Answer: The type sterilization that was used and how well it was performed
Explanation:
If there's a phone call from the sterilization monitoring company that the last spore test sent has failed, to determine the possible cause, I'll have to type sterilization that was used and how well it was performed.
The sterilization technique used will be analysed, and there'll also be a check for possible human errors. Once thus is done, the possible reason for the failure of the last spore that was sent can then be determined.
Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is
not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?
O Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.
IM TAKING TEST ANSWER PLS
Answer:
Option A
Explanation:
In case if Robyn is unable to find the frequently used command, then Robyn can use the back stage view to check for the command as the orientation setting allows to access more settings
Hence, option A is correct
Does anyone know what type of Chromebook this is?
Answer: Its............ A Chromebook type of Chromebook...??
Explanation:
Ion know I aint a geek, geezer -_- (Thats a lie)
Carla is assigning tasks to others and she needs to ensure that she is aware of their progress. Which option should
she choose?
O Send status report when I complete an assigned task
O Completed task color
O Set Quick Click flag
O Keep my task list updated with copies of tasks
Answer: Send status report when I complete an assigned task
Explanation:
In order to be aware of their progress, the option to choose is the "Send status report when I complete an assigned task".
To do this click on options on the tools menu, then click on task options. Then, after the keep updated copies of the assigned tasks on my task list has been selected in the check box, one will then select "Send status reports when the assigned tasks are completed".
An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.
An electronic [tex]\sf\purple{spreadsheet}[/tex] is an application you use to perform numeric calculations and to analyze and present numeric data.
[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]
An electronic spreadsheet is an application you use to perform numeric calculations and to analyze and present numeric data.
What is electronic spreadsheet?You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.
Microsoft Excel, Sheets, and Apple Numbers are a few examples of electronic spreadsheets.
Text, number, logical, and error data are the four categories of data. Each type can be used for a variety of tasks, so knowing which to use and when to use it is crucial.
You might also keep in mind that while exporting data into a spreadsheet, some data types might change.
You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.
Thus, the answer is electronic spreadsheet.
For more details regarding spreadsheet, visit:
https://brainly.com/question/8284022
#SPJ6
why stress testing is needed?
Answer:
To be able to test a product if it can withstand what it is supposed to before being released to the public for saftey reasons.
Answer:
Stress testing involves testing beyond normal operational capacity, often to a breaking point, to observe the results. Reasons can include:
Helps to determine breaking points or safe usage limits Helps to confirm mathematical model is accurate enough in predicting breaking points or safe usage limits Helps to confirm intended specifications are being met Helps to determine modes of failure (how exactly a system fails) Helps to test stable operation of a part or system outside standard usage Helps to determine the stability of the software.Stress testing, in general, should put computer hardware under exaggerated levels of stress to ensure stability when used in a normal environment.
Given the declaration: char a[] = "Hello"; char *p = a, *q; what operations are valid syntactically? Select all that apply. Group of answer choices q = &&a[0]; q = &&a; *q = *(&a[0]); q = &(*p);
Answer:
The valid operations are:
*q = *(&a[0]); and q = &(*p);
Explanation:
Given
The above declarations
Required
The valid operations
*q = *(&a[0]); and q = &(*p); are valid assignment operations.
However, q = &&a[0]; q = &&a; are invalid because:
The assignment operations intend to implicitly cast the char array a to pointer q. C++ does not allow such operation.
Hence, *q = *(&a[0]); and q = &(*p); are valid
Another way to know the valid operations is to run the program and look out for the syntax errors thrown by the C++ compiler
In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers
Answer:
Centralized Processing
Explanation:
Centralized processing was developed to process all of the data in a single computer, and since the first computers were stand-alone with all input and output devices in the same room, only the largest organizations could afford to use centralized processing.
Explain briefly the FIREWALLS
Answer:
Think of a firewall as your own personal security guard. The firewall will block unapproved websites from talking to your computer and will stop your computer from talking to unapproved/unnecessary websites. Hope this helps!
Explanation:
A method named 'withdraw' in the CheckingAccount class throws a custom exception named 'OverdrawnException'. You want to scan in the value of the withdrawal amount from a file, and you need to make sure that the scanner is closed whether the withdrawal is successful or not. Fill in the blank to complete the code below to do that.
Scamner sconfiLe -muil: try t scanFile new Scanner(myFile); myAccount.withdrow(scanFile.nextDouble)); System.out.println(oe.getMessageC); if (scanFile! null) catch (OverdrawnException oe) f th all of
scanFile.close ():
}
}
Solution :
Scanner scanFile = null;
try {
scanFile = new Scanner(myFile);
myAccount.withdraw(scanFile.nextDouble());
} catch (OverdrawnException oe){
System.out.println(oe.getMessage());
} finally {
if (scanFile != null){
scanFile.close();
}
}
Write a Java method that prints a list of characters using the following header:public static void printChars (char ch1, char ch2, int numPerLine)This method prints chars between ch1 and ch2 (inclusive); the number of chars per-line is specified by int variable numPerLine. Then write and test Java programs that printa) characters from 1 to Z (uppercase), ten chars per line; b) all lowercase letters followed by all uppercase letters, 13 per line (Hint: you may want to call the method printChars twice in this second part)Consecutive characters on the same line should be separated by exactly one space.
Answer:
The method and the test cases is as follows:
import java.util.*;
public class Main{
public static void printChars (char [tex]ch1[/tex], char [tex]ch2[/tex], int [tex]numPerLine[/tex]){
int count = 0;
for(char ch = ch1; ch<=ch2; ch++){
System.out.print(ch+" ");
count++;
if(count == numPerLine){
System.out.println();
count = 0; } }
System.out.println(); }
public static void main(String[] args) {
printChars('1','Z',10);
printChars('a','z',13);
printChars('A','Z',13);
}}
Explanation:
See attachment for complete source file where comments are used as explanation
Exam Lesson Name: Introduction to Design Technology
Exam number. 700796RR
> Exam Guidelines
Exam Instructions
Question 8 of 20 :
Select the best answer for the question
8. Cycling through the design process to create several models that incrementally improve a solution is called what?
O A. Six Sigma
B. Success criteria
C. Just-in-time production
D. Iterative design
Mark for review (Will be highlighted on the review page)
Type here to search
O
Bi
S
Answer:
D. Iterative design
Explanation:
An iterative design can be defined as a cyclic process which typically involves prototyping, testing, evaluating or analyzing and refining of a product, so as to continually improve the product.
In an iterative design process, the following steps are adopted;
1. A prototype of the product is first created and tested by the manufacturer.
2. The product is then evaluated to check for any defect or flaw.
3. The defect or flaw is fixed through a refining process.
4. The previous steps are repeated incrementally until an improved version of the product is created.
Hence, cycling through the design process to create several models that incrementally improve a solution is called iterative design.
Answer:
Iterative Design
Explanation:
A. It seeks to figure what it defective
B. It reaffirms if all requirements are met to solve a problem
C. It's main goal was to avoid excess products that might not end up making sales in the near future
D. Making several revision on problems to take out an efficient solution
D makes the most sense here.
2. 5s is a Chinese principle adapted for use in the workplace.
True or False
Answer:
A. true
Explanation:
because 5s is the.................
How laggy is you're game cause I even lag in offline games this is just a random question.
Answer: its bad
Explanation:
Answer:
Lagging in offline games suggests there is something wrong with the computer, not the internet. There are various speed tests you can use to determine the speed of your internet! One being https://www.speedtest.net/ which is a more well known and trusted site. Depending on how old your computer is or if it is a laptop not build for games can influence your gameplay experience greatly.
five technology tools and their uses
Answer:
Electronic boards
Videoconferencing ability
Search engines
Cloud services
Computing softwares
Explanation:
Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :
The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.
Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.
Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.
Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.
Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.
how can you explain that algorithm and flowchart are problem solving tools?
Answer:
Algorithm and flowchart are the powerful tools for learning programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way. Algorithm and flowcharts helps to clarify all the steps for solving the problem.
If the code for JAVA is LCXC, what is the code for BASIC?
Answer:
DCUKE
Explanation:
Given that,
Code for JAVA = LCXC
To find,
Code for BASIC = ?
As we observe the pattern,
In "JAVA", every letter moved two-letter forward in their alphabetical order or we can say that every third alphabet of the given letter is used to make the code:
J + 2 = L
A + 2 = C
V + 2 = X
A + 2 = C
Similarly,
B + 2 = D
A + 2 = C
S + 2 = U
I + 2 = K
C + 2 = E
Thus, DCUKE is the code for BASIC.
The code for BASIC given the code for JAVA is; DCUKE
We are given the code for JAVA as LCXC
From that code for "JAVA", we see that every letter is moved forward two letters in their alphabetical order. This means
J = L because L comes after J and KA = C because C comes after A and BV = X because X comes after V and UA = C because C comes after A and BSimilarly for BASIC;
B = D because D comes after B and CA = C because C comes after A and BS = U because U comes after S and TI = K because K comes after I and JC = E because E comes after C and DThus, finally the code for BASIC is DCUKE
Read more about JAVA at; https://brainly.com/question/18554491
Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should determine if the string begins with an uppercase letter and ends with a punctuation mark. The method should return true if the string meets the criteria; otherwise it should return false .
Answer:
The method in Python is as follows:
def checkStr(strng):
if strng[0].isupper() and strng[-1] == "?":
return True
else:
return False
Explanation:
This defines the method
def checkStr(strng):
This checks if the first character i upper and if the last is "??
if strng[0].isupper() and strng[-1] == "?":
If the condition is true, the function returns true
return True
Else, it returns false
else:
return False
Modity your program Modify the program to include two-character .com names, where the second character can be a letter or a number, e.g., a2.com. Hint: Add a second while loop nested in the outer loop, but following the first inner loop, that iterates through the numbers 0-9 2 Program to print all 2-letter domain names Run 3 Note that ord) and chr) convert between text and ASCII/ Uni 4 ord (.a.) is 97, ord('b') IS 98, and so on. chr(99) is 'c", et Running done. domain Two-letter a. com ?? . com ac.com ad. com ae.com ai. com ag.com names: 6 print'Two-letter domain names:" 8 letter1 'a' 9 letter2 10 while letter! < 'z': # Outer loop letter2a" while letter2 <- "z': # Inner loop 12 13 14 print('%s %s.com" % (letteri, letter2)) letter2chr(ord (letter2) 1) 15 letterl chr(ord(letter1) + 1) 16 17 h.com ai.com j com ak.com Feedback?
Answer:
The addition to the program is as follows: digit = 0
while digit <= 9:
print('%s%d.com' % (letter1, digit))
digit+=1
Explanation:
This initializes digit to 0
digit = 0
This loop is repeated from 0 to 9 (inclusive)
while digit <= 9:
This prints the domain (letter and digit)
print('%s%d.com' % (letter1, digit))
This increases the digit by 1 for another domain
digit+=1
See attachment for complete program
what are the different steps while solving a problem using computer? explain
Explanation:
The following six steps must be followed to solve a problem using computer.
Problem Analysis.
Program Design - Algorithm, Flowchart and Pseudocode.
Coding.
Compilation and Execution.
Debugging and Testing.
Program Documentation.
A wireless router is what kind of networking device?
Select one
a. End device
b. Intermediary device
c Peripheral Device
d. Connecting Device
Answer:
D, routers enable us to connect to the internet.
Design an if-then statement ( or a flowchart with a single alternative decision structure that assigns 20 to the variable y and assigns 40 to the variable z if the variable x is greater than 100?
Answer:
The conditional statement and its flowchart can be defined as follows:
Explanation:
Conditional statement:
if x>100 Then //defining if that check x value greater than 100
y=20//holding value in the y variable
z=40//holding value in z variable
End if
tools used to type text on Ms paint
Physical safeguards, also called logical safeguards, and are applied in the hardware and software of information systems.
a. True
b. False
Answer:
False
Explanation:
They are not applied in the hardware and software of information systems.
You issue a transmission from your workstation to the following socket on your LAN: 10.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using
Answer:
POP
Explanation:
The application layer protocol that is been used here is POP, given that you issued a transmission to the socket on you LAN: 10.1.145:110. and you use a standard port designation
Reason:
110 ( port number ) represents a POP3 process that is always used in a TCP/IP network , and the socket address started with an IP address as well. hence we can say that the application layer protocol is POP
Write a class named Pet, with should have the following data attributes:1._name (for the name of a pet.2._animalType (for the type of animal that a pet is. Example, values are "Dog","Cat" and "Bird")3._age (for the pet's age)The Pet class should have an __init__method that creates these attributes. It should also have the following methods:-setName -This method assigns a value to the_name field-setAnimalType - This method assigns a value to the __animalType field-setAge -This method assigns a value to the __age field-getName -This method returns the value of the __name field-getAnimalType -This method returns the value of the __animalType field-getAge - This method returns the value of the __age fieldWrite a program that creates an object of the class and prompts the user to enter the name, type, and age of his or her pet. This should be stored as the object's attributes. Use the object's accessor methods to retrieve the pet's name, type and age and display this data on the screen. Also add an __str__ method to the class that will print the attributes in a readable format. In the main part of the program, create two more pet objects, assign values to the attirbutes and print all three objects using the print statement.Note: This program must be written using Python language
Answer:
Explanation:
The following is written in Python, it contains all of the necessary object attributes and methods as requested and creates the three objects to be printed to the screen. The first uses user input and the other two are pre-built as requested. The output can be seen in the attached image below.
class Pet:
_name = ''
_animalType = ''
_age = ''
def __init__(self, name, age, animalType):
self._name = name
self._age = age
self._animalType = animalType
def setName(self, name):
self._name = name
def setAnimalType(self, animalType):
self._animalType = animalType
def setAge(self, age):
self._age = age
def getName(self):
return self._name
def getAnimalType(self):
return self._animalType
def getAge(self):
return self._age
def __str__(self):
print("My Pet's name: " + str(self.getName()))
print("My Pet's age: " + str(self.getAge()))
print("My Pet's type: " + str(self.getAnimalType()))
name = input('Enter Pet Name: ')
age = input('Enter Pet Age: ')
type = input('Enter Pet Type: ')
pet1 = Pet(name, age, type)
pet1.__str__()
pet2 = Pet("Sparky", 6, 'collie')
pet3 = Pet('lucky', 4, 'ferret')
pet2.__str__()
pet3.__str__()
Modify a list Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph' ["Sam', 'Ann', 'Joe'l 1 user_input = input() 2 short names = user input.split() 3 short_names - short_names.pop(0) 6 print (short_names) based
Answer:
The modified program is as follows:
user_input = input()
short_names = list(user_input.split(" "))
short_names.pop(0)
short_names[-1] = "Joe"
print(short_names)
Explanation:
This gets the user input
user_input = input()
This converts input to list
short_names = list(user_input.split(" "))
This removes the first item of the list
short_names.pop(0)
This updates the last item to "Joe"
short_names[-1] = "Joe"
This prints the updated list
print(short_names)
Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.
Answer:
128 KB
Explanation:
Given data :
The block size = 512 bytes
Block pointer size = 2 bytes
In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.
Therefore, the maximum number of block pointer in 1 block :
[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]
[tex]$=\frac{512}{2}$[/tex]
= 256
Thus, a block can hold maximum 256 pointers.
It is given the level of indexing is one. So,
Maximum size of the file = maximum number of block pointers in 1 file x block size
= 256 x 512
[tex]$=2^8 \times 2^9$[/tex]
[tex]$=2^{8+9}$[/tex]
[tex]$=2^{17}$[/tex]
[tex]$=2^7 \times 2^{10}$[/tex]
[tex]$=128 \times 2^{10}$[/tex]
= 128 KB (∵ 1 KB = [tex]2^{10} \ B[/tex] )
Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.
What are the steps in finding the average height? Plz help ty :>
(Problem-solving questions
Use the problem-solving steps to develop an algorithm to solve the following problem
...Calculating the average height of all the children in your class)
Answer:
to calculate average, first add all the figures. Then divide by the amount of figures there are
Interpersonal skills during discussion with the boss
Answer:
Interpersonal skills are used to communicate with people. Such skills can be individually and in groups measured. Some interpersonal abilities include verbal communication, nonverbal communication, listening ability, ability to decide, etc. Facilitators and observers, therefore, monitor if participants have unqualified abilities.
Explanation:
— thinking about your boss's communication can be sufficient to cause anxiety and stress. You can nevertheless be confident and effective in communication with a little preparation and practice.
1. Write down all the topics you want to talk to and communicate before you talk to your boss.
2) Make sure you know what your boss wants or needs.
3) Rehearse in privacy what your boss is going to say.
4) Use qualifying words like "maybe" or "maybe" instead of absolute words, like "always," "everyone," "every time" or "never." 4) When you talk to your boss. Absolute speech can increase the defense and resistance of a person.
5) Make "I" statements, like "You" statements, like "you did not give me guidance," in the place of "You."
6) If you're emotional, avoid going to your boss. Give yourself time to refresh your thoughts and calm.
7) Talk to your boss before problems get hot and emotional involvement if possible.
8) Be a listener active. Learn what your boss says and really listen. Ask your boss to repeat or clarify an issue if you missed or were unaware.
9) Try to repeat and rephrase your boss's points to show that you listen to him and understand him or her during a convergence.
10) Practice a fine linguistic body. Look at your boss, lean in, and avoid fidgeting.
11) Be confident, not aggressive.
12) Maintain an open mind and compromise open.
13) Avoid spreading or gossiping about your boss's rumors.
14) Have good behavior.
15) Make sure you give love and recognition to your boss when it should.
16) Contact your boss regularly for a convenient relationship to develop and maintain.
Wi-fi refers to a network that is based on the ____ standard
Answer:
Wi-fi refers to a network that is based on the 802.11 standard.
Answer:
It is based on the 802.11 standard
Explanation: