Answer:
Here's ur answer
Explanation:
(i) Should consist of standardized and acceptable symbols. (ii) The symbols should be correctly used according to flowcharts rules. (iii) Should have short, clear and readable statements written inside the symbols. (iv) It must have clear one starting point and one ending point.
Explaining AutoCorrect
How is the AutoCorrect feature useful in Outlook 2016? Check all that apply.
It checks for common typing errors.
It can automatically fix the error while you are typing.
It suggests email recipients that might be interested in your message.
It underlines words that need spelling and grammar corrections.
It ensures that you are emailing the correct recipients.
Answer:
1, 2 and 4
Explanation:
a man takes 30 step to cover 18 metre l,how many step he will needed to cover 3003m distance
Question # 1 Multiple Select Which of the following shows the assignment of a string to a variable? Select 3 options. answer = "23" answer = (23) answer = '23' answer 23 answer = input("How old are you?")
Answer:
answer = input("How old are you?")
Explanation:
Answer is a variable The Input function takes a string
Answer:
answer = input("How old are you? ")answer = '23'answer = "23"Explanation: Correct on Edg 2020/2021.
What kind of loop should be used in a game where the user is guessing a secret code and the message"guess again" appears until the user guesses correctly?
Answer:
While loop
Explanation:
It should be noted that the number of times which the computer will ask the user to take a guess is not known.
When we have a condition like this, the while loop (or in some programs; the do-while loop) is to be used.
To further back my point, see the following program in python.
secret_code = 1234
user_guess = int(input("Take a guess: "))
while user_guess != secret_code:
user_guess = int(input("guess again: "))
print("You guessed right")
The above program will keep asking the user to take a guess until the user enters 1234.
This may or may not be possible with a for loop.
This is your data.
A= [5, 10, 15]
B = [2, 4, 6]
C = ['dog','cat', 'bird']
You can implement an array of this data with
Answer:
This is your data.
A = [5, 10, 15]
B = [2, 4, 6]
C = ['dog','cat', 'bird']
You can implement an array of this data with
either by using lists or by using the array module
ALSO
This is your code.
>>> A = [ 'dog', 'red']
>>> B = [ 'cat', 'blue']
>>> C = [ 'fish', 'green']
You can implement an array of this data by using
by using lists but not by using the array module
Explanation:
Edge2020
A= [5, 10, 15], B = [2, 4, 6], C = ['dog','cat', 'bird']. You can implement an array of this data either by using lists or by using the array module.
What is an Array?An array is a type of data structure used in computer science that holds a set of elements that are all uniquely recognized by at least one array index or key. Each element of an array is recorded such that a mathematical formula may be used to determine its location from its index tuple.
Indexed arrays, multidimensional arrays, and associative arrays are the three types of arrays.
A procedure called indexing selects a subset of values from an array. A value's position inside an array is indicated by its index. The location of the value in an array differs from the value itself.
To read more about Array, refer to - https://brainly.com/question/14375939
#SPJ2
How Much did a case of soda (any kind your choice ) cost in 2004?
PLS HELP!!!!!!
Answer:
2004 88 cents for 2 cans
Explanation:
Which is an email protocol that retrieves email without deleting the email and its attachments from the server?
Simple Mail Transfer Protocol (SMTP)
Internet Message Access Protocol (IMAP)
Post Office Protocol version 3 (POP 3)
Simple Network Management Protocol (SNMP)
Answer:
Internet Message Access Protocol (IMAP)
Explanation:
The "Internet Message Access Protocol" or IMAP was created by Mark Crispin at the Stanford Knowledge Systems Laboratory. It allows a person to access his email from his local server. In comparison to the Post Office Protocol Version 3 (POP 3), which deletes the emails once they are downloaded, the IMAP allows the contents to be saved on the server. The email will only be deleted if the user intends to do so.
Answer:
It is Pop 3 not IMAP
Explanation:
Correct on edg 2022
Suppose you wanted to quickly take a photograph of a dew drop on a rose petal before it rolled off. Which camera mode would be most
appropriate?
A: landscape
B: L
C: macro
D: M
Answer:
The answer is M
Explanation:
EDGE 2022
Which was the first computer network in the world
Answer:
ARPAnet in 1969
Explanation:
hope this helps :)
So my teacher asked us to predict who would win in a death match, and we could choose the two characters, so Alastor from Hazbin Hotel vs Blackhat from villinous, who would win?
Answer:
I think alastor from Hazbin Hotel.
Answer:
alastor
Explanation:
i mean alastor is a demon and blackhat we dont know if he is a demon or not but i mean alastor would win he took down a flying ship that was trying to kill them
Use the drop-down menus to complete the steps to open the Lookup Wizard.
1. Open the table in ___
view.
2. Click in the ___
column of the desired field.
3. Click the ___
, and then click Lookup Wizard.
Answer: 1. design view 2. data type 3. arrow
Explanation:
I just did it :)
When comparing systems software and application software, what is the main difference?
Answer:
it is a
Explanation:
i did the test
You created a two-dimensional array with the following code.
>>> A = [21, 'dog', 'red']
>>> B = [35, 'cat', 'blue']
>>> C = [12, 'fish', 'green']
>>> E = [A, B, C]
How do you refer to 'cat'?
E[1, 2)
E[1,2]
E[1][2]
E[1,2]
Explanation:
My answer is E[1][1]
but I don't see it here
Answer:
E[1][2] that is correct I just took t
Which of the following is a palette of colors, fonts and special effects which complement one another?
O Placeholders
O Theme
O Background
Slide Masters
Answer:
Theme
Explanation:
Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, they should be reordered as 4, 9, 16. Which of the following algorithms can be used to place any three numbers in the correct order?
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
A
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
B
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
C
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
Answer:A
Explanation:
Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly.
What refers to how a game’s player shapes what happens in their own personal game experience by making choices on how they play?
Group of answer choices
pseudostory
metagame
ludonarrative
iambic pentameter
Answer:
Explanation:
The answer is ludonarrative.
Please mark me brainliest.
Match the example with the type of collection.
{'casa': 'house'}
[3, 5]
(3, 5, 'dog')
Answer: First is a dictionary, second is a list, and third is a tuple
Explanation:
Drop a paper of A-4 size and a
piece of wood/plastic about 2-3
inches long, from a height more
than 10 feet. Note the time for both
to hit the ground. Now repeat the
experiment by folding the paper
once, twice, thrice... (as many
time as you can). Why every time
the travel time reduces for paper
and remains the same for
wooden/plastic piece. Does the
paper at any stage hit ground
before wooden/plastic piece? If
yes,
Complete the static method stringSearch, which returns a String that tells where the first occurrence of the characters (chr) were found ("The characters were found at ____ index.") or it says, "Those characters could not be found." The String to be searched (phrase) and the characters that are being looked for (chr) are passed in as arguments. (9 points) public static String stringSearch (String phrase, String chr) { ** Complete the code ** }
Using this feature keeps the message thread intact.
Reply
Opt out
New message
Signature
Answer:
Option 1: Reply is the correct answer.
Explanation:
Emails are used for business and official communications.
Let us look at the options one by one
Reply:
The reply option opens the email editing window. When the reply option is used the emails then are arranged in the form of a message thread. So the reply option keeps the message thread intact.
Hence,
Option 1: Reply is the correct answer.
Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
The answer is D!!Readable code includes
o the use of formatting to make the code look better.
the use of dense lines of code without indentation.
o the use of comments that are of no use to future users of the progran
Answer:
D
Explanation:
says in title
Readable code includes the use of comments that are of no use to future users of the program. The correct option is c.
What are readable codes?Readable code is just code that makes its goal crystal plain to the reader. The likelihood is that other developers will read the code we write and want to either comprehend it or modify it. It's interesting to read the code. Variable, function, and class names in the code are meaningful.
The code may need to be tested, a bug fixed, or a new feature added. The evolution of the codebase is facilitated by readable source code, which makes it easier to read and comprehend the abstraction phases. Future developers can save time and effort by writing readable code.
Therefore, the correct option is c, the use of comments that are of no use to future users of the program.
To learn more about readable codes, refer to the link:
https://brainly.com/question/19540616
#SPJ2
Identify and summarize the features of the Windows 7 backup utility.
Answer:it is slow
Explanation: slow
Answer:
IT can create a backup it can restore a backup and probably more
Explanation:
What genre do games that involve physical challenges and make use of hand-eye coordination, speed, accuracy, and precision fall into?
adventure
action
simulation
puzzle
Answer:
flexiblity
feedback
playin outdoor game
Answer:
I think simulation not 100% sure though.
I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how to do that. Help would be greatly appreciated.
PS: Reposting my question because the answers I got previously were both only made for points, not to help in any way. :(
Answer:
You need to first use the Sum function to add up all the costs of September.
Then divide each September cost by the grand total that you got. After that format the last column to be percentages.
Look at the attached file for the formulas used.
Describe the difference between an interest and a skill.
Answer:
an interest you can be good but you can also not know where to start an interest is a want to start and a skill is when you are good at it but you don't have to be interested
Explanation:
Do you need a internet browser to go to the intrnet?
Answer:
No you do not need a interent browzer to get to the internet.
Explanation:
.Explain how encrypting data during transmission protects it from being read by an unauthorised person who intercepts the transmission.
Answer:
Encryption is an effective and efficient technique used to prevent unauthorized access to informations transmitted over the internet.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
SSL/TLS are standard protocols that provides link encryption for the transmission of messages over the internet such as electronic mail (e-mail).
SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.
In the case of TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.
This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.
Which technology will a business use to figure out who accessed confidential files on a company's computer system
Answer:
insaj cdsjl ljhwbalfhb
Explanation:
please help me
...
....
Answer:
formal information searches
Explanation:
Answer:
informal information source
hope it will help if it helps please ask me in comment