Answer:
built-in objects are programmer-defined objects with programmer-developed properties and methods. Custom objects are user-defined objects.
ASAP PLZZ
1. In the space below, explain how the Table Tools can be accessed in Word.
Answer:
Creating a Table
1) Click the Insert tab on the Ribbon
2) Click on Table
3) Highlight the number of columns and rows you’d like
OR
4) Click Insert Table
5) Click the arrows to select the desired number of columns
6) Click the arrows to select the desired number of rows
7) Click OK
Hey, Another question. I'm sure it's possible in the future, but I wanted to ask if HIE would be possible. I'm sure it would be, I just want to hear other people's comments on this. (Beatless)
Answer:
Originally Answered: Will there ever be a band as big as the Beatles? No, there will never be a band as popular as the Beatles. For one thing they were exceptionally good in a time of great music in general.
Explanation:
please mark this answer as brainliest
What are benefits for robots doing work instead of humans?
What are some drawbacks for robots replacing humans?
write in complete sentences.
Answer:
Explanation:
Robots are able to complete tasks more efficiently and with more perfection than humans.
Humans in many production based jobs will loose their lively hood.
Which of the following terms refers to the legal protection provided against
copying, distributing, performing, or changing both published and
unpublished works?
A.intangible property
B.tangible property
C.copyright
D.intellectual property
Answer:
The answer is C is your answer I guarantee it is I know it
jdr-wivg-vmb
co.me a.nd jo.in fa.st...
go.ogle me.et
Explanation:
what is this don't post like this
what would happen without satellites???
Answer: without satellites there would be no way for the world to communicate
Explanation:
Answer:
Explanation:
Without satellites, we wouldn't have much choice in our television programs either, because there would be no more direct-to-home broadcasting, and cable operators would no longer have easy access to such a wide variety of channels.
2. You go to an intemet cafe to send an email to your friend upon returning home you
realize that you forgot to log out your account. What probably could happen to your
account?
Pueden cojer los datos privados hackear la cuenta
meaning and explanation of fortran
Answer:
is a general-purpose, compiled imperative programming language that is especially suited to numeric computation and scientific computing.
Explanation:
Fortran, as derived from Formula Translating System, is a general-purpose, imperative programming language. It is used for numeric and scientific computing. Fortran was originally developed by IBM in the 1950s for scientific and engineering applications.
The following procedure is intended to return true if the list of numbers myList contains only positive numbers and is intended to return false otherwise. The procedure does not work as intended. PROCEDURE allPositive(myList) { index ←← 1 len ←← LENGTH(myList) REPEAT len TIMES { IF(myList[index] > 0) { RETURN(true) } index ←← index + 1 } RETURN(false) } For which of the following contents of myList does the procedure NOT return the intended result?
Answer:
[-1, 0, 1]
Explanation:
Given
The above procedure
Required
Which list does not work as intended
The question has missing options (the options are available online).
From the question, we understand the procedure is to return true for lists that contain only positive numbers.
However, the list does not work for [-1, 0, 1]
The reason is that; the procedure starts checking from index 1.
i.e. index ←← 1
In [-1, 0, 1], the element at index 0 is negative (-1).
Since the procedure starts checking from index 1, the procedure will not check the element at index 0 (i.e. -1).
Hence, it will return true, instead of false
In this exercise we have to use the knowledge of computational language in python, so we have that code is:
It can be found in the attached image.
So, to make it easier, the code in python can be found below:
NumList = []
Number = int(input("Please enter the Total Number of List Elements: "))
for i in range(1, Number + 1):
value = int(input("Please enter the Value of %d Element : " %i))
NumList.append(value)
print("\nPositive Numbers in this List are : ")
for j in range(Number):
if(NumList[j] >= 0):
print(NumList[j], end = ' ')
See more about python at brainly.com/question/2266606
Why should you list more than one font if you are formatting some text using CSS?
Not every browser supports every font.
CSS will select the font that fits best on the page.
CSS will use different fonts when the page is refreshed.
All of the fonts will appear in the webpage.
PLZZ HELP ME IM TIMED
Answer:
Because if one font is not available, it will fall back on the ones that are. By providing several, you have a higher level of control over what happens to the site if a browser does not support one of the fonts. The alternative is the browser deciding to use it's own default font as a fallback. This can result in the webpage looking weird.
What is a commerce platform?
Answer:
In basic terms, a commerce platform simply refers to technology that enables a transaction (the commerce bit). The platform part allows you to overlay that technology across various channels such as online and in-store.
Answer:
Explanation:
a commerce platform simply refers to technology that enables a transaction (the commerce bit). The platform part allows you to overlay that technology across various channels such as online and in-store.20 Feb 2017
how do i turn off itallics on a school chromebook i accidentally turned them on in another tab and i dont know how to undo them
List two building techniques or materials that should be considered if you are building in Tornado Alley.
What technology standard is commonly used today for hard drives to interface with the motherboard in a system? pasago po salamat ^_^
Answer:
Serial Advanced Technology Attachment (SATA).
Explanation:
The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Thus, the hardware components of a computer are the physical parts that can be seen and touched. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
Digital storage of data refers to the process which typically involves saving computer files or documents on magnetic storage devices usually having flash memory. Some examples of digital storage devices are hard drives, memory stick or cards, optical discs, cloud storage, etc. A reliable storage such as a hard-disk drive ensures that computer files or documents are easily accessible and could be retrieved in the event of a loss.
Serial ATA (SATA) is a technological standard which is commonly used today for hard drives to interface with the motherboard in a computer system. Thus, it's simply a bus interface on computer systems that is typically used for connecting mass storage devices to host bus adapters such as motherboards.
Generally, SATA comprises of two ports and these are the power and data connector.
One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed. Since all files are contiguous, copying a
file squires a seek and rotational delay to read the file, followed by the transfer at full speed. Writing the file back requires the same work. Assuming a seek time of 5 msec, a rotational delay of 4 msec, a transfer rate of 8 MB/sec, and an average file size of 8 KB, how long does it take to read a file into main memory and then write it back to the disk at a new location? Using these numbers, how long would it take to compact half of a 16-GB disk?
Answer:
The answer is below
Explanation:
a) Seek time = 5 msec, transfer time = 4 msec, transfer rate = 8 MB/sec = 8000 KB/sec, average file size = 8 KB
Transfer time = 8 KB ÷ 8000 KB/sec = 1 msec
The time required to read and write is twice the sum of the seek and transfer time.
Total time = (5 msec + 4 msec) * 2 + 1 msec = 19 msec
b) half of 16 GB = 8 GB = 8000000 KB
number of read and writes = (8000000 KB of total file size/ 8 KB of average file size) * 2 = 2000000
Transfer rate = 8 MB/sec = 0.008 GB/sec
Transfer time = 8 GB ÷ 0.008 GB/sec = 1000 sec
Total time = (5 msec + 4msec) * 2000000 + 1000 sec = 19000 sec
name the default Package of java
Answer:
java.lang package
Explanation:
Java compiler imports java. lang package internally by default. It provides the fundamental classes that are necessary to design a basic Java program.
Which security option should be used to ensure the integrity and validity of an Access database?
digital signature
database password
trust center options
start-up options
Answer:
The best security which could be used to ensure integrity and validity of Access database is:
O. database password
Explanation:
Database password is the only option that best guarantee the integrity of an Access database due to the fact that, it limits the number of people who would be able to have access to it. This password is an administrative right given to those who are meant to access it and it is expected to be renewed every few months (probably every 3 months).
Without the password, no other person can be able to login. Also, no two individual can be able to login in same time using same credential login details assigned (that is, in scenario of using the same Username and password)
Answer:
A) digital signature
Explanation:
Which of the following best describes the purpose of an IP address?
IP addresses provide a unique number for identifying devices that send and receive information on the Internet
IP addresses assist in the reconstruction of a message that has been divided into many packets
IP addresses indicate the location where an internet-connected computing device was manufactured
IP addresses indicate how many times an individual packet has been requested by a router
IP addresses provide a unique number for identifying devices that send and receive information on the Internet
The best describes the purpose of an IP address is, that IP addresses provide a unique number for identifying devices that send and receive information on the Internet. The correct option is A.
What is an IP address?An IP address is an address of the network of computers connected to the internet. The address is a sequence of numbers that are provided by the internet servers.
The full form of the IP address is internet protocol. It is the online address that is provided by the internet provider, The address will easily recognize if the person is using the internet. This address will be connected to the computers.
Thus, the correct option is A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet.
To learn more about IP addresses, refer to the link:
https://brainly.com/question/16011753
#SPJ6
algorithm of how to calculate the area of a square.
Answer:
In order to calculate area of a square, 'A' be the area of square and the length of the square be 'a'. Then we need to calculate A= a*a. Step 2 :- Accept as input, the length of the sides of the square, and store the value in variable a. Step 3 :- Calculate the area of the square (a*a) and store in a variable A.
Explanation:
Answer:
Area = side x side. For example, the area of a square of each side of length 8 feet is 8 times 8 or 64 square feet.
What is the first step to understand the potential impact to the business about a Security threat?
Answer:
Identify assets and their values
Explanation:
As a security analyst, the first step to determine the potential security threat is to understand
what kind of assets needs to be protected?what is the value of such assets?Harold is working on a science project that includes a spreadsheet containing calculated results based on the data. An obviously incorrect result is being calculated and displayed. The data is correct, but the formula must be flawed. To get the correct information, Harold clicks on the cell containing the incorrect results and adjusts information contained in the:
A. the formula bar.
B. the shortcut toolbar.
C. the calculator pop-up.
D. the column header.
Answer: When entering a formula into a cell, you begin with an equal sign
Functions and formulas are calculations a spreadsheet program applies to data.
Functions are preset calculations within spreadsheet software.
Formulas are user-entered calculations that may contain cell references, numerical values, and preset calculations.
1. What are you going to do if someone ask for your personal information online?
Answer:
Ask them why they need such information.
Explanation:
If they can't give you a good reason, please don't share your personal info. ♥
Answer:
If someone ask my personal information online i'll trun off my mobile data or wi-fi and then i'll block the user's Id
Explanation:
hope it is helpful to youWhich service uses a broadband connection?
Select one:
O a. DSL
O b. 3G and 4G
O c. dial up
O d. all connections use broadband
Answer:
d
Explanation:
because all in one question form
Question #4
Multiple Choice
MEZEA
Which is immutable?
O dataset
O tuple
O deque
O list
Answer:
tuple
Explanation:
the inner machinations of my mind ar- hey wait i´m not Patrick
A friend is working on piecing together a computer. He calls and explains that he needs to buy a circuit board with ports and sockets that connects the main devices of his computer. Which computer component is he most likely explaining? Group of answer choices
So this component is the motherboard
Hope this helps.
-scav
What is motherboard ?
Answer:
A motherboard is the main printed circuit board in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system, such as the central processing unit and memory, and provides connectors for other peripherals
What is the purpose of a hyperlink in a presentation?
A to add a joke to a presentation
B to create an attractive image
C to connect a user to a new slide, a file, or a webpage
D to keep track of the order of slides
Answer:
Answer:c to connect a user to a new slide, a file, or a webpage
Explanation:
Explanation:c
Answer:
c
Explanation:
There is a population of owls in a forest. In one year there are 20 new owls born and 10 owls die. In this same year, 5 owls entered the forest and 2 owls left. How did the population of owls change in one year?
Answer:
The owls population increased by 13 in one year
Explanation:
The given data on the owl population are as follows;
The number of new owls born = 20 (positive increase in population)
The number of owls that die = 10 (negative decrease in population)
The number of owls that enter the forest = 5 (positive increase in population)
The number of owls that left the forest = 2 (negative decrease in population)
Let 'w' represent the number of new owls born, let 'x' represent the number of owls that die, let 'y' represent the number of owls that enter the forest and let 'z' represent the number of owls that left the forest, we get;
The change in population, ΔP = w - x + y - z
By plugging in the values, we get;
ΔP = 20 - 10 + 5 - 2 = 13
The change in the population of owls in one year is an increase in 13 owls.
N an AWS design template, the "depends on" property of a resource is represented by an _________ color dot. Red Orchid Blue Black
Answer:
Black
Explanation:
Explicit dependencies in Amazon Web Services are used to determine the order in which resources are added or deleted on AWS Cloud Formation. If a user wishes to create explicit dependency, a line from the "dependson" dot located at the route is moved to the gateway-VPC attachment.
The "dependson" dot helps to specify which resource is created before another. It is signified by a black dot (*). It can be used to override parallelisms and also to determine when a wait condition becomes activated.
Using complete sentences post a detailed response to the following.
Many users do not like pop-ups such as alert boxes. Some people even have pop-up blockers in their browsers, which means that no boxes can pop up. As a website developer, would you include pop-up boxes? Why or why not? Should users block them in their browsers?
Answer:
No, I would not include pop-up ads in a website.
Explanation:
In my opinion, pop-up ads are very distracting and make it harder to navigate the website. If a website I'm on has too many pop-up ads I would leave. It drives people away and it annoys them.