Answer:ater on, in Chapter 9, you'll learn to put web pages online so anyone with a web ... Every web page you build along the way will be a bona fide HTML document. ... That means that the raw code behind every web page you create will consist entirely ... punctuation marks, and everything else you can spot on your keyboard).
Explanation:
You use the same five shell functions every day and are looking for a way to ensure they are available as soon as you log into your account. What can you do?a. Make them residual system variables.b. Make them permanent environment variables.c. Load them via your login script.d. Make them permanent functions by adding them to the function directory.
Answer:
.c. Load them via your login script.
Explanation:
Given that using functions in shell scripts enhances programming output and login script comprises the functions and statements required to effectively execute at any given time the user logs into their account.
Hence the moment these functions are formulated, they are then executed through a single command statement thereby reducing the time of re-writing another set of code repeatedly in every program.
Therefore, in this case, what you can do is to "Load them via your login script."
plsss help anyone PLSSSSS
Answer:
The answer to this question is given below in the explanation section.
Explanation:
This question is about to write HTML code for the given sub-questions. In each sub-question different scenario is given. So, the answer to these questions is given below in the order they asked.
1. In this question it is asked to write a code of 5 students' name in a paragraph with a different color that make them unique.
<html>
<body>
<p style="color:red;">Student A</p>
<p style="color:blue;">Student B</p>
<p style="color:black;">Student C</p>
<p style="color:orange;">Student D</p>
<p style="color:green;">Student E</p>
</body>
</html>
2. In it, the below is given code show an ordered list of subjects that you're offering.
<html>
<body>
<h2>An ordered HTML list</h2>
<ol>
<li>Introduction to Computing</li>
<li>Communication Skills</li>
<li>Software Designing</li>
</ol>
</body>
</html>
3. The below-given HTML code shows the unordered list of parts that make up the computer.
<html>
<body>
<h2>An unordered HTML list</h2>
<ul>
<li>CPU</li>
<li>RAM</li>
<li>Motherboard</li>
<li>Mouse</li>
<li>Keyboard</li>
<li>Monitor</li>
</ul>
</body>
</html>
For python, Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2
import math
def getResults(r):
return "Volume = {}\nSurface Area = {}".format(round((4/3)*math.pi*(r**3),1), round((4*math.pi)*(r**2),1))
print(getResults(3.5))
I hope this helps!
Consider this function comment. Which of the following options is recommended in your textbook? Computes the area of a cuboid. eparaml width the width of the cuboid eparam2 height the height of the cuboid eparam3 length the length of the cuboid ereturn the area of the cuboid double area(double width, double height, double length) double result - width +height 1ength; return result: A. The comments are adequate to describe the function. B. The lines need to end with semicolons like other C++ statements. C. The parameters should be described more completely. D. The eparaml, eparam2, eparam3 should be just eparam.
Answer:
A. The comments are adequate to describe the function.
Explanation:
C++ programming language comments starts with two forward-slash ("//") and can be written above a code statement or at the right-hand side of the code statements
The comments of the area() function with three parameters width, height, and length are adequate to describe the function as it does not need to end with a semi-colon.
E-mails could possibly cause harm to computers due to which of the following?
A.Allow for misunderstandings
B.Carrying viruses
C.Updating system preferences
D.Allowing for global use
E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.
What is a computer?A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers.
As we know,
You receive emails every day with papers, pictures, or other electronic files attached. These files can occasionally include harmful viruses, Trojan horses, or malware that has been purposefully provided by someone looking to inflict harm or steal confidential personal data.
Thus, E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.
Learn more about computers here:
brainly.com/question/21080395
#SPJ2
This elementary problem begins to explore propagation delay and transmis- sion delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters, and suppose the propagation speed along the link is s meters/sec. Host A is to send a packet of size L bits to Host B
a. Express the propagation delay, dprops in terms of m and s
b. Determine the transmission time of the packet, drans, in terms of L and R.
c. Ignoring processing and queuing delays, obtain an expression for the end-
d. Suppose Host A begins to transmit the packet at time t = 0. At time t = dtrans'
e. Suppose drop is greater than dran . At time t = d, ans, where is the first bit of
f. Suppose dprop is less than dtrans. At time t = dtrans, where is the first bit of
g. Suppose s = 2.5-108, L = 120 bits, and R = 56 kbps. Find the distance m so that dprop equals drans
Answer:
A. dprops = m /s seconds.
B. drans = L / R seconds.
C. delay(end −to−end) = (m /s + L / R) seconds.
D. The bit has just been sent to Host B or just left Host A.
E. The first bit is in the link and has not reached Host B.
F. The first bit has reached Host B.
G. m = 535.714 km.
Explanation:
The transmission time or delay of packets in a network medium is the packet size L, divided by the bit rate R (in seconds). The propagation time or delay is the ratio of the distance or length of the transmission cable, m, and the propagation speed of the cable, S (in seconds).
The end-to-end delay or the Packet delivery time is the total delay in transmission, which is the sum of the propagation delay and the transmission delay.
To get the distance where the propagation delay is equal to the transmission delay;
distance (m) = L /R
= (120/56 ×10^3) 2.5 ×10^8 = 535.714 km
Which of these can be sorted with a bubble sort?
['red', 'blue', 'green', 7]
{41:5,32:10, 20: 234}
[7, 10, 2.5, 1.566]
[1, 2.5, 'book']
Answer:
C
Explanation:
ed 2021
Find the minimum, maximum, and average grade of final exams in sections taught by Todd Smythe.
Answer:
A sample of the statement is written below
SELECT MIN(GRADE), MAX(GRADE), AVG(GRAD), FROM TABLE 2 WHERE TEACHER = "TODD SMYTHE"
Explanation:
To find the Minimum, maximum and average grade of final exams in the sections taught by Todd Smythe. we will write a statement
Using the select to get the required data using the functions ; MIN , MAX , AVG and the WHERE clause for the condition
A sample of the statement is written below
SELECT MIN(GRADE), MAX(GRADE), AVG(GRAD), FROM TABLE 2 WHERE TEACHER = "TODD SMYTHE"
Is this right? I’m not sure
It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet. True False
Answer:
False
Explanation:
would be blocked from server
what is the advantages of your solutions
Answer:
One of the key benefits of using IT solutions is that they provide the opportunity to use the latest technology in the market. This is because the IT solution always offers the best equipment and technologies in the market, and also, they are upgraded at zero additional costs.
Explanation:
What is the definition of trouble shooting.
Handoff points in cross-functional flowcharts are of particular importance to process analysis.A. True B. False
Answer:
True
Explanation:
A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection of text with schema tags into a presentable document that shows data in a way that is pleasant and easily understood.
Answer: language
Explanation:
Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm that is used to place processes of size 115 KB, 500 KB, 358 KB, 200 KB, and 375 KB in the following order is the _______________.
Answer:
The memory allocation algorithm that is used to place the processes given is the First Fit Algorithm
Explanation:
The First Fit Management Algorithm works by ensuring that the pointer keeps track of all the free spaces in the memory and accepts and executes all instructions to allocate a memory block to the coming process as long as it is big enough to hold the size of the process.
For example, the First Fit algorithm will allocate the processes in the first block that fits (that is, if it can fit the memory bock in the queue, then the process will be store)
It will work as follows (recall that the memory partitions are in order and must remain so):
A) 115 KB is stored in 300KB block, leaving the following free spaces (185KB, 600KB, 350KB, 200KB, 750KB, 125KB), next
B) 500 KB is store in a 600KB block leaving the following free spaces (185 KB, 100 KB, 350 KB, 200 KB, 750 KB, 125 KB), next
C) 358 KB is stored in 750KB block, leaving the following free spaces (185KB, 100KB, 350KB, 200KB, 392KB, 125KB) next
D) 200 KB is stored in 350KB block, leaving the following free spaces (185 KB, 100 KB, 150KB, 200KB, 392KB, 125KB) next
E) 375KB is stored in 392KB block leaving (185KB, 100KB, 150KB, 200KB, 17KB, 125KB)
One of the demerits of this Algorithm is that, as shown above, memory is not maximized. It however is one of the easiest algorithms amongst all the other memory allocation processes.
Cheers
can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and communications facilities to organizations and individual users.
A)Global Communication
B)Social Media Platform
C)Internet
D)Technological Advancement
Answer:
Internet
Explanation:
just took the test and got A
Why is it useful to have more than one possible path through a network for each pair of stations?
Answer:
Because if one path is crowded, then there is always another path to make it less crowded and it is more convenient
Explanation:
In order to make schemas that will appear in the Schema Library available in the XML Options dialog box, what file extension should a user give to schemas?
--.xml
--.xsl
--.xslt
--.xsd
Answer:
You can use your XML parser
Explanation:
hope this helps!
what are the characteristics of 1st generation computers
Answer:
Used vacuum tubes for circuitry.
Electron emitting metal in vacuum tubes burned out easily.
Used magnetic drums for memory.
Were huge, slow, expensive, and many times undependable.
Were expensive to operate.
Were power hungry.
Explanation:
Answer:
Characteristics of first generation computers:Explanation:
1)First generation computers used vacuum tubes.
2)Speed was slow and memory was very small.
3)They were huge in size taking up entire room.
4)They consumed a lot of power and generated so much heat.
5)Machine language was used in these computers.
6)Output was obtained on printouts through electric typewriter.
7)Input was based on punched cards.
8)First generation computers were expensive and unreliable.
What is the extension of Qbasic ?
Answer:
bas
Explanation:
Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer
The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.
In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.
The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.
On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.
The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.
Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.
For more questions on Reviewer, click on:
https://brainly.com/question/30517194
#SPJ8
Clyde Clerk is reviewing his firm’s expense reimbursement policies with the new salesperson, Trav Farr. "Our reimbursement policies depend on the situation. You see, first we determine if it is a local trip. If it is, we only pay mileage of 18.5 cents a mile. If the trip was a one-day trip, we pay mileage and then check the times of departure and return. To be reimbursed for breakfast, you must leave by 7:00 a.m., lunch by 11:00 a.m., and have dinner by 5:00 p.m. To receive reimbursement for breakfast, you must return later than 10:00 a.m., lunch later than 2:00 p.m., and have dinner by 7:00 p.m. On a trip lasting more than one day, we allow hotel, taxi, and airfare, as well as meal allowances. The same times apply for meal expenses." Write structured English for Clyde’s narrative of the reimbursement policies. Draw a decision tree.
Answer:
The answer is described in the image.
Explanation:
The firm is responsible for all expenses made by it's employees, so for a local trip, the cost of gas relative to the mileage covered during the journey is paid for ( 18 cents per mileage).
If it is not a local trip, then it is a one-day trip, so the firm pays for the mileage and the cost of the meals not taken in the company, which depends on the departure and return/arrival time. If the departure and return time is 7am to 10am, the employee is paid for breakfast, if the departure and return is 11am to 2pm then the employee is paid for lunch, and for dinner, 5pm to 7pm.
The task of handling how active processes are making efficient use of the CPU processing cycles is called_______?
Answer:
Scheduling.
Explanation:
A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.
Hence, the task of handling how active processes are making efficient use of the central processing unit (CPU) processing cycles is called scheduling.
In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.
Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).
Using a for loop, write a function lastfirst() that takes a list of strings as a parameter. Each string in the list has the format 'Last, First' where Last is a last name and First is a first name. You should assume that there are no spaces between the last name and the comma and that there are an arbitrary number of spaces between the comma and the first name. The function lastfirst() returns a list containing two sub lists. The first sub list is a list of all the first names and the second sub list is a list of all the last names. The following shows how the function would be called on two example parameters:>>> lastfirst(['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])[['Evelyn', 'Tom', 'Elvis', 'Gordon'], ['Lulis', 'Jones', 'Presley', 'Sumner']]>>> lastfirst(['Ford, Harrison', 'Hepburn, Katharine', 'Tracy, Spencer'])[['Harrison', 'Katharine', 'Spencer'], ['Ford', 'Hepburn', 'Tracy']]
def lastfirst(lst):
newlst = []
newlst1=[]
for x in lst:
w = x.split(",")
newlst.append(w[1].strip())
newlst1.append(w[0].strip())
newlst2 = [newlst], [newlst1]
return newlst2
lst1 = (['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])
print(lastfirst(lst1))
I hope this helps!
what product and service type should I choose in quickbooks online if I do not want to track inventory
Answer:
is that what you're looking for
In QuickBooks Online, it’s easy to track how much you make and spend on each product or service. You can also enter these products and services you sell as items so you can quickly add them to sales forms. This gives you more detailed financial reports and helps you complete transactions faster.
Here's how to add services and products you don't plan to track inventory for (also known as non-inventory items).
Note: If you want to track product quantities, add them as inventory items instead.
Answer:
Non-inventory: Products or items you buy or sell, but don't need to track quantities. For example, nuts and bolts you use for installation jobs but don't sell directly.
For which input values will the following loop not correctly compute the maximum of the values? 1. Scanner in = new Scanner (System.in); 2. int max =
Answer:
The answer is "Option d".
Explanation:
Please find the complete question in the attached file.
3. You have set up your Android phone using one Google account and your Android tablet using a second Google account. Now you would like to download the apps you purchased on your phone to your tablet. What is the best way to do this?
a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.
b. Buy the apps a second time from your tablet.
c. Back up the apps on your phone to your SD card and then move the SD card to your tablet and transfer the apps.
d. Call Google support and ask them to merge the two Google accounts into one.
Answer:
a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.
Explanation:
Retail products are identified by their Universal Product Codes (UPCs). The most commonform of a UPC has 12 decimal digits: The first digit identifies the product category, the nextfive digits identify the manufacturer, the following five identify the particular product, andthe last digit is acheck digit. The check digit is determined in the following way:
• Beginning with the first digit multiply every second digit by 3.
• Sum all the multiplied digits and the rest of the digits except the last digit.
• If the (10 - sum % 10) is equal to the last digit, then the product code is valid.
• Otherwise it is not a valid UPC.The expression is:sum= 3.x1+x2+ 3.x3+x4+ 3.x5+x6+ 3.x7+x8+ 3.x9+x10+ 3.x11where the x’s are the first 11 digits of the code.
If you choose to add the last digit also in the second step and if the sum is a multiple of 10,then the UPC is valid. Either way, you still need to perform the modular division to checkwhether the given number is a valid code.In this problem, you need to use either a string or long long integer type for the product codebecause it is 12 digits long. If you use string, you can convert one character substring of thestring in to a single digit integer from left to right using the function stoi(str.substr(i,1)).This way you do not need to get last digit of the number and then divide the number by 10.
in c++
problem 3
Translate the following pseudocode for randomly permuting the characters in a string into a C++ program. Read a word. repeat word.length() times Pick a random position i in the word, but not the last position. Pick a random position j > i in the word. swap the letters at positions j and i. Print the word. Please work on this problem after we learn to generate random numbers in the class which is on Wednesday the latest. These problems only deal with simple loop while, for and do loops. You will get a second set of problems next week on nested loops.
Answer:
#include <iostream>
#include <cmath>
using namespace std;
int main(){
string upc;
char last;
cout<< "Enter UPC number: ";
cin >> upc;
if (upc.size() == 12){
last = upc[-1];
} else{
return 0;
}
cout<< last;
char myArr[upc.length()];
for (int i = 0 ; i < upc.substr(0,11).length(); ++i){
if (upc[i]%2 != 0){
myArr[i] = upc[i] * 3;
}
else{
myArr[i] = upc[i];
}
}
int sum = 0;
for (int x = 0; x < sizeof(myArr); ++x){
sum += (int)myArr[x] - '0';
}
if (sum% 10 == last){
cout<<"UPC number is valid";
}
else{
cout<<"Invalid UPC number.";
}
}
Explanation:
The UPC number in the c++ source code input must be 12 digits long for the rest of the code to execute. The code checks the validity of the number by comparing the reminder of the sum division with the last digit in the UPC number.
One of the systems analysts on the project team thought that he did a good job of designing the company’s tech support webpage, but his supervisor isn’t so sure. His supervisor is concerned that the design is very similar to a page used by the company’s major competitor, and she asked him whether he had used any HTML code from that site in his design. Although the analyst didn’t copy any of the code, he did examine it in his web browser to see how they handled some design issues. The supervisor asked the analyst to investigate webpage copyright issues and report back to her. In his research, the analyst learned that outright copying would be a copyright violation, but merely viewing other sites to get design ideas would be permissible. What is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your opinion on this question: Even if no actual copying is involved, are there ethical constraints on how far you should go in using the creative work of others? How would you answer?
Explanation:
Although the system analyst only viewed the HTML code as a major competitor not outrightly copying their code, however, since there are relatively few legal frameworks on this matter, it important to note some ethical issues or constraints that may arise:
Copying the design pattern of the competitors' webpage may result in legal fillings by the competitors which may claim the other company stole its intellectual designs without permission.Such actions may result in other competitors carrying out the same strategy on the company.PLS HELP IF U KNOW A LOT ABT SOCIAL MEDIA
Idk what’s going on with Pinterest but I can’t follow ppl, dm ppl or comment on stuff and it says an error (attached image) what can I do to fix this? Also I’ve tried logging in and out and I’ve tried deleting the app. Btw it’s on a business account
Answer:
Its probably your computer
Explanation:
Try restarting, shutting down and starting back up your computer/laptop. Or just move to a different device.