Answer:
359 is December 25 in a 365 day year.
Explanation:
Answer:
For western christian churches, Christmas day always occurs on December 25, though some cultures observe the main celebration on the night prior, Christmas Eve.
Anna is creating a digital portfolio, including her professional work showcasing the designs she created. What should she add to each work?
A. brief description of the work and project details
B. only title of the work
C. only date and title of the work
D. only project details of the work
A group of students is performing an investigation to measure how much liquid water is produced from a 10 L sample of snow. What must occur in order for the students to perform this investigation?
Answer:
the temperature of the sample must change
Explanation:
short description about your penfriend
Answer:
USEFUL WORDS:
Starting the first Letter. Hi! ...
Starting the second Letter. Hi! ...
Starting the second letter with an apology. I am sorry I did not reply earlier. ...
Saying Goodbye. Bye for now and write back soon! ...
Do not write everything in the first letter. The following are some ideas:
Introduce Yourself. ...
Introduce your family.
Explanation:
What sum will amounts to Rs 1227 in 9 months at 6%
e emple Interest 2.
Answer:
given us,
principal (p)= Rs 1227
Time(t)= 9
Rate(r)= 6./.
Here,
simple interest= P×T×R/100
= 1227×9×6/100
= 66258/100
= 662.58
Explanation:
by using simple interest formula
The principal investment required to get a total amount, principal plus interest, of Rs 227.00 from simple interest at a rate of 6% per year for 0.75 years (9 months) is $1,174.16
Given Data
Final Amount A = Rs 1227
Time = 9 months
Rate = 6%
Principal = ?
Equation:P = A / (1 + rt)
Calculation:First, converting R percent to r a decimal
r = R/100 = 6%/100 = 0.06 per year.
Putting time into years for simplicity,
9 months / 12 months/year = 0.75 years
Solving our equation:
P = 1227 / ( 1 + (0.06 × 0.75)) = 1174.1626794258
P = $1,174.16
Learn more about simple interest here:
https://brainly.com/question/2294792
A certain instructor assigns a 50-point problem and calculates an integer score 0-50 and assigns a letter grade according to the scale 40 - 50 is an A, 30 - 39 is a B, 20 - 29 is a C, 10 - 19 is a D and 0 - 9 is an F. Write a Python function called letter_grade which takes one argument, an integer, and RETURNS the appropriate letter grade.
Answer:
Following are the code to this question:
def letter_grade(x): #defining a method letter_grade that accepts one parameter
if x>=50 and x<=40:#defining if block that check value of x greater than 50 and less than 40
print("A")#print value
if x>=30 and x<=39:#defining if block that check value of x greater than 30 and less than 39
print("B")#print value
if x>=20 and x<=29:#defining if block that check value of x greater than 20 and less than 29
print("C")#print value
if x>=10 and x<=19:#defining if block that check value of x greater than 10 and less than 19
print("D")#print value
if x>=0 and x<=9:#defining if block that check value of x greater than 0 and less than 9
print("F")#print value
letter_grade(30) #calling the method letter_grade
Output:
B
Explanation:
In the above Python code, a method "letter_grade" is declared, that accepts an integer variable in its parameter, and defined the multiple if block to check the given value, which can be defined as follows:
In the first, if block, it checks the value of x greater than 50 and less than 40 , if the condition is true it will print the value "A".In the second, if block, it checks the value of x greater than 30 and less than 39, if the condition is true it will print the value "B".In the third, if block, it checks the value of x greater than 20 and less than 29, if the condition is true it will print the value "C". In the fourth, if block, it checks the value of x greater than 10 and less than 19, if the condition is true it will print the value "D".In the fifth, if block, it checks the value of x greater than 0 and less than 9, if the condition is true it will print the value "F".And at the last it call the method.
_______________ are distinguished from microcontrollers by their complexity and increased on-chip resources.A. Systems on a chip B. Systems on a driveC. Chip on a chip D. Device on a chip
Answer:
the correct option is (A)
Explanation:
According to the given scenario, the system on a chip is a chip that is different from the microcontrollers in terms of complexity and rise on the chip resources
The system on a chip is a circuit i.e. integrated most the computer things
hence, the correct option is (A).
Therefore the rest of the options are wrong
Answer:
a
Explanation:
Ship, CruiseShip, and CargoShip ClassesDesign a Ship class that has the following members:a. a member variable for the name of the ship (a string)b. a member variable for the year that the ship was built (a string)c. A constructor and appropriate accessors and mutatorsd. A virtual print function that displays the ship's name and the year it was built.
Answer:
def shipvari(ship);
Cruiseship="" #defining a string
YearBuilt= ""
for i in range(ship);
if Cruiseship="";
print(CruiseShip)
Give the rest a try!
match the databse function to it's purpose
Answer:
Explanation:
Which database functions?
As a sysadmin you will find yourself doing business with a variety of third party vendors which of these are likely to be rented or bought from a vendors
Answer:
Printing devices
Video, Audio devices
Communication machines
Explanation:
Printing devices - Sysadmin needs this type of devices for print important data and information.
Video, Audio devices - Sysadmin needs this type of devices for better communication and interaction.
Communication(fax) machines - Sysadmin needs this type of devices for written communication and interaction and deals.
Suppose a webpage contains a single text field. We want to make the page such that a user can immediately start typing in the text field without clicking on it. What is correct way using?
1. .
2. .
3. .
4. Can't be done with only HTML5, need help of Javascript or something else.
Answer:
The answer is "Option 2".
Explanation:
In HTML5, text inputs use an autofocus attribute, which, when the page is loaded, uses a template to concentrate primarily on text fields. This attribute is a Boolean property that represents the HTML autofocus attribute, showing if the related <select> element will receive an output focus whenever the page loads if it is overruled by the user. An only form-associated entity can have this property specified in a text.
Your organization uses a federated identity provider to login to your Oracle Cloud Infrastructure (OCI) environment. As a developer, you are writing a script to automate some operation and want to use OCI CLI to do that. Your security team doesn't allow storing private keys on local machines. How can you authenticate with OCI CLI?
Answer:
Run OCI session authenticate and provide your credentials
Explanation:
The OCI CLI when in combination with a shell script can be fastly used in the creation of shareable scripts. It uses API keys, private and public scheme as it's default authentication. The command to use is the oci set up keys, to create these keys. Since you cannot store private keys, you run OCI authentication and then you give your credentials
Which of the following options allow you to access a computer remotely?
a. NTP
b. SSH
c. Server
d. VPN
Answer:
b. SSH
Explanation:
Secure Shell (SSH) is a protocol that allows you to access a computer remotely by providing safe network communications via an unsecured network.
Secure Shell (SSH) protocol can be used to perform essential functions such as protected file transfers, remote access to private network systems, devices, and applications.
Thus, option "B" is the right answer.
What is the last usable host IP address on the 192.168.32.9/30 network?
Answer:
192.168.32.10
Explanation:
HOPE THIS HELPS:)
The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for termination.
Answer:
"Cross-training " seems to be the right response.
Explanation:
Cross-training seems to be the method of constructing a multi-professional workers staff with incentive plans to make sure that they must have the same tools to complete different occupational tasks throughout the organization. This will be a very broad approach besides randomized controlled training methods, both maximum and minimum frequency, for generations.A company has four departments: A, B, C, and D. The number of IP addresses required by each department is 100, 60, 20, and 26 respectively. The company's application network is 172.168.1.0/24. Please list the address range and subnet mask that can be assigned by each department.
Answer:
deeppppuhjjuuiiijjjjk
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to be addressed. Which of the following should be implanted?A. Build an online intermediate CA.B. Implement a key escrow.C. Implement stapling.D. Install a CRL.
Answer:
B. Implement a key escrow.
Explanation:
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.
A Flash Translation Layer translates user data to a format that can be written on the NVM. tracks which physical block contains the most number of consecutive invalid pages. tracks which physical block contains only valid pages. tracks which physical block contains only invalid pages.
Answer:
tracks which physical block contains only valid pages.
Explanation:
Flash translation layer or FTL is a system made up of software and hardware that manages solid-state drive or SSD operations. It implements data concurrency techniques like striping, interleaving, and pipelining to generate a high throughput. It also performs logical to physical addressing amongst other functionalities.
The FTL also tracks which physical block in the memory that contains only valid pages by performing a bad block management process, isolating and discarding the blocks with no valid pages
which data representation system is based on the digits 0-9 and is mostly easily interpreted In real wrold situations
Answer:
Hexadecimal data representation system is based on the digits 0-9 and is mostly easily interpreted In real word situations .
Explanation:
Hexadecimal manages sixteen different figures: most often the numbers 0–9 to describe values zero to nine, and (A–F) to describe values ten to fifteen. The modern hexadecimal system was first launched into the domain of computing by IBM in 1963. An older description, with 0-9 and u-z, was practiced in 1956 by the Bendix G-15 computer.
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Answer:
def brute_force(array1, array2):
for item in array1:
for element in array 2:
if element == item:
print(f"{element} and {item} are a match")
Explanation:
A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.
The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.
Application software helps run the computer and coordinates instructions with the hardware.
A. True
B. False
Answer:
A. True
Explanation: