[-1])

In this example, the input names are stored in a list called name_list. By using list slicing and the join() method you can print each part of the name separately.

WHICH OF THE FOLLOWING IS NOT A RISK YOU FACE WHEN OPENING AN UNKNOWN ATTACHMENT CONTAINED WITHIN AN EMAIL?

Answers

Some of the unexpected or suspicious email attachments should never be opened. This is not a risk that you can face while opening an unknown attachment contained within an email.

What are the risks when opening unknown email attachments?

Opening an infected attachment can have serious consequences. It may launch a keylogger that steals personal information such as usernames and passwords, takes periodic screenshots, grabs sent emails, or harvests credit card numbers and bank details.

Email attachments can be used to phish for personal information or to deliver ransomware. In order to protect yourself and your data, it is important to be careful when opening email attachments.

Make sure that you trust the sender and that the file is from a reputable source before you open it.

To learn more about Emails, refer to the link;

https://brainly.com/question/24688558

#SPJ1

Help Build these steps please

Q1. Build a query that produces a list of the station numbers from every row in the relation (hint: 28000 rows, 1 column)

Q2. Build a query that produces a list of unique station numbers in the relation (hint: 6368 rows, 1 column)

Q3. Build a query that produces a list of all tuples ("rows") from the year 1992 where there was any snow depth reported (hint: 54 rows)

Q4. Build a query that produces a list of all tuples where it the temperature was outside of the range of 0-100 (inclusively) (hint: 1093 rows)

Q5. Build a query that produces a list of unique station numbers that have reported a temperature over 100 (hint: 7 rows, 1 column)

Answers

To build a query, the SELECT clause's most basic SQL syntax is as follows: SEARCH FOR * IN TABLE NAME; This SQL command will pick out every row and every column from the table.

What is a query?

A graphical user interface for writing SQL queries is offered by Query Builder. To create SQL statements, you can drag and drop various tables, views, and columns into a visual designer.

Using Query Builder, you can complete the following tasks: working with SQL code or a query's graphical representation. The Data Tools Platform (DTP) SQL.

Therefore, the SELECT clause's most fundamental SQL syntax to construct a query is as follows: PUT A * IN THE TABLE NAME; With this SQL query, the entire table's rows and columns will be selected.

To learn more about the query, refer to the link:

https://brainly.com/question/29575174

#SPJ1

A technician is working at a tire installation shop and is constantly using an impact gun that produces 100 decibels. What type of protection is recommended to be worn?

Answers

Answer:50

Explanation: saw it in my dreams don't trust but had to put it out there

Python Code to be wriiten:
Will mark as brainliest if correct!
A bunny can hop at most 50 centimetres far. It wants to cross to the other side of the river, but it cannot swim. So the only hope is to hop on the rocks on the river, which are positioned in a straight line. The positions of the rocks are measured from the start location, assuming that the bunny starts at the 0 cm mark. The opposite bank could be treated as a big rock. It is the final rock in the tuple of rocks.

In the Figure below, the rocks are at locations 32, 46, 70, 85, 96, 123, and the opposite riverbank is at location 145.

The bunny will jump as far as it could for each hop. What is the smallest number of jumps it needs to take to reach the other side of the river? For the above example, it needs to make 3 jumps, as shown in the diagram above.

You may assume that there are at most 20 rocks (including the opposite bank).

Write a function rabbit that takes in a tuple representing the locations of the rocks. Your function should return the minimum number of jumps needed, or -1 if it is not possible for the bunny to reach the other side of the river. You may assume that the locations of the rocks in the tuple are valid (bigger than 0) and they are sorted in ascending order.

def rabbit(rocks):
# Fill in your code here

Test Cases:
rabbit((32, 46, 70, 85, 96, 123, 145)) 3
rabbit((40, 70, 150, 160, 180)) -1
rabbit((30, 70, 75, 120, 160, 170, 180, 190, 200, 246, 258)) 7
rabbit((51, 52, 53, 54, 55, 56, 57, 58)) -1
rabbit((50, 51, 101, 102, 152, 153, 203, 204, 254, 255, 305, 306, 356, 357, 407)) 15

Answers

Using the knowledge in computational language in python it is possible Write a function rabbit that takes in a tuple representing the locations of the rocks.

Writting the code:

def rabbit(rocks):

   jumps = 0

   prev = 0

   cursor = 0

   i = 0

   while i < len(rocks):

       rock = rocks[i]

       if rock - prev < 50:

           cursor = rock

           i += 1

           continue

       elif rock - prev >= 50 and prev != cursor:

           jumps += 1

           prev = cursor

           continue

       else:

           return -1

   if i == len(rocks):

       rock = rocks[i-1]

       if rock - prev <= 50:

           jumps += 1

   if jumps == 0:

       return -1

   return jumps

See more about python at brainly.com/question/29897053

#SPJ1

post-mortem
walkthrough
Zion and Luca are members of a development team that recently released a new
video game. They participated in a live discussion panel at GDC to share details
about the design and production process with an audience. Their discussion is an
example of what type of external resource?
(1 point)
game tutorial
<
game wiki
9 of 50
>

Answers

The live discussion panel at GDC that Zion and Luca participated in is an example of a post-mortem, which is a retrospective analysis of a project or product's development process.

What is a Post-Mortem?

A project post-mortem is a procedure used to determine the reasons behind a project failure (or a prolonged period of downtime that negatively impacts business operations) and how to avoid it in the future. This is distinct from a retrospective, which examines both good and bad aspects of a project.

Hence, it can be seen that It is an external resource that can provide insight and lessons learned for others in the industry.

Read more about post mortem here:

https://brainly.com/question/21123962

#SPJ1

Source: United States Geological SurveyWhich of the following best explains the reasons for the similarities and differences between the two land survey systems shown?

Answers

Both systems require geometric calculations to survey property lines. However, the township-and-range system uses simplified calculation to create a more ordered landscape

what are geological survey?

geological survey is the systematic investigation of the geology beneath given piece of ground for the purpose of creating a geological map or model.

type of geological surveying employed depends on scale, purposes, and conditions. Traverse, area, and instrument surveys are the most widespread.

Geological surveys means surveys on the ground for mineral deposits by the proper application of the princi- ples and techniques of science of geology as they relate to the search for and discovery of mineral deposits.

There are three major subdivisions of geology, physical geology, historical geology, environmental geology.

learn more about survey system at

https://brainly.com/question/28346592

#SPJ4

please help me out, 30 pts

Answers

The statement that describes what is happening to cause current to flow

B. Voltage is when current flows from higher to lower potential energy

How to explain the information

The difference in electric potential between two places is referred to as voltage. Due to voltage, current in the wire always flows from greater potential to lower potential.

The voltage of the current is high at the electric source, but as it travels along the wire, it loses strength until it reaches the opposite end of the circuit. This is due to the wire's internal resistance, which results in heat energy and some current loss.

Therefore, the correct option is B.

Learn more about voltage on:

https://brainly.com/question/16791395

#SPJ1

Which of the following is an event? Select 4 options.

a sensor detecting the motion of an earthquake detector

moving a mouse

adding three and four in a program


clicking a mouse button


scanning a credit card when you shop

Answers

Answer: rarer

Explanation:

Write the C++ program that, using specifically created functions for the geometric sequence with the quotient q entered by the user, will:
a.Calculate and print the first 100 elements
b.Calculate and print the sum of the first 100 elementsThe main loop of the program should providing the subsequent elements, printing results of calculations and terminating the program.

Answers

The C++ application that computes and outputs the first 100 elements.

class gfg {

public:

void printNos(unsigned int n) {

   if(n > 0)   {

printNos(n - 1);

cout << n << " ";  }

return; }

};

int main() {

   gfg g;

   g.printNos(100);

   return 0;

}

How do you compute the sum of 1 and 100?

All natural numbers between 1 and 100 add up to 5050. In this range, there are 100 natural numbers in total. Thus, we obtain S=5050 by using this number in the formula: S = n/2[2a + (n 1) d].

How can 100 numbers in an array be printed?

num[num] = num[num-1] +1; to round the previous number up by one before printing it. Now it prints perfectly. if (int a = 0; a > 100; a++) number[100] += number[a]; / add number[a] to result printf("%d\n",number[100]);

To know more about C++ program visit :-

https://brainly.com/question/27018455

#SPJ1

Other Questions
HELP I NEED HELP ASAP Why did the United States negotiate treaties with the Plains Indians? what must you do after writing you're thesis statement? a) write a second thesis statement b) ask questions that the reader must answer for herself c) conclude your essay d) support your thesis with at least three examples The boys completely destroyed that snow fort. What is the adverb? Help i need an esay about why homework can be harmful Su is baking 5 batches each of cookies and cupcakes. The cookies use 2 cups of sugar per batch and the cupcakes use 3 cups of sugar per batch. Write two equivalent expressions using the Distributive Property. Then find how many total cups of sugar are needed.I know the answer is 25 but how would I write the expression. Suppose that Portugal and Austria both produce beer and cheese. Portugal's opportunity cost of producing a pound of cheese is 3 barrels of beer while Austria's opportunity cost of producing a pound of cheese is 11 barrels of beer. By comparing the opportunity cost of producing cheese in the two countries, you can tell that_______has a comparative advantage in the production of cheese and _______ has a comparative advantage in the production of beer. Suppose that Portugal and Austria consider trading cheese and beer with each other. Portugal can gain from specialization and trade as long as it receives more than_______of beer for each pound of cheese it exports to Austria. Similarly, Austria can gain from trade as long as it receives more than _______ of cheese for each barrel of beer it exports to Portugal.Based on your answer to the last question, which of the following prices of trade (that is, price of cheese in terms of beer) would allow both Austria and Portugal to gain from trade?A. 4 barrels of beer per pound of cheese B. 6 barrels of beer per pound of cheese C. 13 barrels of beer per pound of cheese D. 2 barrels of beer per pound of cheese A herbicide is a chemical that kills plants. Which best describes the effect of a herbicide beingapplied to all of the plants in a food web? A.All organisms would be affectedB.Only primary consumers would be affected.C.Producers and decomposers would be the only populations affected.D.Primary and secondary consumers would be affected, but tertiary consumers would not Hello! would you mind helping me out? Among two congruent angles ,one has measure 69,then the measure of other angle is Which is an example of an adage? Taking care of pets is a big responsibility. Eating healthy is important. You can't judge a book by its cover. You should get at least eight hours of sleep every night. Una araa de 75g de masa est suspendida de la telaraa que tejio ponindola en el techo, cmo se muestra en la siguiente figura. cul es el valor de las tensiones en los hilos de las telaraas unidos al techo? what is a force and type of force Please help me find x pls help 100 points helphelp Use the graph of f to describe the transformation that results in the graph of g. Then sketch the graphs of g and f. f(x) = ; g(x) = Part 1 Answer the following questions. Place your responses in the essay box below for Part 1. What type of map is this? Are there any faults on the map? If so, what types? Around the Salt Lake, what is the geologic age of the area and what type of geologic unit is found there? South of Richfield, what type of rock is most prevalent? Which geologic area or rock is the oldest? Which geologic area or rock is the youngest? Are there any intrusive rocks found in Utah? And where? In the Green River and Price area, what fossil fuel would you expect to find there? (GIVING BRAINLYIEST)Write a description of the Federalist Viewswrite at least 15 words answer pleaseeeee ................. Which event made Americans believe that New Mexicans would be loyal toSpain or Mexico over the United States?A. The invasion by the ConfederacyB. The Spanish-American WarO c. The Revolt of 1847D. The Elkins handshake