Answer:
flextimes
Explanation:
Flex times is defined as the flexible time that is scheduled for allowing the workers to alter the workday start and their finish times. This is in contrast to the traditional work arrangements which require for the employees to start work at a standard 9 a.m. and to finish at 5 p.m.
It is program which allows the employees to choose a suitable starting time as an ending time for doing their work during the specified core period.
what can be the maximum possible length of an identifier 3163 79 can be of any length
Answer:
79 characters
Explanation:
The programming language is not stated, but a little search online shows the question is about python programming language
Literally, identifiers are the names given to variables, arrays and functions.
In most programming languages (e.g. python), identifiers are case-sensitive.
i.e. Abc is a different identifier when compared to abc.
Having said that, python allows up to 79 characters to name an identifier.
Meaning that, the length of a variable name (or array, or function, etc.) can be up to 79 characters, and it cannot exceed 79 characters.
Question 1:
The Wayfinder is an ancient piece of technology created as a means of navigating challenging stretches of space. The device connects to every piece of technology in the galaxy in order to detect planets and spaceships and then shown their location to the user. As it happens, locations of planets follow a specific distribution. A planet can exist at coordinates x,y only if
2x² + |2xy| + y² =10000
The user can use the Wayfinder to find nearby planets by input the range for x and y. Draw a flowchart and write a C++ program that models the Wayfinder. Ask the user to input a range for x and y, then print all possible planet coordinates. The program should also print the number of planets detected.
Hint: you can use pow(x,n) to get the value of xn and abs(x) to get the absolute value of x.
helpppppppppp!!!!!!!!!!
Sample output:
Answer:
Following are the code to the given question:
#include<iostream>//header file
#include<math.h>//header file
using namespace std;
int main()//main method
{
long long x, x1, y, y1;//defining long variable
int count=0,i,j;//defining integer variable
cout<<"Enter a range for x coordinates: "<<endl;//print message
cin>>x>>x1;//input x and x1 value
cout<<"Enter a range for y coordinates: "<<endl;//print message
cin>>y>>y1; //input y and y1 value
for(i = x; i <= -x1; i++)//use nested loop that tests each coordinates
{
for(j = y; j <= y1; j++)//use nested loop that tests each coordinates
{
if(((2*pow(i,2)) + abs(2*i*j) + pow(j,2)) == 10000)//use if that checks condition as per the given question
{
cout<<"There is a planet at "<<i<<", "<<j<<endl;// print coordinates
count++;//incrementing count variable value
}
}
}
cout<<"Total number of planets detected are: "<<count<<endl;//print count value
return 0;
}
Explanation:
In this code, inside the main method long "x, x1, y, and y1" and integer "count, i, and j" type variable is declared that uses a long variable to input value from the user-end.
In the next step, two nested loops have defined that test each coordinate and define if block that checks condition as per the given question and use i, j, and count variable to print value with the message.
A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?
Answer: b is good
Explanation:
Your friend want to make a copy of your new game you bought the previous day .
Why should you prevent him from doing that?
Answer:
It is copyright infringement
Explanation:
Required
Why you should prevent your friend from copying a software you bought
When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.
This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.
outline the steps involved in changing the colour of a theme
Answer:
Right click on the desktop and click on personalize option and then click on window color. After that window color and appearance window appears. select a color scheme you want. Go to Appearance and personalization, click on theme and select any theme from the list and click on ok.
what is the fullform of ETA in computer term
Answer:
Estimated Time of Arrival.
open accomplishing your task I was able to
Answer:
WTH KINDA QUESTION IS THIS !
I DON'T UNDERSTAND DUDE
plz help me to do 4 number
Answer:
A is an abbaccus. B is Blaze Pascal. C is The Jacquard Loom. D is Charles Babbage. E is The Manchester Baby.
Explanation:
If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.
Answer:
Normal
Explanation:
If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.
What is presentation?Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.
Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.
It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.
Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.
To learn more about the presentation, refer to the below link:
https://brainly.com/question/17087249
#SPJ2
Choose all that apply: You are servicing a Dell Inspiron 22 3265/3263 AIO Desktop and determine that the LCD panel is faulty. What troubleshooting steps will you follow before replacing the LCD Assembly
Explanation:
1.) Run ePSA, but press ESC to stop testing and regain control of the cursor. Double tap on the screen and see if the cursor moves to your pressed location. That will determine if the hardware is needed to be replaced or it is a software problem
2.) If the system boots into windows, check the device manager for the USB Input device which has a white circle and a down arrow, right click and enable it to test its functionality.
The troubleshooting steps that the user will need to follow before the LCD Assembly is replaced goes thus:
One will have to run the ePSA.The cursor will have to be regained by press esc in order to stop the testing.Then one will have to double tap the screen in order to check whether the cursor had been moved to the pressed location.The above is necessary in order to know if there will be a replacement of the hardware or whether it is a software problem Then if the system boots into windows, one will have to check the device manager in order to find the USB Input device which will then be right clicked to test its functionality.In conclusion, the above method will be used for the troubleshooting.
Read related link on:
https://brainly.com/question/18275236
If you set the Decimal Places property to 0 for a Price field, and then enter 750.25 in the field, what does Access display in the datasheet
Answer:
The answer is "750".
Explanation:
Throughout this question the even though it used to provides the precise decimal which is used as the representation or rounding requirement in software such as billing, it also used to represents only the 750, demonstrating the nearest rounding of the given technique, that's why the solution is 750.
Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.
82 point question even tho it’s really easy
Answer:
swa#22*88#&mu#hu..
Explanation:
hope it correct
Popular mixed drinks such as margaritas
contain more alcohol than a standard drink.
A. will
B. do not necessarily
O C. never
Drugs
the chemistry of the brain and the way that a person thinks.
A. change
B. don't change
C. trick
Highway Safety Administration
Answer:
C.never and A.change that's what I think
hubs hardware advantage's and disadvantages
Answer:
answer in picture
hope it's helpful
Discuss if you think technology, mobile apps, and/or social networks make us lazy or not. Justify your answer.
Identify ways that you’ve seen social media affect people in the workplace or in society (whether positively or negatively).
Analyze technology’s impact (and in particular, consider social media and mobile apps) on your own life.
Answer:
Yes, I do you can't just go out and work, play, or anything outside and people just want to stay inside on electronics like phones, tv, game systems.
Explanation:
In truth, technology has made a lot of difference in our society, but it has also transformed humans into lazy-bones. These days, people don't need to run errands anymore; they push a button on their phone (another product of tech) and have most of the human's first world problems solved
Software written to meet the specific needs of a company is known as
Answer: system
Explanation:
System software refers to the software that's written to meet the specif needs of a company. It is designed in order to provide a platform for the other software and run the hardware and the application programs of a computer.
Examples of system software are game engines, industrial automation, search engines, etc.
A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do
Answer:
Install a second server and load balancer
Explanation:
Considering the scenario described above and to solve this problem without having to replace the current server, what I will do is to carry out "installation of a second server to provide additional capacity for the server and install load balancer which helps in managing and allotting incoming requests or application traffic to any ready server prepared of fulfilling them.
The organization will most likely ___ to an internal user attempting to escalate privilege than to an external hacker
Answer:
respond differently.
Explanation:
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.
Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.
An organization is expected to most likely respond differently to an internal user such as one of its employees that attempt to escalate his or privilege than to an external hacker.
This is usually so because the organization trust its internal users to an extent than it does with external users or an attacker such as an external hacker.
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet
Answer:
The given statement is true.
Explanation:
The honeynet is indeed a decoy network comprising a honey trap or even more. It appears to be a real network with multiple systems but is housed on one or a few servers, each of them together in one setting, which is why it is termed a honeynet when more than one honeypot is linked to an amount of honey pot system on one subnet. In the IDSs (Intrusion Detection Systems), a padded cell system has been used which is like a honeycomb.
en que consiste excel
Answer:
Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.
write a program to generate following series in qbasics 100,81,64,....1
Answer:
[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]
it's square root number you multiple times by 2
An item that contains both data and the procedures that read and manipulate it is called a(n) ________.
Answer:
Object
Explanation:
An item that contains both data and the procedures that read and manipulate it is called an object.
Why does a computer need programs?
In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.
Answer:
The right response is "Robots ".
Explanation:
A robot seems to be an independent machine that can detect its surroundings, conduct simulations, as well as take action throughout the modern or actual environment.It is indeed a piece of computer-controlled equipment, which would also be utilized autonomously for carrying out duties or other hazardous tasks.Artificial intelligence is a far more superior or complicated aspect of intelligence. They make use of patterns to find solutions to various problems.
Artificial intelligence machines are called robots. These tend to work and perform tasks that are much complex and length within short and simple steps. They can be sued to free the workers and help in any hazardous situation or events. Hence they serve the purpose of bots or robots.Learn more about the context of applications of artificial intelligence (AI).
brainly.com/question/24259157.
when files on storage are scattered throughout different disks or different parts of a disk, what is it called
Answer:
File Fragmentation or Fragmented Files
Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?
Answer:
Access Quick Access commands using the More button.
Explanation:
To ensure that a command she frequently uses is added to the Quick Access toolbar Robyn would need to "Access Quick Access commands using the More button."
To do this, Robyn would take the following steps:
1. Go / Click the "Customize the Quick Access Toolbar."
2. Then, from the available options, he would click on "More Commands."
3. From the "More Commands" list, click on "Commands Not in the Ribbon."
4. Check the desired command in the list, and then click the "Add" button.
5. In the case "Commands Not in the Ribbon" list, did not work out Robyn should select the "All commands."
You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?
Answer:
Explanation:
In this scenario, the best option is to first create a DMZ. This stands for Demiliatirized Zone and basically allows anything connected to it to access networks that have not been completely verified (which in this case would be the internet). Once the DMZ is created you are going to want to add the web server to the DMZ. This will allow the web server to access the internet and be publicly available to its users. At the same time you are going to want to add the company network behind the DMZ so that it is not allowed to publicly access the internet without the data going through the firewall first. Therefore, protecting the company network users.
which is known as accurate processing of computer gigo E mail MHz bug
GIGO is the considered as the accurate processing in computers.
In the field of computer science, the word GIGO stands for " garbage in, garbage out".
It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.
It is the inability of the program to any bad data providing incorrect results.
Thus GIGO is the most accurate processing in a computer programs.
Learn more :
https://brainly.in/question/23091232
What are the characteristics of an attachment in an email?
O The attachment will always appear in the body of the message.
O The paperclip icon indicates an attached file.
O Bold red type indicates an attached file.
O The attachment can only be viewed if it is in HTML format.
With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have other words within the search. Group of answer choices exact match phrase match broad match modified broad match
Answer:
modified broad match.
Explanation:
A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.
At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.
There are different types of matching techniques used in configuring a search engine and these includes;
I. Exact match.
II. Phrase match.
III. Broad match.
IV. Modified broad match
When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.
Hence, the name modified because it avail users other options by including other words within the search.